system Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study By Published On :: 2021-01-18 Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further. Full Article
system A Systematic Literature Review of Business Intelligence Framework for Tourism Organizations: Functions and Issues By Published On :: 2022-10-09 Aim/Purpose: The main goal of this systematic literature review was to look for studies that provide information relevant to business intelligence’s (BI) framework development and implementation in the tourism sector. This paper tries to classify the tourism sectors where BI is implemented, group various BI functionalities, and identify common problems encountered by previous research. Background: There has been an increased need for BI implementation to support decision-making in the tourism sector. Tourism stakeholders such as management of destination, accommodation, transportation, and public administration need a guideline to understand functional requirements before implementation. This paper addresses the problem by comprehensively reviewing the functionalities and issues that need to be considered based on previous business intelligence framework development and implementation in tourism sectors. Methodology: We have conducted a systematic literature review using the Preferred Reporting Items for Systematic Reviews and Guidelines for Meta-Analysis (PRISMA) method. The search is conducted using online academic database platforms, resulting in 543 initial articles published from 2002 to 2022. Contribution: The paper could be of interest to relevant stakeholders in the tourism industry because it provides an overview of the capabilities and limitations of business intelligence for tourism. To our knowledge, this is the first study to identify and classify the BI functionalities needed for tourism sectors and implementation issues related to organizations, people, and technologies that need to be considered. Findings: BI functionalities identified in this study include basic functions such as data analysis, reports, dashboards, data visualization, performance metrics, and key performance indicator, and advanced functions such as predictive analytics, trend indicators, strategic planning tools, profitability analysis, benchmarking, budgeting, and forecasting. When implementing BI, the issues that need to be considered include organizational, people and process, and technological issues. Recommendations for Practitioners: As data is a major issue in BI implementation, tourism stakeholders, especially in developing countries, may need to build a tourism data center or centralized coordination regulated by the government. They can implement basic functions first before implementing more advanced features later. Recommendation for Researchers: We recommend further studying the BI implementation barriers by employing a perspective of an adoption framework such as the technology, organization, and environment (TOE) framework. Impact on Society: This research has a potential impact on improving the tourism industry’s performance by providing insight to stakeholders about what is needed to help them make more accurate decisions using business intelligence. Future Research: Future research may involve collaboration between practitioners and academics in developing various BI architectures specific to each tourism industry, such as destination management, hospitality, or transportation. Full Article
system The Relationship Between Critical Success Factors, Perceived Benefits, and Usage Intention of Mobile Knowledge Management Systems in the Malaysian Semiconductor Industry By Published On :: 2022-10-03 Aim/Purpose: This study examined the relationship between critical success factors (CSFs), perceived benefits, and usage intention of Mobile Knowledge Management Systems (MKMS) via an integrated Technology Acceptance Model (TAM) and Information Systems Success Model (ISSM). Background: This study investigates the CSFs (i.e., Strategic Leadership, Employee Training, System Quality, and Information Quality) that impact the usage intention of KMS in mobile contexts which have been neglected. Since users normally consider the usefulness belief in a system before usage, this study examines the role of perceived benefits as a mediator between the CSFs and usage intention. Methodology: A survey-based research approach in the Malaysian semiconductor industry was employed via an integrated model of TAM and ISSM. At a response rate of 59.52%, the findings of this study were based on 375 usable responses. The data collected was analyzed using the Partial Least Squares with SmartPLS 3.0. Contribution: This study contributes to the body of knowledge in the areas of mobile technology acceptance and knowledge management. Specifically, it helps to validate the integrated model of TAM and ISSM with the CSFs from knowledge management and information system. In addition, it provides the would-be adopters of MKMS with valuable guidelines and insights to consider before embarking on the adoption stage. Findings: The findings suggest that Employee Training and Information Quality have a positive significant relationship with Perceived MKMS Benefits. On the contrary, Strategic Leadership, System Quality, and Perceived User-friendliness showed an insignificant relationship with Perceived MKMS Benefits. Additionally, Employee Training and Information Quality have an indirect relationship with MKMS Usage Intention which is mediated by Perceived MKMS Benefits. Recommendations for Practitioners: The findings are valuable for managers, engineers, KM practitioners, KM consultants, MKMS developers, and mobile device producers to enhance MKMS usage intention. Recommendation for Researchers: Researchers would be able to conduct more inter-disciplinary studies to better understand the relevant issues concerning both fields – knowledge management and mobile computing disciplines. Additionally, the mediation effect of TAM via Perceived Usefulness (i.e., perceived MKMS benefits) on usage intention of MKMS should be further investigated with other CSFs. Future Research: Future studies could perhaps include other critical factors from both KM and IS as part of the external variables. Furthermore, Perceived Ease of Use (i.e., Perceived User-friendly) should be tested as a mediator in the future, together with Perceived Usefulness (i.e., perceived MKMS Benefits) to compare which would be a more powerful predictor of usage intention. Moreover, it may prove interesting to find out how the research framework would fit into other industries to verify the findings of this study for better accuracy and generalizability. Full Article
system Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems By Published On :: 2022-07-26 Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed. Full Article
system The International Case for Micro-Credentials for Life-Wide And Life-Long Learning: A Systematic Literature Review By Published On :: 2022-05-01 Aim/Purpose: Systematic literature reviews seek to locate all studies that contain material of relevance to a research question and to synthesize the relevant outcomes of those studies. The primary aim of this paper was to synthesize both research and practice reports on micro-credentials (MCRs). Background: There has been an increase in reports and research on the plausibility of MCRs to support dynamic human skills development for an increasingly impatient and rapidly changing digital world. The integration of fast-paced emerging technologies and digitalization necessitate alternative learning paradigms. MCRs offer time, financial, and space flexibility and can be stacked into a larger qualification, thereby allowing for a broader range of transdisciplinary competencies within a qualification. However, MCRs often lack the academic rigor required for accreditation within existing disciplines. Methodology: The study followed the PRISMA framework (Preferred Reporting Items for Systematic Reviews and Meta Analyses), which offers a rigorous method to enhance reporting quality. The study used both academic research and practice reports. Contribution: The paper makes a theoretical contribution to the discourse about the need for innovation within existing educational paradigms for continued relevance in a changing world. It also contributes to the debate on the role of MCRs in bridging the gap between practice and academia despite the growing difference between their interests, and the role that MCRs play in the social-economic plans of countries. Findings: The key findings are that investments in MCRs are mainly in the Science, Technology, Engineering and Mathematics (STEM) and Education sectors, and have taken place mainly in high-income countries and regions – contexts that particularly value practice-accredited MCRs. Low-income countries, by contrast, remain traditional and insist on MCRs that are formally accredited by a recognized academic institution. This contributes to a widening skills gap between low- and high-income countries or regions, which results in greater global disparities. There is also a growing divide between academia and practice concerning their interest in MCRs (a reflection of the rigor versus relevance debate), which partially explains why many global and larger organizations have gone on to create their own learning institutions. Recommendations for Practitioners: We recommend that educational mechanisms consider the critical importance of MCRs as part of innovative efforts for life-wide (different sectors) and life-long (same sector) learning, especially in low-income countries. MCRs provide dynamic mechanisms to fill skills gaps in an increasing ruthless international battle for talent. Recommendation for Researchers: We recommend focused research into skills and career pathways using MCRs while at the same time remaining responsive to transdisciplinary efforts and sensitive to global and local changes within any sector. Impact on Society: Work and society have transformed over time, and more so in the new digital age, yet academia has been slow in adapting to the changes, forcing organizations to create their own learning institutions or to use MCRs to fill the skills gap. The purpose of education goes beyond preparing individuals for work, extending further to creating an environment where individuals and governments seek their own social and economic outcomes. MCRs provide a flexible means for co-creation between individuals, education, organizations, and government that could stem global rising unemployment, social exclusion, and redundancy. Future Research: Future research should focus on the co-creation of MCRs between practitioners and academia. Full Article
system Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review By Published On :: 2023-12-26 Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process. Full Article
system Maternal Recommender System Systematic Literature Review: State of the Art and Future Studies By Published On :: 2023-11-25 Aim/Purpose: This paper illustrates the potential of health recommender systems (HRS) to support and enhance maternal care. The study aims to explore the recent implementations of maternal HRS and to discover the challenges of the implementations. Background: The sustainable development goals (SDG) aim to reduce maternal mortality to less than 70 per 100,000 live births by 2030. However, progress is uneven between countries, with primary causes being severe bleeding, infections, high blood pressure, and failed abortions. Regular antenatal care (ANC) visits are crucial for detecting and managing complications, such as hypertensive illnesses, anemia, and gestational diabetes mellitus. Utilizing maternal evaluations during ANC visits can help identify and treat problems early, lowering morbidity and death rates for both mothers and fetuses. Technology-enabled daily health recording can help monitor pregnancy by providing actionable guides to patients and health workers based on patient status. Methodology: A systematic literature review was conducted using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) to identify maternal HRS reported in studies between November 2022 and December 2022. Information was subsequently extracted to understand the potential benefits of maternal HRS. Titles and abstracts of 1,851 studies were screened for the full-text screening, in which two reviewers independently selected articles and systematically extracted data using a predefined extraction form. Contribution: This study adds to the explorations of the challenges of implementing HRS for maternal care. This study also emphasizes the significance of explainability, data-driven methodologies, automation, and the necessity for integration and interoperability in the creation and deployment of health recommendation systems for maternity care. Findings: The majority of maternal HRS use a knowledge-based (constraint-based) ap-proach with more than half of the studies generating recommendations based on rules defined by experts or available guidelines. We also derived four types of interfaces that can be used for delivering recommendations. Moreover, patient health records as data sources can hold data from patients’ or health workers’ input or directly from the measurement devices. Finally, the number of studies in the pilot or demonstration stage is twice that in the sustained stages. We also discovered crucial challenges where the explainability of the methods was needed to ensure trustworthiness, comprehensibility, and effective enhancement of the decision-making process. Automatic data collection was also required to avoid complexity and reduce workload. Other obstacles were also identified where data integration between systems should be established and decent connectivity must be provided so that complete services can be admin-istered. Lastly, sustainable operations would depend on the availability of standards for integration and interoperability as well as sufficient financial sup-port. Recommendations for Practitioners: Developers of maternal HRS should consider including the system in the main healthcare system, providing connectivity, and automation to deliver better service and prevent maternal risks. Regulations should also be established to support the scale-up. Recommendation for Researchers: Further research is needed to do a thorough comparison of the recommendation techniques used in maternal HRS. Researchers are also recommended to explore more on this topic by adding more research questions. Impact on Society: This study highlights the lack of sustainability studies, the potential for scaling up, and the necessity for a comprehensive strategy to integrate the maternal recommender system into the larger maternal healthcare system. Researchers can enhance and improve health recommendation systems for maternity care by focusing on these areas, which will ultimately increase their efficacy and facilitate clinical practice integration. Future Research: Additional research can concentrate on creating and assessing methods to increase the explainability and interpretability of data-driven health recommender systems and integrating automatic measurement into the traditional health recommender system to enhance the anticipated outcome of antenatal care. Comparative research can also be done to assess how well various models or algorithms utilized in these systems function. Future research can also examine creative solutions to address resource, infrastructure, and technological constraints, such as connectivity and automation to help address the shortage of medical personnel in remote areas, as well as define tactics for long-term sustainability and integration into current healthcare systems. Full Article
system A Novel Telecom Customer Churn Analysis System Based on RFM Model and Feature Importance Ranking By Published On :: 2023-10-03 Aim/Purpose: In this paper, we present an RFM model-based telecom customer churn system for better predicting and analyzing customer churn. Background: In the highly competitive telecom industry, customer churn is an important research topic in customer relationship management (CRM) for telecom companies that want to improve customer retention. Many researchers focus on a telecom customer churn analysis system to find out the customer churn factors for improving prediction accuracy. Methodology: The telecom customer churn analysis system consists of three main parts: customer segmentation, churn prediction, and churn factor identification. To segment the original dataset, we use the RFM model and K-means algorithm with an elbow method. We then use RFM-based feature construction for customer churn prediction, and the XGBoost algorithm with SHAP method to obtain a feature importance ranking. We chose an open-source customer churn dataset that contains 7,043 instances and 21 features. Contribution: We present a novel system for churn analysis in telecom companies, which encompasses customer churn prediction, customer segmentation, and churn factor analysis to enhance business strategies and services. In this system, we leverage customer segmentation techniques for feature construction, which enables the new features to improve the model performance significantly. Our experiments demonstrate that the proposed system outperforms current advanced customer churn prediction methods in the same dataset, with a higher prediction accuracy. The results further demonstrate that this churn analysis system can help telecom companies mine customer value from the features in a dataset, identify the primary factors contributing to customer churn, and propose suitable solution strategies. Findings: Simulation results show that the K-means algorithm gets better results when the original dataset is divided into four groups, so the K value is selected as 4. The XGBoost algorithm achieves 79.3% and 81.05% accuracy on the original dataset and new data with RFM, respectively. Additionally, each cluster has a unique feature importance ranking, allowing for specialized strategies to be provided to each cluster. Overall, our system can help telecom companies implement effective CRM and marketing strategies to reduce customer churn. Recommendations for Practitioners: More accurate churn prediction reduces misjudgment of customer churn. The acquisition of customer churn factors makes the company more convenient to analyze the reasons for churn and formulate relevant conservation strategies. Recommendation for Researchers: The research achieves 81.05% accuracy for customer churn prediction with the Xgboost and RFM algorithms. We believe that more enhancements algorithms can be attempted for data preprocessing for better prediction. Impact on Society: This study proposes a more accurate and competitive customer churn system to help telecom companies conserve the local markets and reduce capital outflows. Future Research: The research is also applicable to other fields, such as education, banking, and so forth. We will make more new attempts based on this system. Full Article
system How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia By Published On :: 2023-09-07 Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors. Full Article
system Unveiling Roadblocks and Mapping Solutions for Blockchain Adoption by Governments: A Systematic Literature Review By Published On :: 2023-09-04 Aim/Purpose: Blockchain technology (BCT) has emerged as a potential catalyst for transforming government institutions and services, yet the adoption of blockchain in governments faces various challenges, for which previous studies have yet to provide practical solutions. Background: This study aims to identify and analyse barriers, potential solutions, and their relations in implementing BC for governments through a systematic literature review (SLR). The authors grouped the challenges based on the Technology-Organisation-Environment (TOE) framework while exercising a thematic grouping for the solutions, followed by a comprehensive mapping to unveil the relationship between challenges and solutions. Methodology: This study employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology, combined with the tollgate method, to improve the quality of selected articles. The authors further administer a three-level approach (open coding, axial coding, and selective coding) to analyse the challenges and solutions from the articles. Contribution: The authors argue that this study enriches the existing literature on BC adoption, particularly in the government context, by providing a comprehensive framework to analyse and address the unique challenges and solutions, thus contributing to the development of new theories and models for future research in BC adoption in government settings and fostering deeper exploration in the field. Findings: The authors have unveiled 40 adoption challenges categorised using the TOE framework. The most prevalent technological challenges include security concerns and integration & interoperability, while cultural resistance, lack of support and involvement, and employees’ capability hinder adoption at the organisational level. Notably, the environmental dimension lacks legal and standard frameworks. The study further unveils 28 potential solutions, encompassing legal frameworks, security and privacy measures, collaboration and governance, technological readiness and infrastructure, and strategic planning and adoption. The authors of the study have further mapped the solutions to the identified challenges, revealing that the establishment of legal frameworks stands out as the most comprehensive solution. Recommendations for Practitioners: Our findings provide a big picture regarding BC adoption for governments around the globe. This study charts the problems commonly encountered by government agencies and presents proven solutions in their wake. The authors endeavour practitioners, particularly those in governments, to embrace our findings as the cornerstone of BC/BCT adoption. These insights can aid practitioners in identifying existing or potential obstacles in adopting BC, pinpointing success factors, and formulating strategies tailored to their organisations. Recommendation for Researchers: Researchers could extend this study by making an in-depth analysis of challenges or solutions in specific types of countries, such as developed and developing countries, as the authors believe this approach would yield more insights. Researchers could also test, validate, and verify the mapping in this study to improve the quality of the study further and thus can be a great aid for governments to adopt BC/BCT fully. Impact on Society: This study provides a comprehensive exploration of BC adoption in the government context, offering detailed explanations and valuable insights that hold significant value for government policymakers and decision-makers, serving as a bedrock for successful implementation by addressing roadblocks and emphasising the importance of establishing a supportive culture and structure, engaging stakeholders, and addressing security and privacy concerns, ultimately enhancing the efficiency and effectiveness of BC adoption in government institutions and services. Future Research: Future research should address the limitations identified in this study by expanding the scope of the literature search to include previously inaccessible sources and exploring alternative frameworks to capture dynamic changes and contextual factors in BC adoption. Additionally, rigorous scrutiny, review, and testing are essential to establish the practical and theoretical validity of the identified solutions, while in-depth analyses of country-specific and regional challenges will provide valuable insights into the unique considerations faced by different governments. Full Article
system Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE By Published On :: 2023-07-25 Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users. Full Article
system Medicine Recommender System Based on Semantic and Multi-Criteria Filtering By Published On :: 2023-07-21 Aim/Purpose: This study aims to devise a personalized solution for online healthcare platforms that can alleviate problems arising from information overload and data sparsity by providing personalized healthcare services to patients. The primary focus of this paper is to develop an effective medicine recommendation approach for recommending suitable medications to patients based on their specific medical conditions. Background: With a growing number of people becoming more conscious about their health, there has been a notable increase in the use of online healthcare platforms and e-services as a means of diagnosis. As the internet continues to evolve, these platforms and e-services are expected to play an even more significant role in the future of healthcare. For instance, WebMD and similar platforms offer valuable tools and information to help manage patients’ health, such as searching for medicines based on their medical conditions. Nonetheless, patients often find it arduous and time-consuming to sort through all the available medications to find the ones that match their specific medical conditions. To address this problem, personalized recommender systems have emerged as a practical solution for mitigating the burden of information overload and data sparsity-related issues that are frequently encountered on online healthcare platforms. Methodology: The study utilized a dataset of MC ratings obtained from WebMD, a popular healthcare website. Patients on this website can rate medications based on three criteria, including medication effectiveness, ease of use, and satisfaction, using a scale of 1 to 5. The WebMD MC rating dataset used in this study contains a total of 32,054 ratings provided by 2,136 patients for 845 different medicines. The proposed HSMCCF approach consists of two primary modules: a semantic filtering module and a multi-criteria filtering module. The semantic filtering module is designed to address the issues of data sparsity and new item problems by utilizing a medicine taxonomy that sorts medicines according to medical conditions and makes use of semantic relationships between them. This module identifies the medicines that are most likely to be relevant to patients based on their current medical conditions. The multi-criteria filtering module, on the other hand, enhances the approach’s ability to capture the complexity of patient preferences by considering multiple criteria and preferences through a unique similarity metric that incorporates both distance and structural similarities. This module ensures that patients receive more accurate and personalized medication recommendations. Moreover, a medicine reputation score is employed to ensure that the approach remains effective even when dealing with limited ratings or new items. Overall, the combination of these modules makes the proposed approach more robust and effective in providing personalized medicine recommendations for patients. Contribution: This study addresses the medicine recommendation problem by proposing a novel approach called Hybrid Semantic-based Multi-Criteria Collaborative Filtering (HSMCCF). This approach effectively recommends medications for patients based on their medical conditions and is specifically designed to overcome issues related to data sparsity and new item recommendations that are commonly encountered on online healthcare platforms. The proposed approach addresses data sparsity and new item issues by incorporating a semantic filtering module and a multi-criteria filtering module. The semantic filtering module sorts medicines based on medical conditions and uses semantic relationships to identify relevant ones. The multi-criteria filtering module accurately captures patient preferences and provides precise recommendations using a novel similarity metric. Additionally, a medicine reputation score is also employed to further expand potential neighbors, improving predictive accuracy and coverage, particularly in sparse datasets or new items with few ratings. With the HSMCCF approach, patients can receive more personalized recommendations that are tailored to their unique medical needs and conditions. By leveraging a combination of semantic-based and multi-criteria filtering techniques, the proposed approach can effectively address the challenges associated with medicine recommendations on online healthcare platforms. Findings: The proposed HSMCCF approach demonstrated superior effectiveness compared to benchmark recommendation methods in multi-criteria rating datasets in terms of enhancing both prediction accuracy and coverage while effectively addressing data sparsity and new item challenges. Recommendations for Practitioners: By applying the proposed medicine recommendation approach, practitioners can develop a medicine recommendation system that can be integrated into online healthcare platforms. Patients can then utilize this system to make better-informed decisions regarding the medications that are most suitable for their specific medical conditions. This personalized approach to medication recommendations can ultimately lead to improved patient satisfaction. Recommendation for Researchers: Integrating patient medicine reviews is a promising way for researchers to elevate the proposed medicine recommendation approach. By leveraging patient reviews, the approach can gain a more comprehensive understanding of how certain medications perform for specific medical conditions. Additionally, exploring the relationship between MC-based ratings using an improved aggregation function can potentially enhance the accuracy of medication predictions. This involves analyzing the relationship between different criteria, such as medication effectiveness, ease of use, and satisfaction of the patients, and determining the optimal weighting for each criterion based on patient feedback. A more holistic approach that incorporates patient reviews and an improved aggregation function can enable the proposed medicine recommendation approach to provide more personalized and accurate recommendations to patients. Impact on Society: To mitigate the risk of infection during the COVID-19 pandemic, the promotion of online healthcare services was actively encouraged. This allowed patients to continue accessing care and receiving treatment while adhering to physical distancing guidelines and shielding measures where necessary. As a result, the implementation of personalized healthcare services for patients is expected to be a major disruptive force in healthcare in the coming years. This study proposes a personalized medicine recommendation approach that can effectively address this issue and aid patients in making informed decisions about the medications that are most suitable for their specific medical conditions. Future Research: One way that may enhance the proposed medicine recommendation approach is to incorporate patient medicine reviews. Furthermore, the analysis of MC-based ratings using an improved aggregation function can also potentially enhance the accuracy of medication predictions. Full Article
system The Influence of COVID-19 on Employees’ Use of Organizational Information Systems By Published On :: 2023-06-27 Aim/Purpose. COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background. To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap. Methodology. The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests. Contribution. Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT). Findings. More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work. Recommendations for Practitioners. In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations. Recommendations for Researchers. Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”. Impact on Society. The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change. Future Research. We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis. Full Article
system A Model Predicting Student Engagement and Intention with Mobile Learning Management Systems By Published On :: 2023-04-25 Aim/Purpose: The aim of this study is to develop and evaluate a comprehensive model that predicts students’ engagement with and intent to continue using mobile-Learning Management Systems (m-LMS). Background: m-LMS are increasingly popular tools for delivering course content in higher education. Understanding the factors that affect student engagement and continuance intention can help educational institutions to develop more effective and user-friendly m-LMS platforms. Methodology: Participants with prior experience with m-LMS were employed to develop and evaluate the proposed model that draws on the Technology Acceptance Model (TAM), Task-Technology Fit (TTF), and other related models. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the model. Contribution: The study provides a comprehensive model that takes into account a variety of factors affecting engagement and continuance intention and has a strong predictive capability. Findings: The results of the study provide evidence for the strong predictive capability of the proposed model and supports previous research. The model identifies perceived usefulness, perceived ease of use, interactivity, compatibility, enjoyment, and social influence as factors that significantly influence student engagement and continuance intention. Recommendations for Practitioners: The findings of this study can help educational institutions to effectively meet the needs of students for interactive, effective, and user-friendly m-LMS platforms. Recommendation for Researchers: This study highlights the importance of understanding the antecedents of students’ engagement with m-LMS. Future research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability. Impact on Society: The engagement model can help educational institutions to understand how to improve student engagement and continuance intention with m-LMS, ultimately leading to more effective and efficient mobile learning. Future Research: Additional research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability. Full Article
system The Influence of Big Data Management on Organizational Performance in Organizations: The Role of Electronic Records Management System Potentiality By Published On :: 2023-01-28 Aim/Purpose: The use of digital technology, such as an electronic records management system (ERMS), has prompted widespread changes across organizations. The organization needs to support its operations with an automation system to improve production performance. This study investigates ERMS’s potentiality to enhance organizational performance in the oil and gas industry. Background: Oil and gas organizations generate enormous electronic records that lead to difficulties in managing them without any system or digitalization procedure. The need to use a system to manage big data and records affects information security and creates several problems. This study supports decision-makers in oil and gas organizations to use ERMS to enhance organizational performance. Methodology: We used a quantitative method by integrating the typical partial least squares (SEM-PLS) approach, including measurement items, respondents’ demographics, sampling and collection of data, and data analysis. The SEM-PLS approach uses a measurement and structural model assessment to analyze data. Contribution: This study contributes significantly to theory and practice by providing advancements in identity theory in the context of big data management and electronic records management. This study is a foundation for further research on the role of ERMS in operations performance and Big Data Management (BDM). This research makes a theoretical contribution by studying a theory-driven framework that may serve as an essential lens to evaluate the role of ERMS in performance and increase its potentiality in the future. This research also evaluated the combined impacts of general technology acceptance theory elements and identity theory in the context of ERMS to support data management. Findings: This study provides an empirically tested model that helps organizations to adopt ERMS based on the influence of big data management. The current study’s findings looked at the concerns of oil and gas organizations about integrating new technologies to support organizational performance. The results demonstrated that individual characteristics of users in oil and gas organizations, in conjunction with administrative features, are robust predictors of ERMS. The results show that ERMS potentiality significantly influences the organizational performance of oil and gas organizations. The research results fit the big ideas about how big data management and ERMS affect respondents to adopt new technologies. Recommendations for Practitioners: This study contributes significantly to the theory and practice of ERMS potentiality and BDM by developing and validating a new framework for adopting ERMS to support the performance and production of oil and gas organizations. The current study adds a new framework to identity theory in the context of ERMS and BDM. It increases the perceived benefits of using ERMS in protecting the credibility and authenticity of electronic records in oil and gas organizations. Recommendation for Researchers: This study serves as a foundation for future research into the function and influence of big data management on ERMS that support the organizational performance. Researchers can examine the framework of this study in other nations in the future, and they will be able to analyze this research framework to compare various results in other countries and expand ERMS generalizability and efficacy. Impact on Society: ERMS and its impact on BDM is still a developing field, and readers of this article can assist in gaining a better understanding of the literature’s dissemination of ERMS adoption in the oil and gas industry. This study presents an experimentally validated model of ERMS adoption with the effect of BDM in the oil and gas industry. Future Research: In the future, researchers may be able to examine the impact of BDM and user technology fit as critical factors in adopting ERMS by using different theories or locations. Furthermore, researchers may include the moderating impact of demographical parameters such as age, gender, wealth, and experience into this study model to make it even more robust and comprehensive. In addition, future research may examine the significant direct correlations between human traits, organizational features, and individual perceptions of BDM that are directly related to ERMS potentiality and operational performance in the future. Full Article
system Recommendation System for an Online Shopping Pay-Later System Using a Multistage Approach: A Case Study from Indonesia By Published On :: 2024-08-29 Aim/Purpose: In this study, we developed a recommendation system model designed to support decision-makers in identifying consumers eligible for pay-later options via consensus-based decision-making. This approach was chosen due to the high and complex risks involved, such as delayed payments, challenges in reaching consumers, and issues of bad credit. Background: The “pay-later” option, which allows consumers to postpone payment for e-commerce purchases, offers convenience and flexibility but also introduces several challenges: (i) by enabling payment deferral, merchants face financial risks, including potential delays or defaults in payment, adversely affecting their cash flow and profitability; and (ii) this payment delay can also heighten the risk of fraud, including identity theft and unauthorized transactions. Methodology: This study initiated a risk analysis utilizing the ROAD process. Considering contemporary economic developments and advancements in neural networks, integrating these networks into risk assessment has become crucial. Consequently, model development involved the amalgamation of three deep learning methods – CNN (Convolutional Neural Networks), RNN (Recurrent Neural Networks), and LSTM (Long Short-Term Memory) – to address various risk alternatives and facilitate multi-stage decision-making recommendations. Contribution: Our primary contribution is threefold. First, our study identified potential consumers by prioritizing those with the smallest associated problem consequence values. Second, we achieved an optimal recall value using a candidate generator. Last, we categorized consumers to assess their eligibility for pay-later rights. Findings: The findings from this study indicate that our multi-stage recommendation model is effective in minimizing the risk associated with consumer debt repayment. This method of consumer selection empowers policymakers to make informed decisions regarding which consumers should be granted pay-later privileges. Recommendations for Practitioners: This recommendation system is proposed to several key parties involved in the development, implementation, and use of pay-later systems. These parties include E-commerce Executive Management for financial analysis and risk evaluation, the Risk Management Team to assess and manage risks related to users utilizing Pay-Later services, and Sales Managers to integrate Pay-Later services into sales strategies. Recommendation for Researchers: Advanced fraud detection mechanisms were implemented to prevent unauthorized transactions effectively. The goal was to cultivate user confidence in the safety of their financial data by ensuring secure payment processing. Impact on Society: Ensuring consumers understand the terms and conditions of pay-later arrangements, including interest rates, repayment schedules, and potential fees, is crucial. Providing clear and transparent information, along with educating consumers about their financial responsibilities, helps prevent misunderstandings and disputes. Future Research: Our future development plans involve the ongoing assessment of the system’s performance to enhance prediction accuracy. This includes updating models and criteria based on feedback and changes in economic or market conditions. Upholding compliance with security and data privacy regulations necessitates the implementation of protective measures to safeguard consumer information. The implementation of such a system requires careful consideration to ensure fairness and adherence to legal standards. Additionally, it is important to acknowledge that algorithms and models may evolve over time through the incorporation of additional data and continuous evaluations. Full Article
system Barriers of Agile Requirements Engineering in the Public Sector: A Systematic Literature Review By Published On :: 2024-03-28 Aim/Purpose: The objective of this study is to summarize the challenges of Agile Requirements Engineering (Agile RE) in the public sector in republican and constitutional monarchy nations. Additionally, it offers recommendations to address these challenges. Background: Failure of IT projects in the public sector results in financial losses for the state and loss of public trust, often attributed to issues in requirements engineering such as prioritization of user needs and excessive scope of requirements. IT projects can have a higher success rate with Agile RE, but there are also drawbacks. Therefore, this study holds significance by presenting a thorough framework designed to pinpoint and overcome the challenges associated with Agile RE to increase the success rate of IT projects. Methodology: This study employs a Systematic Literature Review (SLR) protocol in the field of software engineering or related domains, which consists of three main phases: planning the review, conducting the review with a snowballing approach, and reporting the review. Furthermore, the authors perform open coding to categorize challenges based on the Agile methodologies adoption factor model and axial coding to map potential solutions. Contribution: The authors assert that this research enriches the existing literature on Agile RE, specifically within the public sector context, by mapping out challenges and possible solutions that contribute to creating a foundation for future studies to conduct a more in-depth analysis of Agile adoption in the public sector. Furthermore, it compares the barriers of Agile RE in the public sector with the general context, leading to the discovery of new theories specifically for this field. Findings: Most challenges related to Agile RE in the public sector are found in the people and process aspects. Project and organizational-related are subsequent aspects. Therefore, handling people and processes proficiently is imperative within Agile RE to prevent project failure. Recommendations for Practitioners: Our findings offer a comprehensive view of Agile RE in the public sector in republican and constitutional monarchy nations. This study maps the challenges encountered by the public sector and provides potential solutions. The authors encourage practitioners to consider our findings as a foundation for adopting Agile methodology in the public sector. Furthermore, this study can assist practitioners in identifying existing barriers related to Agile RE, pinpointing elements that contribute to overcoming those challenges, and developing strategies based on the specific needs of the organizations. Recommendation for Researchers: Researchers have the potential to expand the scope of this study by conducting research in other countries, especially African countries, as this study has not yet encompassed this geographic region. Additionally, they can strengthen the evidence linking Agile RE challenges to the risk of Agile project failure by performing empirical validation in a specific country. Impact on Society: This research conducts a comprehensive exploration of Agile RE within the public sector, serving as a foundation for the successful adoption of Agile methodology by overcoming obstacles related to Agile RE. This study highlights the importance of managing people, processes, projects, and organizational elements to increase the success of Agile adoption in the public sector. Future Research: In the future, researchers should work towards resolving the limitations identified in this study. This study has not provided a clear prioritization of challenges and solutions according to their significance. Therefore, future researchers can perform a Fuzzy Analytical Hierarchical Process (F-AHP) to prioritize the proposed solutions. Full Article
system To be intelligent or not to be? That is the question - reflection and insights about big knowledge systems: definition, model and semantics By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 This paper aims to share the author's vision on possible research directions for big knowledge-based AI. A renewed definition of big knowledge (BK) and big knowledge systems (BKS) is first introduced. Then the first BKS model, called cloud knowledge social intelligence (CKEI) is provided with a hierarchy of knowledge as a service (KAAS). At last, a new semantics, the big-and-broad step axiomatic structural operational semantics (BBASOS) for applications on BKS is introduced and discussed with a practical distributed BKS model knowledge graph network KGN and a mini example. Full Article
system Characteristics of industrial service ecosystem practices for industrial renewal By www.inderscience.com Published On :: 2024-04-30T23:20:50-05:00 The emergence of service ecosystems can accelerate the industrial renewal required because of urgent global challenges. However, existing research has not sufficiently grasped the social dynamics of coevolution in ecosystems that enhance industrial renewal. This study aimed to advance ecosystem research through a practice lens and to present the key characteristics of industrial service ecosystem practice involved in industrial renewal. Consequently, its three characteristics - <i>accomplishment</i>, <i>attractiveness</i> and <i>actionability</i> - were configured based on an abductive study derived from the ecosystem literature, three practice-oriented approaches to learning, and two case ecosystem examinations. These features created the logic for resource integration and enhanced ecosystems to evolve as units, thus exceeding the actors' independent avenues of renewal. The findings of this study provided a deeper understanding of the coevolution in ecosystems needed to accelerate industrial renewal as well as a novel conceptualisation of an <i>ecosystem-as-practice</i> for further studies. Full Article
system Perceived service process in e-service delivery system: B2C online retailers performance ranking by TOPSIS By www.inderscience.com Published On :: 2024-04-30T23:20:50-05:00 Significant work in service domain has focused on customer journey within e-service delivery system process (e-SDSP). Few studies have focused on process-centric approach to customer journey during delivery of e-services. This study aims to investigate the performance assessment of three online retailers (alternatives) using perceived service process during different stages of e-SDSP as a criterion for decision-making. TOPSIS is used in this paper to rate and evaluate multiple online retailers. Based on perceived service process as the criterion, results show that online retailer-2 outperforms other two online retailers. This study is one of the first to rate online retailers by utilising customer-perceived service process (latent variables) as a decision-making criterion throughout e-SDSP. The finding suggests that perceived searching process is the most essential criterion for decision-making, followed by the perceived after-sales service process, the perceived agreement process, and the perceived fulfilment process. Implications, limitations, and future scope are also discussed. Full Article
system Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems By Published On :: Full Article
system Learning Objects: Using Language Structures to Understand the Transition from Affordance Systems to Intelligent Systems By Published On :: Full Article
system Applying a System Development Approach to Translate Educational Requirements into E-Learning By Published On :: Full Article
system Contextual Inquiry: A Systemic Support for Student Engagement through Reflection By Published On :: Full Article
system Ontology-Driven E-Learning System Based on Roles and Activities for Thai Learning Environment By Published On :: Full Article
system A Systems Engineering Analysis Method for the Development of Reusable Computer-Supported Learning Systems By Published On :: Full Article
system Beyond Adoption: Barriers to an Online Assignment Submission System Continued Use By Published On :: Full Article
system Not as Easy as E-Mail: Tutors' Perspective of an Online Assignment Submission System By Published On :: Full Article
system Implementing Technological Change at Schools: The Impact of Online Communication with Families on Teacher Interactions through Learning Management System By Published On :: Full Article
system Learning Object Systems and Strategy: A Description and Discussion By Published On :: Full Article
system Development and Validation of a Model to Investigate the Impact of Individual Factors on Instructors’ Intention to Use E-learning Systems By Published On :: Full Article
system Nurturing a Community of Practice through a Collaborative Design of Lesson Plans on a Wiki System By Published On :: Full Article
system Learning about Ecological Systems by Constructing Qualitative Models with DynaLearn By Published On :: Full Article
system Quantitative Aspects about the Interactions of Professors in the Learning Management System during a Final Undergraduate Project Distance Discipline By Published On :: Full Article
system What are the Relationships between Teachers’ Engagement with Management Information Systems and Their Sense of Accountability? By Published On :: Full Article
system Matching Office Information Systems (OIS) Curriculum To Relevant Standards: Students, School Mission, Regional Business Needs, and National Curriculum By Published On :: Full Article
system Conceptions of an Information System and Their Use in Teaching about IS By Published On :: Full Article
system Informing Clientele through Networked Multimedia Information Systems: Introduction to the Special Issues By Published On :: Full Article
system Teaching Information Quality in Information Systems Undergraduate Education By Published On :: Full Article
system Building an Internet-Based Learning Environment in Higher Education: Learner Informing Systems and the Life Cycle Approach By Published On :: Full Article
system Toward A Methodology For Managing Information Systems Implementation: A Social Constructivist Perspective By Published On :: Full Article
system The Value of Information Systems Teaching and Research in the Knowledge Society By Published On :: Full Article
system Knowledge Management Systems: A Comparison of Law Firms and Consulting Firms By Published On :: Full Article
system Do We Need to Impose More Regulation Upon the World Wide Web? -A Metasystem Analysis By Published On :: Full Article
system Information Systems Executives: The Changing Role of New IS/IT Leaders By Published On :: Full Article
system An Action-Oriented Perspective of Information Systems in Organizations By Published On :: Full Article
system Differences in Stage of Integration between Business Planning and Information Systems Planning according to Value Configurations By Published On :: Full Article