stem

Information Retrieval Systems: A Human Centered Approach




stem

Improving Security for SCADA Control Systems




stem

Framework for Quality Metrics in Mobile-Wireless Information Systems




stem

Multi-Agent System for Knowledge-Based Access to Distributed Databases




stem

An Improved SMS User Interface Result Checking System




stem

Can We Help Information Systems Students Improve Their Ethical Decision Making?




stem

Transaction Flow in Card Payment Systems Using Mobile Agents




stem

A Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application




stem

A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research




stem

Web Usage Association Rule Mining System




stem

Second Time Lucky? A Tale of Two Systems




stem

Knowledge Management Systems Development: Theory and Practice




stem

Socio-Technical Knowledge Management and Epistemological Paradigms: Theoretical Connections at the Individual and Organisational Level




stem

Critical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland




stem

The Influence of User Efficacy and Expectation on Actual System Use




stem

Critical Success Factors for ERP Systems Implementation in Public Administration




stem

The Survey of Information Systems in Public Administration in Poland




stem

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




stem

Innovation Capability: A Systematic Review and Research Agenda

Purpose: Innovation capability is a growing and significant area of academic research. However, there is little attempt to provide a cumulative overview of this phenomenon. The purpose of this systematic review is to synthesize peer reviewed articles published in the area to develop a conceptual framework and to aid future research. Design/Methodology/Approach: The paper adopted a systematic review of literature on innovation capability. The final screening generated 51 articles from 30 journals from 2000-2015. Findings: The examination and synthesis of the theoretical and the empirical articles show that (1) the authors applied narrow range of conceptual and theoretical foundations; (2) innovation capability is being investigated mostly at the firm level for about 90% of the articles, and marginally about 5% at network (supply) chain level; (3) the authors define innovation capability in different ways and use diverse set of dimensions to measure innovation capability; (4) there is potential for future research across firms in innovation management disciplines. Practical implications: The review contributes to theory development in organizational capability literature in general. Managers wishing to innovate need to examine critically and integrate some of the innovation capability dimensions proposed in this paper. Originality: The review is unique in the sense that it provides conceptualisation of innovation capability framework.




stem

Accounting Information Systems Effectiveness: Evidence from the Nigerian Banking Sector

Aim/Purpose: The purpose of this study is to investigate the interrelationship among the quality measures of information system success, including system quality, information, quality, and service quality, that eventually influence accounting information systems effectiveness. Background: It is generally believed that investment in an information system offers opportunities to organizations for business process efficiency and effectiveness. Despite huge investments in accounting information systems, banks in Nigeria have not realized the full potential benefits of using these systems because of persistent failures. Few studies have been conducted to address the problem. Methodology: A survey research design was used to collect data, and a total of 287 questionnaires were retrieved from respondents in the Nigerian banking sector. Contribution: This study contributes to the understanding of the most important antecedent factors of the quality measures, the interrelationship among the quality measures, and the influence of these measures on the accounting information systems effectiveness. Findings: The result of the study revealed that security, ease of use, and efficiency are key features of system quality, while the information quality dimension includes accuracy, timeliness, and completeness. The result of the study further revealed that information quality and system quality have significant influences on accounting information systems effectiveness. Recommendations for Practitioners: This study provides practitioners with important measures for evaluation of AIS effectiveness in the context of Nigerian banks. Recommendation for Researchers: Future researchers may build on the findings of current study to conduct fur-ther research in the area of AIS effectiveness in different contexts. Future Research: This study examines only three quality measures of Delone and Mclean model and antecedents of information and system quality measures, neglecting contingency factor. Therefore, future study should include other factors to the AIS effectiveness model to help in developing more specific theory in AIS domain.




stem

A Systematic Literature Review of Agile Maturity Model Research

Background/Aim/Purpose: A commonly implemented software process improvement framework is the capability maturity model integrated (CMMI). Existing literature indicates higher levels of CMMI maturity could result in a loss of agility due to its organizational focus. To maintain agility, research has focussed attention on agile maturity models. The objective of this paper is to find the common research themes and conclusions in agile maturity model research. Methodology: This research adopts a systematic approach to agile maturity model research, using Google Scholar, Science Direct, and IEEE Xplore as sources. In total 531 articles were initially found matching the search criteria, which was filtered to 39 articles by applying specific exclusion criteria. Contribution:: The article highlights the trends in agile maturity model research, specifically bringing to light the lack of research providing validation of such models. Findings: Two major themes emerge, being the coexistence of agile and CMMI and the development of agile principle based maturity models. The research trend indicates an increase in agile maturity model articles, particularly in the latter half of the last decade, with concentrations of research coinciding with version updates of CMMI. While there is general consensus around higher CMMI maturity levels being incompatible with true agility, there is evidence of the two coexisting when agile is introduced into already highly matured environments. Future Research: Future research direction for this topic should include how to attain higher levels of CMMI maturity using only agile methods, how governance is addressed in agile environments, and whether existing agile maturity models relate to improved project success.




stem

Understanding Internal Information Systems Security Policy Violations as Paradoxes

Aim/Purpose: Violations of Information Systems (IS) security policies continue to generate great anxiety amongst many organizations that use information systems, partly because these violations are carried out by internal employees. This article addresses IS security policy violations in organizational settings, and conceptualizes and problematizes IS security violations by employees of organizations from a paradox perspective. Background: The paradox is that internal employees are increasingly being perceived as more of a threat to the security of organizational systems than outsiders. The notion of paradox is exemplified in four organizational contexts of belonging paradox, learning paradox, organizing paradox and performing paradox. Methodology : A qualitative conceptual framework exemplifying how IS security violations occur as paradoxes in context to these four areas is presented at the end of this article. Contribution: The article contributes to IS security management practice and suggests how IS security managers should be positioned to understand violations in light of this paradox perspective. Findings: The employee generally in the process of carrying out ordinary activities using computing technology exemplifies unique tensions (or paradoxes in belonging, learning, organizing and performing) and these tensions would generally tend to lead to policy violations when an imbalance occurs. Recommendations for Practitioners: IS security managers must be sensitive to employees tensions. Future Research: A quantitative study, where statistical analysis could be applied to generalize findings, could be useful.




stem

Socio-Technical Approach, Decision-Making Environment, and Sustainable Performance: Role of ERP Systems

Aim/Purpose: This explanatory study aimed to determine the mediating role of ERP in the relation between the effect of a socio-technical approach and decision-making environment, and firms’ sustainable performance. Background: Although earlier studies have discussed the critical success factors of the failure or success of an ERP system and the extent to which it achieves its desired objectives, the current study focused on the significant impact of socio-technical elements and decision-making environment on the success of the ERP system (i.e., sustainable performance). In addition, the lack of research on ERP as a mediator in the above relationship motivated this study to bridge the literature gap. Methodology: The data was collected using questionnaires distributed to 233 randomly selected employees of three multinational companies (BP, LUKOIL, and Eni) operating in Iraq. The structural equation modeling was employed to test the hypothesized relationships. Contribution: The study contributes to the literature by examining the mediating role of the ERP system in the relationship between socio-technical elements and the decision-making environment, as well as, the moderating role of organizational culture in the relationship between socio-technical elements and ERP systems. Findings: The results showed that ERP is a significant mediator between the linkage of socio-technical elements and the decision-making environment while organizational culture has an insignificant moderating role in the relationship between socio-technical elements and ERP systems. Recommendations for Practitioners: In a developing country like Iraq, there is a need to implement ERP to achieve better sustainable performance through change management and organizational development that ultimately work towards enhancing individual capabilities, knowledge, and training. Recommendation for Researchers: The researchers are recommended to conduct an in-depth study of the phenomenon based on theoretical and empirical grounds, particularly in light of the relationship of socio-technical elements and decision-making environments. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in using ERP systems to minimize pollution in Iraqi context. Future Research: A more in-depth study can be performed using a bigger sample, which not only includes the oil industry but also the other industries.




stem

PRATO: An Automated Taxonomy-Based Reviewer-Proposal Assignment System

Aim/Purpose: This paper reports our implementation of a prototype system, namely PRATO (Proposals Reviewers Automated Taxonomy-based Organization), for automatic assignment of proposals to reviewers based on categorized tracks and partial matching of reviewers’ profiles of research interests against proposal keywords. Background: The process of assigning reviewers to proposals tends to be a complicated task as it involves inspecting the matching between a given proposal and a reviewer based on different criteria. The situation becomes worse if one tries to automate this process, especially if a reviewer partially matches the domain of the paper at hand. Hence, a new controlled approach is required to facilitate the matching process. Methodology: Proposals and reviewers are organized into categorized tracks as defined by a tree of hierarchical research domains which correspond to the university’s colleges and departments. In addition, reviewers create their profiles of research interests (keywords) at the time of registration. Initial assignment is based on the matching of categorized sub-tracks of proposal and reviewer. Where the proposal and a reviewer fall under different categories (sub-tracks), assignment is done based on partial matching of proposal content against re-viewers’ research interests. Jaccard similarity coefficient scores are calculated of proposal keywords and reviewers’ profiles of research interest, and the reviewer with highest score is chosen. The system was used to automate the process of proposal-reviewer assignment at the Umm Al-Qura University during the 2017-2018 funding cycle. The list of proposal-reviewer assignments generated by the system was sent to human experts for voting and subsequently to make final assignments accordingly. With expert votes and final decisions as evaluation criteria, data system-expert agreements (in terms of “accept” or “reject”) were collected and analyzed by tallying frequencies and calculating rejection/acceptance ratios to assess the system’s performance. Contribution: This work helped the Deanship of Scientific Research (DSR), a funding agency at Umm Al-Qura University, in managing the process of reviewing proposals submitted for funding. We believe the work can also benefit any organizations or conferences to automate the assignment of papers to the most appropriate reviewers. Findings: Our developed prototype, PRATO, showed a considerable impact on the entire process of reviewing proposals at DSR. It automated the assignment of proposals to reviewers and resulted in 56.7% correct assignments overall. This indicates that PRATO performed considerably well at this early stage of its development. Recommendations for Practitioners: It is important for funding agencies and publishers to automate reviewing process to obtain better reviewing quality in a timely manner. Recommendation for Researchers: This work highlighted a new methodology to tackle the proposal-reviewer assignment task in an automated manner. More evaluation might be needed with consideration of different categories, especially for partially matched candidates. Impact on Society: The new methodology and knowledge about factors influencing the implementation of automated proposal-reviewing systems will help funding agencies and publishers to improve the quality of their internal processes. Future Research: In the future, we plan to examine PRATO’s performance on different classification schemes where specialty areas can be represented in graphs rather than trees. With graph representation, the scope for reviewer selection can be widened to include more general fields of specialty. Moreover, we will try to record the reasons for rejection to identify accurately whether the rejection was due to improper assignment or other reasons.




stem

Multilevel Authentication System for Stemming Crime in Online Banking

Aim/Purpose: The wide use of online banking and technological advancement has attracted the interest of malicious and criminal users with a more sophisticated form of attacks. Background: Therefore, banks need to adapt their security systems to effectively stem threats posed by imposters and hackers and to also provide higher security standards that assure customers of a secured environment to perform their financial transactions. Methodology : The use of authentication techniques that include the mutual secure socket layer authentication embedded with some specific features. Contribution: An approach was made through this paper towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment. Findings: The use of soft token as the final stage of authentication provides ease of management with no additional hardware requirement. Recommendations for Practitioners : This work is an approach made towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment to stem cybercrime. Recommendation for Researchers: With this approach, a reliable system of authentication is being suggested to stem the growing rate of hacking activities in the information technology sector. Impact on Society :This work if adopted will give the entire populace confidence in carrying out online banking without fear of any compromise. Future Research: This work can be adopted to model a real-life scenario.




stem

The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector

Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems.




stem

A Cognitive Knowledge-based Model for an Academic Adaptive e-Advising System

Aim/Purpose: This study describes a conceptual model, based on the principles of concept algebra that can provide intelligent academic advice using adaptive, knowledge-based feedback. The proposed model advises students based on their traits and academic history. The system aims to deliver adaptive advice to students using historical data from previous and current students. This data-driven approach utilizes a cognitive knowledge-based (CKB) model to update the weights (values that indicate the strength of relationships between concepts) that exist between student’s performances and recommended courses. Background: A research study conducted at the Public Authority for Applied Education and Training (PAAET), a higher education institution in Kuwait, indicates that students’ have positive perceptions of the e-Advising system. Most students believe that PAAET’s e-Advising system is effective because it allows them to check their academic status, provides a clear vision of their academic timeline, and is a convenient, user-friendly, and attractive online service. Student advising can be a tedious element of academic life but is necessary to fill the gap between student performance and degree requirements. Higher education institutions have prioritized assisting undecided students with career decisions for decades. An important feature of e-Advising systems is personalized feedback, where tailored advice is provided based on students' characteristics and other external parameters. Previous e-Advising systems provide students with advice without taking into consideration their different attributes and goals. Methodology: This research describes a model for an e-Advising system that enables students to select courses recommended based on their personalities and academic performance. Three algorithms are used to provide students with adaptive course selection advice: the knowledge elicitation algorithm that represents students' personalities and academic information, the knowledge bonding algorithm that combines related concepts or ideas within the knowledge base, and the adaptive e-Advising model that recommends relevant courses. The knowledge elicitation algorithm acquires student and academic characteristics from data provided, while the knowledge bonding algorithm fuses the newly acquired features with existing information in the database. The adaptive e-Advising algorithm provides recommended courses to students based on existing cognitive knowledge to overcome the issues associated with traditional knowledge representation methods. Contribution: The design and implementation of an adaptive e-Advising system are challenging because it relies on both academic and student traits. A model that incorporates the conceptual interaction between the various academic and student-specific components is needed to manage these challenges. While other e-Advising systems provide students with general advice, these earlier models are too rudimentary to take student characteristics (e.g., knowledge level, learning style, performance, demographics) into consideration. For the online systems that have replaced face-to-face academic advising to be effective, they need to take into consideration the dynamic nature of contemporary students and academic settings. Findings: The proposed algorithms can accommodate a highly diverse student body by providing information tailored to each student. The academic and student elements are represented as an Object-Attribute-Relationship (OAR) model. Recommendations for Practitioners: The model proposed here provides insight into the potential relationships between students’ characteristics and their academic standing. Furthermore, this novel e-Advising system provides large quantities of data and a platform through which to query students, which should enable developing more effective, knowledge-based approaches to academic advising. Recommendation for Researchers: The proposed model provides researches with a framework to incorporate various academic and student characteristics to determine the optimal advisory factors that affect a student’s performance. Impact on Society: The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advice to students. The proposed approach can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to learning. Future Research: In future studies, the proposed algorithms will be implemented, and the adaptive e-Advising model will be tested on real-world data and then further improved to cater to specific academic settings. The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advisory to students. The approach proposed can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to course recommendation.




stem

The Challenge of Evaluating Virtual Communities of Practice: A Systematic Mapping Study

Aim/Purpose: This paper presents a study of Virtual Communities of Practice (VCoP) evaluation methods that aims to identify their current status and impact on knowledge sharing. The purposes of the study are as follows: (i) to identify trends and research gaps in VCoP evaluation methods; and, (ii) to assist researchers to position new research activities in this domain. Background: VCoP have become a popular knowledge sharing mechanism for both individuals and organizations. Their evaluation process is complex; however, it is recognized as an essential means to provide evidences of community effectiveness. Moreover, VCoP have introduced additional features to face to face Communities of Practice (CoP) that need to be taken into account in evaluation processes, such as geographical dispersion. The fact that VCoP rely on Information and Communication Technologies (ICT) to execute their practices as well as storing artifacts virtually makes more consistent data analysis possible; thus, the evaluation process can apply automatic data gathering and analysis. Methodology: A systematic mapping study, based on five research questions, was carried out in order to analyze existing studies about VCoP evaluation methods and frameworks. The mapping included searching five research databases resulting in the selection of 1,417 papers over which a formal analysis process was applied. This process led to the preliminary selection of 39 primary studies for complete reading. After reading them, we select 28 relevant primary studies from which data was extracted and synthesized to answer the proposed research questions. Contribution: The authors of the primary studies analyzed along this systematic mapping propose a set of methods and strategies for evaluating VCoP, such as frameworks, processes and maturity models. Our main contribution is the identification of some research gaps present in the body of studies, in order to stimulate projects that can improve VCoP evaluation methods and support its important role in social learning. Findings: The systematic mapping led to the conclusion that most of the approaches for VCoP evaluation do not consider the combination of data structured and unstructured metrics. In addition, there is a lack of guidelines to support community operators’ actions based on evaluation metrics.




stem

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




stem

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.




stem

A Decision Support System and Warehouse Operations Design for Pricing Products and Minimizing Product Returns in a Food Plant

Aim/Purpose: The first goal is to develop a decision support system for pricing and production amounts for a firm facing high levels of product returns. The second goal is to improve the management of the product returns process. Background: This study was conducted at a food importer and manufacturer in Israel facing a very high rate of product returns, much of which is eventually discarded. The firm’s products are commonly considered to be a low-cost generic alternative and are therefore popular among low-income families. Methodology: A decision support module was added to the plant’s business information system. The module is based on a supply chain pricing model and uses the sales data to infer future demand’s distribution. Ergonomic models were used to improve the design of the returns warehouse and the handling of the returns. Contribution: The decision support system allows to improve the plant’s pricing and quantity planning. Consequently, it reduced the size of product returns. The new design of the returns process is expected to improve worker’s productivity, reduces losses and results in safer outcomes. This study also demonstrates a successful integration and of a theoretical economical model into an information system. Findings: The results show the promise of incorporating pricing supply chain models into informing systems to achieve a practical business task. We were able to construct actual demand distributions from the data and offer actual pricing recommendations that reduce the number of returns while increasing potential profits. We were able to identify key deficiencies in the returns operations and added a module to the decisions support system that improves the returns management and links it with the sales and pricing modules. Finally, we produced a better warehouse design that supports efficient and ergonomic product returns handling. Recommendations for Practitioners: This work can be replicated for different suppliers, manufacturers and retailers that suffer from product returns. They will benefit from the reduction in returns, as well as the decrease in the losses associated with these returns. Recommendation for Researchers: It is worthwhile to research whether decision support systems can be applied to other aspects of the organizations’ operations. Impact on Society: Product returns is a lose-lose situation for producers, retailers and customers. Moreover, mismanagement of these returns is harmful for the environment and may result in the case of foods, in health hazards. Reducing returns and improving the handling improves sustainability and is beneficial for society. Future Research: The decision support system’s underlying pricing model assumes a specific business setting. This can be extended using other pricing models and applying them in a similar fashion to the current application.




stem

Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study

Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.




stem

A Systematic Literature Review of Business Intelligence Framework for Tourism Organizations: Functions and Issues

Aim/Purpose: The main goal of this systematic literature review was to look for studies that provide information relevant to business intelligence’s (BI) framework development and implementation in the tourism sector. This paper tries to classify the tourism sectors where BI is implemented, group various BI functionalities, and identify common problems encountered by previous research. Background: There has been an increased need for BI implementation to support decision-making in the tourism sector. Tourism stakeholders such as management of destination, accommodation, transportation, and public administration need a guideline to understand functional requirements before implementation. This paper addresses the problem by comprehensively reviewing the functionalities and issues that need to be considered based on previous business intelligence framework development and implementation in tourism sectors. Methodology: We have conducted a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Guidelines for Meta-Analysis (PRISMA) method. The search is conducted using online academic database platforms, resulting in 543 initial articles published from 2002 to 2022. Contribution: The paper could be of interest to relevant stakeholders in the tourism industry because it provides an overview of the capabilities and limitations of business intelligence for tourism. To our knowledge, this is the first study to identify and classify the BI functionalities needed for tourism sectors and implementation issues related to organizations, people, and technologies that need to be considered. Findings: BI functionalities identified in this study include basic functions such as data analysis, reports, dashboards, data visualization, performance metrics, and key performance indicator, and advanced functions such as predictive analytics, trend indicators, strategic planning tools, profitability analysis, benchmarking, budgeting, and forecasting. When implementing BI, the issues that need to be considered include organizational, people and process, and technological issues. Recommendations for Practitioners: As data is a major issue in BI implementation, tourism stakeholders, especially in developing countries, may need to build a tourism data center or centralized coordination regulated by the government. They can implement basic functions first before implementing more advanced features later. Recommendation for Researchers: We recommend further studying the BI implementation barriers by employing a perspective of an adoption framework such as the technology, organization, and environment (TOE) framework. Impact on Society: This research has a potential impact on improving the tourism industry’s performance by providing insight to stakeholders about what is needed to help them make more accurate decisions using business intelligence. Future Research: Future research may involve collaboration between practitioners and academics in developing various BI architectures specific to each tourism industry, such as destination management, hospitality, or transportation.




stem

The Relationship Between Critical Success Factors, Perceived Benefits, and Usage Intention of Mobile Knowledge Management Systems in the Malaysian Semiconductor Industry

Aim/Purpose: This study examined the relationship between critical success factors (CSFs), perceived benefits, and usage intention of Mobile Knowledge Management Systems (MKMS) via an integrated Technology Acceptance Model (TAM) and Information Systems Success Model (ISSM). Background: This study investigates the CSFs (i.e., Strategic Leadership, Employee Training, System Quality, and Information Quality) that impact the usage intention of KMS in mobile contexts which have been neglected. Since users normally consider the usefulness belief in a system before usage, this study examines the role of perceived benefits as a mediator between the CSFs and usage intention. Methodology: A survey-based research approach in the Malaysian semiconductor industry was employed via an integrated model of TAM and ISSM. At a response rate of 59.52%, the findings of this study were based on 375 usable responses. The data collected was analyzed using the Partial Least Squares with SmartPLS 3.0. Contribution: This study contributes to the body of knowledge in the areas of mobile technology acceptance and knowledge management. Specifically, it helps to validate the integrated model of TAM and ISSM with the CSFs from knowledge management and information system. In addition, it provides the would-be adopters of MKMS with valuable guidelines and insights to consider before embarking on the adoption stage. Findings: The findings suggest that Employee Training and Information Quality have a positive significant relationship with Perceived MKMS Benefits. On the contrary, Strategic Leadership, System Quality, and Perceived User-friendliness showed an insignificant relationship with Perceived MKMS Benefits. Additionally, Employee Training and Information Quality have an indirect relationship with MKMS Usage Intention which is mediated by Perceived MKMS Benefits. Recommendations for Practitioners: The findings are valuable for managers, engineers, KM practitioners, KM consultants, MKMS developers, and mobile device producers to enhance MKMS usage intention. Recommendation for Researchers: Researchers would be able to conduct more inter-disciplinary studies to better understand the relevant issues concerning both fields – knowledge management and mobile computing disciplines. Additionally, the mediation effect of TAM via Perceived Usefulness (i.e., perceived MKMS benefits) on usage intention of MKMS should be further investigated with other CSFs. Future Research: Future studies could perhaps include other critical factors from both KM and IS as part of the external variables. Furthermore, Perceived Ease of Use (i.e., Perceived User-friendly) should be tested as a mediator in the future, together with Perceived Usefulness (i.e., perceived MKMS Benefits) to compare which would be a more powerful predictor of usage intention. Moreover, it may prove interesting to find out how the research framework would fit into other industries to verify the findings of this study for better accuracy and generalizability.




stem

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




stem

The International Case for Micro-Credentials for Life-Wide And Life-Long Learning: A Systematic Literature Review

Aim/Purpose: Systematic literature reviews seek to locate all studies that contain material of relevance to a research question and to synthesize the relevant outcomes of those studies. The primary aim of this paper was to synthesize both research and practice reports on micro-credentials (MCRs). Background: There has been an increase in reports and research on the plausibility of MCRs to support dynamic human skills development for an increasingly impatient and rapidly changing digital world. The integration of fast-paced emerging technologies and digitalization necessitate alternative learning paradigms. MCRs offer time, financial, and space flexibility and can be stacked into a larger qualification, thereby allowing for a broader range of transdisciplinary competencies within a qualification. However, MCRs often lack the academic rigor required for accreditation within existing disciplines. Methodology: The study followed the PRISMA framework (Preferred Reporting Items for Systematic Reviews and Meta Analyses), which offers a rigorous method to enhance reporting quality. The study used both academic research and practice reports. Contribution: The paper makes a theoretical contribution to the discourse about the need for innovation within existing educational paradigms for continued relevance in a changing world. It also contributes to the debate on the role of MCRs in bridging the gap between practice and academia despite the growing difference between their interests, and the role that MCRs play in the social-economic plans of countries. Findings: The key findings are that investments in MCRs are mainly in the Science, Technology, Engineering and Mathematics (STEM) and Education sectors, and have taken place mainly in high-income countries and regions – contexts that particularly value practice-accredited MCRs. Low-income countries, by contrast, remain traditional and insist on MCRs that are formally accredited by a recognized academic institution. This contributes to a widening skills gap between low- and high-income countries or regions, which results in greater global disparities. There is also a growing divide between academia and practice concerning their interest in MCRs (a reflection of the rigor versus relevance debate), which partially explains why many global and larger organizations have gone on to create their own learning institutions. Recommendations for Practitioners: We recommend that educational mechanisms consider the critical importance of MCRs as part of innovative efforts for life-wide (different sectors) and life-long (same sector) learning, especially in low-income countries. MCRs provide dynamic mechanisms to fill skills gaps in an increasing ruthless international battle for talent. Recommendation for Researchers: We recommend focused research into skills and career pathways using MCRs while at the same time remaining responsive to transdisciplinary efforts and sensitive to global and local changes within any sector. Impact on Society: Work and society have transformed over time, and more so in the new digital age, yet academia has been slow in adapting to the changes, forcing organizations to create their own learning institutions or to use MCRs to fill the skills gap. The purpose of education goes beyond preparing individuals for work, extending further to creating an environment where individuals and governments seek their own social and economic outcomes. MCRs provide a flexible means for co-creation between individuals, education, organizations, and government that could stem global rising unemployment, social exclusion, and redundancy. Future Research: Future research should focus on the co-creation of MCRs between practitioners and academia.




stem

Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review

Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process.




stem

Maternal Recommender System Systematic Literature Review: State of the Art and Future Studies

Aim/Purpose: This paper illustrates the potential of health recommender systems (HRS) to support and enhance maternal care. The study aims to explore the recent implementations of maternal HRS and to discover the challenges of the implementations. Background: The sustainable development goals (SDG) aim to reduce maternal mortality to less than 70 per 100,000 live births by 2030. However, progress is uneven between countries, with primary causes being severe bleeding, infections, high blood pressure, and failed abortions. Regular antenatal care (ANC) visits are crucial for detecting and managing complications, such as hypertensive illnesses, anemia, and gestational diabetes mellitus. Utilizing maternal evaluations during ANC visits can help identify and treat problems early, lowering morbidity and death rates for both mothers and fetuses. Technology-enabled daily health recording can help monitor pregnancy by providing actionable guides to patients and health workers based on patient status. Methodology: A systematic literature review was conducted using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) to identify maternal HRS reported in studies between November 2022 and December 2022. Information was subsequently extracted to understand the potential benefits of maternal HRS. Titles and abstracts of 1,851 studies were screened for the full-text screening, in which two reviewers independently selected articles and systematically extracted data using a predefined extraction form. Contribution: This study adds to the explorations of the challenges of implementing HRS for maternal care. This study also emphasizes the significance of explainability, data-driven methodologies, automation, and the necessity for integration and interoperability in the creation and deployment of health recommendation systems for maternity care. Findings: The majority of maternal HRS use a knowledge-based (constraint-based) ap-proach with more than half of the studies generating recommendations based on rules defined by experts or available guidelines. We also derived four types of interfaces that can be used for delivering recommendations. Moreover, patient health records as data sources can hold data from patients’ or health workers’ input or directly from the measurement devices. Finally, the number of studies in the pilot or demonstration stage is twice that in the sustained stages. We also discovered crucial challenges where the explainability of the methods was needed to ensure trustworthiness, comprehensibility, and effective enhancement of the decision-making process. Automatic data collection was also required to avoid complexity and reduce workload. Other obstacles were also identified where data integration between systems should be established and decent connectivity must be provided so that complete services can be admin-istered. Lastly, sustainable operations would depend on the availability of standards for integration and interoperability as well as sufficient financial sup-port. Recommendations for Practitioners: Developers of maternal HRS should consider including the system in the main healthcare system, providing connectivity, and automation to deliver better service and prevent maternal risks. Regulations should also be established to support the scale-up. Recommendation for Researchers: Further research is needed to do a thorough comparison of the recommendation techniques used in maternal HRS. Researchers are also recommended to explore more on this topic by adding more research questions. Impact on Society: This study highlights the lack of sustainability studies, the potential for scaling up, and the necessity for a comprehensive strategy to integrate the maternal recommender system into the larger maternal healthcare system. Researchers can enhance and improve health recommendation systems for maternity care by focusing on these areas, which will ultimately increase their efficacy and facilitate clinical practice integration. Future Research: Additional research can concentrate on creating and assessing methods to increase the explainability and interpretability of data-driven health recommender systems and integrating automatic measurement into the traditional health recommender system to enhance the anticipated outcome of antenatal care. Comparative research can also be done to assess how well various models or algorithms utilized in these systems function. Future research can also examine creative solutions to address resource, infrastructure, and technological constraints, such as connectivity and automation to help address the shortage of medical personnel in remote areas, as well as define tactics for long-term sustainability and integration into current healthcare systems.




stem

A Novel Telecom Customer Churn Analysis System Based on RFM Model and Feature Importance Ranking

Aim/Purpose: In this paper, we present an RFM model-based telecom customer churn system for better predicting and analyzing customer churn. Background: In the highly competitive telecom industry, customer churn is an important research topic in customer relationship management (CRM) for telecom companies that want to improve customer retention. Many researchers focus on a telecom customer churn analysis system to find out the customer churn factors for improving prediction accuracy. Methodology: The telecom customer churn analysis system consists of three main parts: customer segmentation, churn prediction, and churn factor identification. To segment the original dataset, we use the RFM model and K-means algorithm with an elbow method. We then use RFM-based feature construction for customer churn prediction, and the XGBoost algorithm with SHAP method to obtain a feature importance ranking. We chose an open-source customer churn dataset that contains 7,043 instances and 21 features. Contribution: We present a novel system for churn analysis in telecom companies, which encompasses customer churn prediction, customer segmentation, and churn factor analysis to enhance business strategies and services. In this system, we leverage customer segmentation techniques for feature construction, which enables the new features to improve the model performance significantly. Our experiments demonstrate that the proposed system outperforms current advanced customer churn prediction methods in the same dataset, with a higher prediction accuracy. The results further demonstrate that this churn analysis system can help telecom companies mine customer value from the features in a dataset, identify the primary factors contributing to customer churn, and propose suitable solution strategies. Findings: Simulation results show that the K-means algorithm gets better results when the original dataset is divided into four groups, so the K value is selected as 4. The XGBoost algorithm achieves 79.3% and 81.05% accuracy on the original dataset and new data with RFM, respectively. Additionally, each cluster has a unique feature importance ranking, allowing for specialized strategies to be provided to each cluster. Overall, our system can help telecom companies implement effective CRM and marketing strategies to reduce customer churn. Recommendations for Practitioners: More accurate churn prediction reduces misjudgment of customer churn. The acquisition of customer churn factors makes the company more convenient to analyze the reasons for churn and formulate relevant conservation strategies. Recommendation for Researchers: The research achieves 81.05% accuracy for customer churn prediction with the Xgboost and RFM algorithms. We believe that more enhancements algorithms can be attempted for data preprocessing for better prediction. Impact on Society: This study proposes a more accurate and competitive customer churn system to help telecom companies conserve the local markets and reduce capital outflows. Future Research: The research is also applicable to other fields, such as education, banking, and so forth. We will make more new attempts based on this system.




stem

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




stem

Unveiling Roadblocks and Mapping Solutions for Blockchain Adoption by Governments: A Systematic Literature Review

Aim/Purpose: Blockchain technology (BCT) has emerged as a potential catalyst for transforming government institutions and services, yet the adoption of blockchain in governments faces various challenges, for which previous studies have yet to provide practical solutions. Background: This study aims to identify and analyse barriers, potential solutions, and their relations in implementing BC for governments through a systematic literature review (SLR). The authors grouped the challenges based on the Technology-Organisation-Environment (TOE) framework while exercising a thematic grouping for the solutions, followed by a comprehensive mapping to unveil the relationship between challenges and solutions. Methodology: This study employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology, combined with the tollgate method, to improve the quality of selected articles. The authors further administer a three-level approach (open coding, axial coding, and selective coding) to analyse the challenges and solutions from the articles. Contribution: The authors argue that this study enriches the existing literature on BC adoption, particularly in the government context, by providing a comprehensive framework to analyse and address the unique challenges and solutions, thus contributing to the development of new theories and models for future research in BC adoption in government settings and fostering deeper exploration in the field. Findings: The authors have unveiled 40 adoption challenges categorised using the TOE framework. The most prevalent technological challenges include security concerns and integration & interoperability, while cultural resistance, lack of support and involvement, and employees’ capability hinder adoption at the organisational level. Notably, the environmental dimension lacks legal and standard frameworks. The study further unveils 28 potential solutions, encompassing legal frameworks, security and privacy measures, collaboration and governance, technological readiness and infrastructure, and strategic planning and adoption. The authors of the study have further mapped the solutions to the identified challenges, revealing that the establishment of legal frameworks stands out as the most comprehensive solution. Recommendations for Practitioners: Our findings provide a big picture regarding BC adoption for governments around the globe. This study charts the problems commonly encountered by government agencies and presents proven solutions in their wake. The authors endeavour practitioners, particularly those in governments, to embrace our findings as the cornerstone of BC/BCT adoption. These insights can aid practitioners in identifying existing or potential obstacles in adopting BC, pinpointing success factors, and formulating strategies tailored to their organisations. Recommendation for Researchers: Researchers could extend this study by making an in-depth analysis of challenges or solutions in specific types of countries, such as developed and developing countries, as the authors believe this approach would yield more insights. Researchers could also test, validate, and verify the mapping in this study to improve the quality of the study further and thus can be a great aid for governments to adopt BC/BCT fully. Impact on Society: This study provides a comprehensive exploration of BC adoption in the government context, offering detailed explanations and valuable insights that hold significant value for government policymakers and decision-makers, serving as a bedrock for successful implementation by addressing roadblocks and emphasising the importance of establishing a supportive culture and structure, engaging stakeholders, and addressing security and privacy concerns, ultimately enhancing the efficiency and effectiveness of BC adoption in government institutions and services. Future Research: Future research should address the limitations identified in this study by expanding the scope of the literature search to include previously inaccessible sources and exploring alternative frameworks to capture dynamic changes and contextual factors in BC adoption. Additionally, rigorous scrutiny, review, and testing are essential to establish the practical and theoretical validity of the identified solutions, while in-depth analyses of country-specific and regional challenges will provide valuable insights into the unique considerations faced by different governments.




stem

Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE

Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.




stem

Medicine Recommender System Based on Semantic and Multi-Criteria Filtering

Aim/Purpose: This study aims to devise a personalized solution for online healthcare platforms that can alleviate problems arising from information overload and data sparsity by providing personalized healthcare services to patients. The primary focus of this paper is to develop an effective medicine recommendation approach for recommending suitable medications to patients based on their specific medical conditions. Background: With a growing number of people becoming more conscious about their health, there has been a notable increase in the use of online healthcare platforms and e-services as a means of diagnosis. As the internet continues to evolve, these platforms and e-services are expected to play an even more significant role in the future of healthcare. For instance, WebMD and similar platforms offer valuable tools and information to help manage patients’ health, such as searching for medicines based on their medical conditions. Nonetheless, patients often find it arduous and time-consuming to sort through all the available medications to find the ones that match their specific medical conditions. To address this problem, personalized recommender systems have emerged as a practical solution for mitigating the burden of information overload and data sparsity-related issues that are frequently encountered on online healthcare platforms. Methodology: The study utilized a dataset of MC ratings obtained from WebMD, a popular healthcare website. Patients on this website can rate medications based on three criteria, including medication effectiveness, ease of use, and satisfaction, using a scale of 1 to 5. The WebMD MC rating dataset used in this study contains a total of 32,054 ratings provided by 2,136 patients for 845 different medicines. The proposed HSMCCF approach consists of two primary modules: a semantic filtering module and a multi-criteria filtering module. The semantic filtering module is designed to address the issues of data sparsity and new item problems by utilizing a medicine taxonomy that sorts medicines according to medical conditions and makes use of semantic relationships between them. This module identifies the medicines that are most likely to be relevant to patients based on their current medical conditions. The multi-criteria filtering module, on the other hand, enhances the approach’s ability to capture the complexity of patient preferences by considering multiple criteria and preferences through a unique similarity metric that incorporates both distance and structural similarities. This module ensures that patients receive more accurate and personalized medication recommendations. Moreover, a medicine reputation score is employed to ensure that the approach remains effective even when dealing with limited ratings or new items. Overall, the combination of these modules makes the proposed approach more robust and effective in providing personalized medicine recommendations for patients. Contribution: This study addresses the medicine recommendation problem by proposing a novel approach called Hybrid Semantic-based Multi-Criteria Collaborative Filtering (HSMCCF). This approach effectively recommends medications for patients based on their medical conditions and is specifically designed to overcome issues related to data sparsity and new item recommendations that are commonly encountered on online healthcare platforms. The proposed approach addresses data sparsity and new item issues by incorporating a semantic filtering module and a multi-criteria filtering module. The semantic filtering module sorts medicines based on medical conditions and uses semantic relationships to identify relevant ones. The multi-criteria filtering module accurately captures patient preferences and provides precise recommendations using a novel similarity metric. Additionally, a medicine reputation score is also employed to further expand potential neighbors, improving predictive accuracy and coverage, particularly in sparse datasets or new items with few ratings. With the HSMCCF approach, patients can receive more personalized recommendations that are tailored to their unique medical needs and conditions. By leveraging a combination of semantic-based and multi-criteria filtering techniques, the proposed approach can effectively address the challenges associated with medicine recommendations on online healthcare platforms. Findings: The proposed HSMCCF approach demonstrated superior effectiveness compared to benchmark recommendation methods in multi-criteria rating datasets in terms of enhancing both prediction accuracy and coverage while effectively addressing data sparsity and new item challenges. Recommendations for Practitioners: By applying the proposed medicine recommendation approach, practitioners can develop a medicine recommendation system that can be integrated into online healthcare platforms. Patients can then utilize this system to make better-informed decisions regarding the medications that are most suitable for their specific medical conditions. This personalized approach to medication recommendations can ultimately lead to improved patient satisfaction. Recommendation for Researchers: Integrating patient medicine reviews is a promising way for researchers to elevate the proposed medicine recommendation approach. By leveraging patient reviews, the approach can gain a more comprehensive understanding of how certain medications perform for specific medical conditions. Additionally, exploring the relationship between MC-based ratings using an improved aggregation function can potentially enhance the accuracy of medication predictions. This involves analyzing the relationship between different criteria, such as medication effectiveness, ease of use, and satisfaction of the patients, and determining the optimal weighting for each criterion based on patient feedback. A more holistic approach that incorporates patient reviews and an improved aggregation function can enable the proposed medicine recommendation approach to provide more personalized and accurate recommendations to patients. Impact on Society: To mitigate the risk of infection during the COVID-19 pandemic, the promotion of online healthcare services was actively encouraged. This allowed patients to continue accessing care and receiving treatment while adhering to physical distancing guidelines and shielding measures where necessary. As a result, the implementation of personalized healthcare services for patients is expected to be a major disruptive force in healthcare in the coming years. This study proposes a personalized medicine recommendation approach that can effectively address this issue and aid patients in making informed decisions about the medications that are most suitable for their specific medical conditions. Future Research: One way that may enhance the proposed medicine recommendation approach is to incorporate patient medicine reviews. Furthermore, the analysis of MC-based ratings using an improved aggregation function can also potentially enhance the accuracy of medication predictions.




stem

The Influence of COVID-19 on Employees’ Use of Organizational Information Systems

Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis.




stem

A Model Predicting Student Engagement and Intention with Mobile Learning Management Systems

Aim/Purpose: The aim of this study is to develop and evaluate a comprehensive model that predicts students’ engagement with and intent to continue using mobile-Learning Management Systems (m-LMS). Background: m-LMS are increasingly popular tools for delivering course content in higher education. Understanding the factors that affect student engagement and continuance intention can help educational institutions to develop more effective and user-friendly m-LMS platforms. Methodology: Participants with prior experience with m-LMS were employed to develop and evaluate the proposed model that draws on the Technology Acceptance Model (TAM), Task-Technology Fit (TTF), and other related models. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the model. Contribution: The study provides a comprehensive model that takes into account a variety of factors affecting engagement and continuance intention and has a strong predictive capability. Findings: The results of the study provide evidence for the strong predictive capability of the proposed model and supports previous research. The model identifies perceived usefulness, perceived ease of use, interactivity, compatibility, enjoyment, and social influence as factors that significantly influence student engagement and continuance intention. Recommendations for Practitioners: The findings of this study can help educational institutions to effectively meet the needs of students for interactive, effective, and user-friendly m-LMS platforms. Recommendation for Researchers: This study highlights the importance of understanding the antecedents of students’ engagement with m-LMS. Future research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability. Impact on Society: The engagement model can help educational institutions to understand how to improve student engagement and continuance intention with m-LMS, ultimately leading to more effective and efficient mobile learning. Future Research: Additional research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability.




stem

The Influence of Big Data Management on Organizational Performance in Organizations: The Role of Electronic Records Management System Potentiality

Aim/Purpose: The use of digital technology, such as an electronic records management system (ERMS), has prompted widespread changes across organizations. The organization needs to support its operations with an automation system to improve production performance. This study investigates ERMS’s potentiality to enhance organizational performance in the oil and gas industry. Background: Oil and gas organizations generate enormous electronic records that lead to difficulties in managing them without any system or digitalization procedure. The need to use a system to manage big data and records affects information security and creates several problems. This study supports decision-makers in oil and gas organizations to use ERMS to enhance organizational performance. Methodology: We used a quantitative method by integrating the typical partial least squares (SEM-PLS) approach, including measurement items, respondents’ demographics, sampling and collection of data, and data analysis. The SEM-PLS approach uses a measurement and structural model assessment to analyze data. Contribution: This study contributes significantly to theory and practice by providing advancements in identity theory in the context of big data management and electronic records management. This study is a foundation for further research on the role of ERMS in operations performance and Big Data Management (BDM). This research makes a theoretical contribution by studying a theory-driven framework that may serve as an essential lens to evaluate the role of ERMS in performance and increase its potentiality in the future. This research also evaluated the combined impacts of general technology acceptance theory elements and identity theory in the context of ERMS to support data management. Findings: This study provides an empirically tested model that helps organizations to adopt ERMS based on the influence of big data management. The current study’s findings looked at the concerns of oil and gas organizations about integrating new technologies to support organizational performance. The results demonstrated that individual characteristics of users in oil and gas organizations, in conjunction with administrative features, are robust predictors of ERMS. The results show that ERMS potentiality significantly influences the organizational performance of oil and gas organizations. The research results fit the big ideas about how big data management and ERMS affect respondents to adopt new technologies. Recommendations for Practitioners: This study contributes significantly to the theory and practice of ERMS potentiality and BDM by developing and validating a new framework for adopting ERMS to support the performance and production of oil and gas organizations. The current study adds a new framework to identity theory in the context of ERMS and BDM. It increases the perceived benefits of using ERMS in protecting the credibility and authenticity of electronic records in oil and gas organizations. Recommendation for Researchers: This study serves as a foundation for future research into the function and influence of big data management on ERMS that support the organizational performance. Researchers can examine the framework of this study in other nations in the future, and they will be able to analyze this research framework to compare various results in other countries and expand ERMS generalizability and efficacy. Impact on Society: ERMS and its impact on BDM is still a developing field, and readers of this article can assist in gaining a better understanding of the literature’s dissemination of ERMS adoption in the oil and gas industry. This study presents an experimentally validated model of ERMS adoption with the effect of BDM in the oil and gas industry. Future Research: In the future, researchers may be able to examine the impact of BDM and user technology fit as critical factors in adopting ERMS by using different theories or locations. Furthermore, researchers may include the moderating impact of demographical parameters such as age, gender, wealth, and experience into this study model to make it even more robust and comprehensive. In addition, future research may examine the significant direct correlations between human traits, organizational features, and individual perceptions of BDM that are directly related to ERMS potentiality and operational performance in the future.




stem

Recommendation System for an Online Shopping Pay-Later System Using a Multistage Approach: A Case Study from Indonesia

Aim/Purpose: In this study, we developed a recommendation system model designed to support decision-makers in identifying consumers eligible for pay-later options via consensus-based decision-making. This approach was chosen due to the high and complex risks involved, such as delayed payments, challenges in reaching consumers, and issues of bad credit. Background: The “pay-later” option, which allows consumers to postpone payment for e-commerce purchases, offers convenience and flexibility but also introduces several challenges: (i) by enabling payment deferral, merchants face financial risks, including potential delays or defaults in payment, adversely affecting their cash flow and profitability; and (ii) this payment delay can also heighten the risk of fraud, including identity theft and unauthorized transactions. Methodology: This study initiated a risk analysis utilizing the ROAD process. Considering contemporary economic developments and advancements in neural networks, integrating these networks into risk assessment has become crucial. Consequently, model development involved the amalgamation of three deep learning methods – CNN (Convolutional Neural Networks), RNN (Recurrent Neural Networks), and LSTM (Long Short-Term Memory) – to address various risk alternatives and facilitate multi-stage decision-making recommendations. Contribution: Our primary contribution is threefold. First, our study identified potential consumers by prioritizing those with the smallest associated problem consequence values. Second, we achieved an optimal recall value using a candidate generator. Last, we categorized consumers to assess their eligibility for pay-later rights. Findings: The findings from this study indicate that our multi-stage recommendation model is effective in minimizing the risk associated with consumer debt repayment. This method of consumer selection empowers policymakers to make informed decisions regarding which consumers should be granted pay-later privileges. Recommendations for Practitioners: This recommendation system is proposed to several key parties involved in the development, implementation, and use of pay-later systems. These parties include E-commerce Executive Management for financial analysis and risk evaluation, the Risk Management Team to assess and manage risks related to users utilizing Pay-Later services, and Sales Managers to integrate Pay-Later services into sales strategies. Recommendation for Researchers: Advanced fraud detection mechanisms were implemented to prevent unauthorized transactions effectively. The goal was to cultivate user confidence in the safety of their financial data by ensuring secure payment processing. Impact on Society: Ensuring consumers understand the terms and conditions of pay-later arrangements, including interest rates, repayment schedules, and potential fees, is crucial. Providing clear and transparent information, along with educating consumers about their financial responsibilities, helps prevent misunderstandings and disputes. Future Research: Our future development plans involve the ongoing assessment of the system’s performance to enhance prediction accuracy. This includes updating models and criteria based on feedback and changes in economic or market conditions. Upholding compliance with security and data privacy regulations necessitates the implementation of protective measures to safeguard consumer information. The implementation of such a system requires careful consideration to ensure fairness and adherence to legal standards. Additionally, it is important to acknowledge that algorithms and models may evolve over time through the incorporation of additional data and continuous evaluations.




stem

Barriers of Agile Requirements Engineering in the Public Sector: A Systematic Literature Review

Aim/Purpose: The objective of this study is to summarize the challenges of Agile Requirements Engineering (Agile RE) in the public sector in republican and constitutional monarchy nations. Additionally, it offers recommendations to address these challenges. Background: Failure of IT projects in the public sector results in financial losses for the state and loss of public trust, often attributed to issues in requirements engineering such as prioritization of user needs and excessive scope of requirements. IT projects can have a higher success rate with Agile RE, but there are also drawbacks. Therefore, this study holds significance by presenting a thorough framework designed to pinpoint and overcome the challenges associated with Agile RE to increase the success rate of IT projects. Methodology: This study employs a Systematic Literature Review (SLR) protocol in the field of software engineering or related domains, which consists of three main phases: planning the review, conducting the review with a snowballing approach, and reporting the review. Furthermore, the authors perform open coding to categorize challenges based on the Agile methodologies adoption factor model and axial coding to map potential solutions. Contribution: The authors assert that this research enriches the existing literature on Agile RE, specifically within the public sector context, by mapping out challenges and possible solutions that contribute to creating a foundation for future studies to conduct a more in-depth analysis of Agile adoption in the public sector. Furthermore, it compares the barriers of Agile RE in the public sector with the general context, leading to the discovery of new theories specifically for this field. Findings: Most challenges related to Agile RE in the public sector are found in the people and process aspects. Project and organizational-related are subsequent aspects. Therefore, handling people and processes proficiently is imperative within Agile RE to prevent project failure. Recommendations for Practitioners: Our findings offer a comprehensive view of Agile RE in the public sector in republican and constitutional monarchy nations. This study maps the challenges encountered by the public sector and provides potential solutions. The authors encourage practitioners to consider our findings as a foundation for adopting Agile methodology in the public sector. Furthermore, this study can assist practitioners in identifying existing barriers related to Agile RE, pinpointing elements that contribute to overcoming those challenges, and developing strategies based on the specific needs of the organizations. Recommendation for Researchers: Researchers have the potential to expand the scope of this study by conducting research in other countries, especially African countries, as this study has not yet encompassed this geographic region. Additionally, they can strengthen the evidence linking Agile RE challenges to the risk of Agile project failure by performing empirical validation in a specific country. Impact on Society: This research conducts a comprehensive exploration of Agile RE within the public sector, serving as a foundation for the successful adoption of Agile methodology by overcoming obstacles related to Agile RE. This study highlights the importance of managing people, processes, projects, and organizational elements to increase the success of Agile adoption in the public sector. Future Research: In the future, researchers should work towards resolving the limitations identified in this study. This study has not provided a clear prioritization of challenges and solutions according to their significance. Therefore, future researchers can perform a Fuzzy Analytical Hierarchical Process (F-AHP) to prioritize the proposed solutions.




stem

To be intelligent or not to be? That is the question - reflection and insights about big knowledge systems: definition, model and semantics

This paper aims to share the author's vision on possible research directions for big knowledge-based AI. A renewed definition of big knowledge (BK) and big knowledge systems (BKS) is first introduced. Then the first BKS model, called cloud knowledge social intelligence (CKEI) is provided with a hierarchy of knowledge as a service (KAAS). At last, a new semantics, the big-and-broad step axiomatic structural operational semantics (BBASOS) for applications on BKS is introduced and discussed with a practical distributed BKS model knowledge graph network KGN and a mini example.




stem

Characteristics of industrial service ecosystem practices for industrial renewal

The emergence of service ecosystems can accelerate the industrial renewal required because of urgent global challenges. However, existing research has not sufficiently grasped the social dynamics of coevolution in ecosystems that enhance industrial renewal. This study aimed to advance ecosystem research through a practice lens and to present the key characteristics of industrial service ecosystem practice involved in industrial renewal. Consequently, its three characteristics - <i>accomplishment</i>, <i>attractiveness</i> and <i>actionability</i> - were configured based on an abductive study derived from the ecosystem literature, three practice-oriented approaches to learning, and two case ecosystem examinations. These features created the logic for resource integration and enhanced ecosystems to evolve as units, thus exceeding the actors' independent avenues of renewal. The findings of this study provided a deeper understanding of the coevolution in ecosystems needed to accelerate industrial renewal as well as a novel conceptualisation of an <i>ecosystem-as-practice</i> for further studies.