ndo

Dazzling Light Festivals To See In London: Winter 2024

Light tunnels, fire gardens and lasers.




ndo

Why Does The City Of London Cross Some Bridges And Not Others?

Boundary anomalies, ahoy!




ndo

Best Of Londonist: 4-10 November 2024

All our best articles from the past week.






ndo

Things To Do This Weekend In London: 16-17 November 2024

A cheese market, new illuminations and a literature festival.




ndo

Free And Cheap Things To Do In London This Week: 11-17 November 2024

Things to do for a fiver or less.



  • London
  • Free & Cheap
  • free and cheap events
  • free and cheap
  • LONDON ON A BUDGET



ndo

Hyde Park Winter Wonderland 2024: A Guide To Visiting London's Huge Christmas Festival

When to go, what to see and how to save money.



  • London
  • Christmas in London
  • Winter Wonderland
  • christmas in London
  • HYDE PARK WINTER WONDERLAND
  • LONDON AT CHRISTMAS
  • WINTER WONDERLAND HYDE PARK
  • WINTER WONDERLAND TICKETS
  • WINTER WONDERLAND MAP
  • 2024
  • CHRISTMAS 2024

ndo

Festive Film Screenings: Where To Watch Christmas Movies In London This Year

Pop-up cinemas screening Christmas classics.





ndo

Is Nintendo Switch 2 about to be announced? Instagram lowers quality of less popular videos

The internet is still convinced a Nintendo Switch 2 announcement is going to happen this month, as a part of a major third-party open world game is also rumoured. It’ll […]

The post Is Nintendo Switch 2 about to be announced? Instagram lowers quality of less popular videos appeared first on ShinyShiny.




ndo

London 2012: Will the Olympics bring more prostitutes?

It's a well-known rule in journalism that if the headline asks a question, the answer is invariably "no". So to see the question above on this blog will probably not surprise you.

What might surprise you is to learn it was also the headline of a prominently-featured article on the BBC website yesterday. Of course, as is the current fad, when they say "prostitutes" they mean "trafficking", and vice-versa.

It's been long known that there is no connection between major international sporting events such as the Olympics, the World Cup, and sex trafficking. But don't take my word for it. Take the word of the London School of Hygiene and Tropical Medicine, who hosted a meeting on this very topic earlier this year. Take the word of the Global Alliance Against Traffic in Women, who produced a must-read report (pdf) on the actual effects of sports events on human trafficking. Go check out Laura Agustin's excellent summary too.

The facts:

• 2010 World Cup, South Africa: the Department of Justice and Constitutional Development did not find a single case of trafficking over the Olympics time period.

• 2010 Olympics, Canada: no evidence of trafficking and sex workers reported a fall in business.

• 2006 World Cup, Germany: 33 cases were referred to the police for further investigation, out of which 5 cases were confirmed to be trafficking (4 women and 1 man). No other cases were found, despite the fact that the police conducted 71 brothel raids (these raids did not identify the 5 confirmed trafficking cases, but did lead to 10 deportations).

• 2004 Olympics, Greece: When trafficking statistics were compared for all of 2004 with all of 2003, there was an increase of 181 trafficking cases (which is a 90% increase). According to both the police and the International Organization for Migration, none of these cases were linked to the Olympics.

• Super Bowls in the USA in 2008-2011: Although law enforcement increased, they made no additional arrests for sex work-related offences during this time.
You might be wondering, and it is a good question, why there isn't sex trafficking during these events. The answer is simple. Criminals may be criminals, but organised crime does not exist for the purpose of being evil. It exists to make loads of tax-free dosh. Does it make financial sense for sex trafficking to occur at these events? With London rents skyrocketing around the venues, with the Home Office plans to tighten border security, with the police already well misinformed about the magnitude of the trafficking problem, you'd have to be mad to pursue this as a business plan.

There was perhaps a time, back in the 90s, when sex trafficking in some parts of Eastern Europe might have netted you some cash if you already had the distribution network, but it's not the case now. Add to that a large native population willing and legally able to exchange money for sex and you'd be laughed out of Dragon's Den for even suggesting it as a goer. I've met a lot of dodgy characters in my day - drug dealers and worse besides - and to a person they were not in it to lose money. In many cases the black marketeers I know were actually better businesspeople than anyone in legit trading.

In spite of all this, we are still treated - almost daily now in the run-up to London 2012 - with the same old guff such as stories that sex trafficking 'almost doubled' during the Athens Olympics.

In this particular case, 'almost doubled' means that the number of reported incidents was 181, a 90% increase over the previous year. So yes, they did 'almost double'.

However if you too are underwhelmed by that number, it's with good reason. Applying all the usual disclaimers - any instance of forced sex trafficking is abhorrent and should be prosecuted vigorously, this is an argument about best use of police time, tax money and other resources - what does the reported change from just-shy-of-100 people to 181 actually represent?

Prostitution is legal and regulated in Greece, however, not everyone works legally and not everyone registers, because hello, do you want your name on the Greek government's hooker list? Probably not. Anyway, estimates put the number at about 1,000 legal prostitutes and 20,000 illegal ones. Given that these numbers are the ones put about by the US State Department which does not have a great track record on accuracy, it's a little suspect. But let's say for the sake of saying that represents some kind of starting ballpark figure and probably even an overestimate. The 21,000 total gives us about 1 in every 250 women in Greece working as a prostitute - actually a realistic enough proportion for Europe.

In the year before the Athens Olympics, the reports of sex trafficking at 95 represented 0.45% of all prostitution in Greece. And after the Olympics? 0.86%. Less than 1% of prostitutes in Greece were trafficked both before and after the Olympics.

There is no particular evidence, statistical or otherwise, to suggest that the fluctuation in this rather small number was due to the Olympics per se. In fact it is certainly within the bounds of what we call the 'law of small numbers' which dictates that they can and do fluctuate in a way that represents a high percentage of the values themselves, but given the rarity of the events involved, this is expected and not necessarily significant.

Here's an example. Let's say in the year 2008, there was 1 death in all of Scotland from a vending machine falling on someone. Then let's say a year later, in 2009, there were 2 such deaths. While it would be technically true to say that the number of vending machine accidental deaths 'doubled', is this a fair representation of the data? Is this a significant trend that is likely to continue? (Which would mean that by 2032, there would be 8.38 million such deaths in Scotland, or approximately... er, 150% of the population). No, obviously not. The change from 1 to 2 in a given year seems clearly attributable to chance. You'd be silly to conclude the change from one small number to another "means" very much without a lot of additional evidence.

If you've read my paper on the effects of lap dancing on sexual violence in London, you'll already be aware of how over time these small numbers fluctuate wildly. For context, the UNHCR gives the number of trafficked persons for Greece as 137 in 2005, 83 in 2006, 100 in 2007, 162 in 2008, 125 in 2009, 92 in 2010.

Now if these things had no knock-on effect, and if police resources and tax money were infinite, then sure, why not go after human trafficking even if it's only a very tiny proportion of all sex work in Greece - or in the more immediate case, London? But alas, it is not a matter of infinite police time and tax money. And it is definitely not a matter of no knock-on effects.

According to the London School of Hygiene and Tropical Medicine, "Police crackdowns and brothel closures tend to displace sex workers from flats and saunas to less safe work venues, including the street, and make them wary of all authorities so they are less likely to access services or to report episodes of violence or crime to the police."

Given that the anti-sex lobby are so dead keen to keep claiming that all sex workers are inevitably the victims of violent and sex crimes, that seems like it's going to affect a hell of a lot more than a couple hundred people, no? Why does a small number of people matter to them more than a potentially far larger pool of people? Is it because that's where the grant money and column inches are at?

Not only is this increased danger the outcome in previous incidents of trafficking panic, it's happening right now in London. The Moratorium 2012 campaign, organised by x:talk, confirms:

Stop the Arrests Campaign is aware of ‘clean up efforts’ already underway in London, particularly east London, in the run-up to the Olympics ... Last December in Barking and Dagenham a violent gang carried out a series of robberies on brothels at knife point. Sex workers were deterred from pursuing the attacks after police threatened them with prosecution. Thus many more were attacked and one woman was raped.
Got that? Send the police after non-existent sex trafficking, and they end up cracking down on non-trafficked sex workers. When that happens, people in sex work are put in more danger. No one is made safer by doing this. No one is saved. Moratorium 2012 is calling on an end to the pointless and dangerous harassment. Please, sign the petition.




ndo

F1 teams to reveal 2025 liveries together at first season launch event in London | Formula 1

All 10 Formula 1 teams will participate in a new "season launch event" in February next year to reveal their liveries together.




ndo

The incredible secret of the London Overground rebranding

I am 100% on-board with the London Overground being split into six different lines with individual names. It is infuriating to see there are delays on the Overground and have no clear idea of whether they might be on a...




ndo

The Tegan and Sara internet culture and fandom documentary is worth 100 minutes of your time

I didn’t watch this in the cinema, and I had a bit more to say about it than my usual one-line movie review format, so it didn’t fit into my monthly round-up, but I do want to wholeheartedly recommend you...





ndo

Renovando el carné de Traductor-Intérprete Jurado (II)

En la segunda parte de «Renovando el carné de Traductor-Intérprete Jurado» vamos a ver los diferentes pasos que hay que seguir para la renovación del carné de jurado. La renovación es ahora más sencilla que nunca ya que es posible realizar casi toda la gestión online. Claro está, siempre que el sistema quiera y no […]




ndo

¿Para qué sirve un burofax? Reclamando facturas

Uno de los primeros pasos que se suelen dar ante una factura impagada es preguntarle, amablemente, al cliente por el importe debido. Esto se suele hacer, habitualmente, por teléfono o por escrito usando el correo electrónico. Sin embargo, cuando a pesar de nuestra insistencia la factura sigue pendiente llega un momento en el que tenemos […]




ndo

Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP

These days, commodity-off-the-shelf (COTS) hardware and software are used to build high-end and powerful workstations and servers to be deployed in today's local area networks of private homes and small- to medium-sized business. Typically, these servers are multipurpose and shared - running networking functionalities involving IP packet forwarding in addition to other CPU intensive applications. In this paper we study and investigate the impact of running CPU-bound applications on the performance of IP packet forwarding. We measure and compare the impact and performance for the two operating systems of choice for home and small-business users, namely Linux and Windows XP. The performance is studied in terms of key performance metrics which include throughput, packet loss, round-trip delay, and CPU availability. For our measurements, we consider today's typical home network hosts of modern processors and Gigabit network cards. We also consider different configuration setups and utilize open-source tools to generate relatively high traffic rates. Our empirical results show that Linux exhibits superior performance over Windows XP in terms of IP forwarding performance. Results also show that, unlike Windows XP, the IP forwarding performance of Linux is not significantly impacted by running CPU-bound applications.




ndo

Risk evaluation method of electronic bank investment based on random forest

Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking.




ndo

A constant temperature control system for indoor environments in buildings using internet of things

The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models.




ndo

QoS-based handover approach for 5G mobile communication system

5G mobile communication systems are an in-depth fusion of multi-radio access technologies characterised with frequent handover between cells. Handover management is a particularly challenging issue for 5G networks development. In this article, a novel optimised handover framework is proposed to find the optimal network to connect with a good quality of service in accordance with the user's preferences. This framework is based on an extension of IEEE 802.21 standard with new components and new service primitives for seamless handover. Moreover, the proposed vertical handover process is based on an adaptive heuristic model aimed at achieving an optimised network during the decision-making stage. Simulation results demonstrate that, compared to other existing works, the proposed framework is capable of selecting the best network candidate accurately based on the quality-of-service requirements of the application, network conditions, mobile terminal conditions and user preferences. It significantly reduces the handover delay, handover blocking probability and packet loss rate.




ndo

The role of pre-formation intangible assets in the endowment of science-based university spin-offs

Science-based university spin-offs face considerable technology and market uncertainty over extended periods of time, increasing the challenges of commercialisation. Scientist-entrepreneurs can play formative roles in commercialising lab-based scientific inventions through the formation of well-endowed university spin-offs. Through case study analysis of three science-based university spin-offs within a biotechnology innovation ecosystem, we unpack the impact of <i>pre-formation</i> intangible assets of academic scientists (research excellence, patenting, and international networks) and their entrepreneurial capabilities on spin-off performance. We find evidence that the pre-formation entrepreneurial capabilities of academic scientists can endow science-based university spin-offs by leveraging the scientists' pre-formation intangible assets. A theory-driven model depicting the role of pre-formation intangible assets and entrepreneurial capabilities in endowing science-based university spin-offs is developed. Recommendations are provided for scholars, practitioners, and policymakers to more effectively commercialise high potential inventions in the university lab through the development and deployment of pre-formation intangible assets and entrepreneurial capabilities.




ndo

Windows 8: What Educators Need to Know




ndo

Combination of Lv-3DCNN algorithm in random noise environment and its application in aerobic gymnastics action recognition

Action recognition plays a vital role in analysing human body behaviour and has significant implications for research and education. However, traditional recognition methods often suffer from issues such as inaccurate time and spatial feature vectors. Therefore, this study addresses the problem of inaccurate recognition of aerobic gymnastics action image data and proposes a visualised three-dimensional convolutional neural network algorithm-based action recognition model. This model incorporates unsupervised visualisation methods into the traditional network and enhances data recognition capabilities through the introduction of a random noise perturbation enhancement algorithm. The research results indicate that the data augmented with noise perturbation achieves the lowest mean square error, reducing the error value from 0.3352 to 0.3095. The use of unsupervised visualisation analysis enables clearer recognition of human actions, and the algorithm model is capable of accurately recognising aerobic movements. Compared to traditional algorithms, the new algorithm exhibits higher recognition accuracy and superior performance.




ndo

Multiplication complexity in education activities with fair use principle of copyright in Indonesia

Copying and duplicating papers for educational purposes is a violation form of copyright in Indonesia. The principle of fair use in education is a form of structured violation. Copying and duplicating the papers of the authors for educational purposes has provided commercial (business) benefits for libraries and universities. The research method is conducted using the observation method in libraries and universities that duplicate papers. The method also uses the normative juridical method that connects duplication of the papers in libraries and universities with the fair use principle. The results explain the authors' loss from copying and duplicating of papers in libraries and universities. Therefore, copying and duplicating the papers can only be done by implementing the responsibility system. Copying and duplicating the papers of the authors' in libraries and universities can be allowed if they fulfil the elements of copyright protection in the new concept.




ndo

A risk identification method for abnormal accounting data based on weighted random forest

In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good.




ndo

Modeling and Performance Analysis of Dynamic Random Early Detection (DRED) Gateway for Congestion Avoidance




ndo

Effect of Windows XP Firewall on Network Simulation and Testing




ndo

Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc Business Information Technology (BIT) at the University of East London (UEL)




ndo

Knowledge Management Orientation, Market Orientation, and SME’s Performance: A Lesson from Indonesia’s Creative Economy Sector

Aim/Purpose: Two research objectives were addressed in this study. The first objective was to determine the effect of knowledge management orientation behaviour on business performance, and the second objective was to investigate the mediating effect of market orientation in the relationship between knowledge management orientation behaviour and business performance. Background: In business strategic perspective, the idea of knowledge management has been discussed widely. However, there is a lack of study exploring the notion of knowledge management orientation especially in the perspective of Indonesia’s creative economy sector. Methodology: One hundred and thirty one participants were involved in this study. They were economy creative practitioners in Indonesia. Data were analysed by using Partial Least Squares. Contribution: Upon the completion of the research objectives, this study contributes to both theoretical and practical perspectives. From a theoretical standpoint, this study proposes a conceptual model explaining the relationship among knowledge management orientation behaviour, market orientation, and business performance in Indonesia’s creative economy sector. As this study found a significant effect of knowledge sharing in market orientation and market orientation in business performance, the study showed the mediation role of market orientation in the relationship between knowledge sharing and business performance. From a practical perspective, this study implies a guideline for business practitioners in enhancing business through the application of knowledge management orientation behaviour. Findings: The results show that organizing memory, knowledge absorption, and knowledge receptivity has a direct significant effect on business performance. However, in affecting business performance, knowledge sharing must be mediated by market orientation. Recommendations for Practitioners: Based on the results of the study, practitioners should enhance their behaviour in implementing knowledge management in terms of increasing business performance. In addition, it is suggested that business practitioners must be market driven, as market orientation was found to have an important role in affecting business performance. Recommendation for Researchers: Future researchers might integrate other constructs such as innovation, marketing capabilities, or organizational learning with this current conceptual model to have more comprehensive insight about the relationship between knowledge management orientation and business performance. Impact on Society: This study suggests that business practitioners must have knowledge management driven behaviour as well as market orientation to enhance the performance of their business. Future Research: Future research might add other variables to make the conceptual model more comprehensive and also replicate this study into different industrial settings.




ndo

Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector

Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature.




ndo

Millennial Experience with Online Food Home Delivery: A Lesson from Indonesia

Aim/Purpose: To examine millennial satisfaction towards online food delivery services, including e-service quality, food quality, and perceived value as the determinants and behavioral intention as the consequence. Background: Among the generational cohorts, millennials are a demanding target group for many retailers, including restaurants. Despite many studies examining millennial behavior in the restaurant context, almost no research on millennial attitudes and behavior in the context of online food home delivery service can be found. Methodology: For this research, 332 millennials completed a self-administered survey in Indonesia. To assess the associations between satisfaction and its determinants and consequences, this study employs Partial Least Square modeling. Contribution: This research extends existing knowledge of millennial satisfaction toward online food delivery service by highlighting that food quality, e-service quality and perceived value are the main determinants of satisfaction for online food purchasing among millennials. Further, this study offers support for the spillover theory in the online food home delivery service from millennial perspective. Findings: This study uncovers the important direct dual influences of e-service quality and food quality on millennial satisfaction with online food delivery services. Further, this study notes that e-service and food quality also have an indirect influence on satisfaction via perceived value. Moreover, satisfied millennial customers are more likely to re-purchase, recommend to others, and re-purchase at an increased price. Recommendations for Practitioners: For small and medium restaurants, it is suggested that they need to focus solely on their core business of providing food. If they want to offer an e-service, they should develop strategic cooperation with one or more online service providers. Recommendation for Researchers: Millennials tend to repurchase, recommend, and be willing to pay more in the future extends the existing models that look at the associations among quality, satisfaction and behavioral intention. Thus, in online restaurant purchasing services, both e-service quality and food quality should be included in the future research models. Impact on Society: This study could help restaurant industries to increase their business performance and, indirectly, impact on society as a whole by providing high quality food, employment opportunities, and tax revenues. Future Research: Future researchers can reassess the model in different countries and/or with other generation cohorts as well as including other variables such as trust, image, involvement, as well as socio-demographic factors.




ndo

Effects of Advocacy Banners after Abandoning Products in Online Shopping Carts

Aim/Purpose: This study empirically analyzed and examined the effectiveness of the online advocacy banners on customers’ reactions to make replacements with the similar products in their shopping carts. Background: When a product in a shopping cart is removed, it might be put back into the cart again during the same purchase or it may be bought in the future. Otherwise, it might be abandoned and replaced with a similar item based on the customer’s enquiry list or on the recommendation of banners. There is a lack of understanding of this phenomenon in the existing literature, pointing to the need for this study. Methodology: With a database from a Taiwanese e-retailer, data were the tracks of empirical webpage clickstreams. The used data for analyses were particularly that the products were purchased again or replaced with the similar ones upon the advocacy banners being shown when they were removed from customers’ shopping carts. Few pre-defined Apriori rules as well as similarity algorithm, Jaccard index, were applied to derive the effectiveness. Contribution: This study addressed a measurement challenge by leveraging the information from clickstream data – particularly clickstream data behavior. These data are most useful to observe the real-time behavior of consumers on websites and also are applied to studying click-through behavior, but not click-through rates, for web banners. The study develops a new methodology to aid advertisers in evaluating the effectiveness of their banner campaign. Findings: The recommending/advocating titles of “you probably are interested” and “the most viewed” are not significantly effective on saving back customers’ removed products or repurchasing similar items. For the banners entitled “most buy”, “the most viewed” might only show popularity of the items, but is not enough to convince them to buy. At the current stage on the host website, customers may either not trust in the host e-retailer or in such mechanism. Additionally, the advocating/recommending banners only are effective on the same customer visits and their effects fade over time. As time passes, customers’ impressions of these banners may become vague. Recommendations for Practitioners: One managerial implication is more effective adoption of advocacy/recommendation banners on e-retailing websites. Another managerial implication is the evaluation of the advocacy/recommendation banners. By using a data mining technique to find the association between removed products and restored ones in e-shoppers’ shopping carts, the approach and findings of this study, which are important for e-retailing marketers, reflect the connection between the usage of banners and the personalized purchase changes in an individual customer’s shopping cart. Recommendation for Researchers: This study addressed a new measurement which challenges to leverage the information from clickstream data instead of click-through rates – particularly retailing webpages browsing behavior. These data are most useful to observe the real-time behavior of consumers on websites and also are applied to studying click-through behavior. Impact on Society: Personalization has become an important technique that allows businesses to improve both sales and service relationships with their online customers. This personalization gives e-marketers the ability to deliver real effectiveness in the use of banners. Future Research: The effectiveness is time- and case-sensible. Business practitioners and academic researchers are encouraged to apply the mining methodology to longevity studies, specific marketing campaigns of advertising and personal recommendations, and any further recommendation algorithms.




ndo

How Information Security Management Systems Influence the Healthcare Professionals’ Security Behavior in a Public Hospital in Indonesia

Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT) Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation. Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements. Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media. Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures. Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB. Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations. Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.




ndo

Unraveling the Key Factors of Successful ERP Post Implementation in the Indonesian Construction Context

Aim/Purpose: This study aims to evaluate the success of ERP post-implementation and the factors that affect the overall success of the ERP system by integrating the Task Technology Fit (TTF) model into the Information System Success Model (ISSM). Background: Not all ERP implementations provide the expected benefits, as post-implementation challenges can include inflexible ERP systems and ongoing costs. Therefore, it is necessary to evaluate the success after ERP implementation, and this research integrates the Task Technology Fit (TTF) model into the Information System Success Model (ISSM). Methodology: For data analysis and the proposed model, the authors used SmartPLS 3 by applying the PLS-SEM test and one-tailed bootstrapping. The researchers distributed questionnaires online to 115 ERP users at a construction company in Indonesia and successfully got responses from 95 ERP users. Contribution: The results obtained will be helpful and essential for future researchers and Information System practitioners – considering the high failure rate in the use of ERP in a company, as well as the inability of organizations and companies to exploit the benefits and potential that ERP can provide fully. Findings: The results show that Perceived Usefulness, User Satisfaction, and Task-Technology Fit positively affect the Organizational Impact of ERP implementation. Recommendations for Practitioners: The findings can help policymakers and CEOs of businesses in Indonesia’s construction sector create better business strategies and use limited resources more effectively and efficiently to provide a considerably higher probability of ERP deployment. The findings of this study were also beneficial for ERP vendors and consultants. The construction of the industry has specific characteristics that ERP vendors should consider. Construction is a highly fragmented sector, with specialized segments demanding specialist technologies. Several projects also influence it. They can use them to identify and establish several alternative strategies to deal with challenges and obstacles that can arise during the installation of ERP in a firm. Vendors and consultants can supply solutions, architecture, or customization support by the standard operating criteria, implement the ERP system and train critical users. The ERP system vendors and consultants can also collaborate with experts from the construction sector to develop customized alternatives for construction companies. That would be the most outstanding solution for implementing ERP in this industry. Recommendation for Researchers: Future researchers can use this combined model to study ERP post-implementation success on organizational impact with ERP systems in other company information systems fields, especially the construction sector. Future integration of different models can be used to improve the proposed model. Integration with models that assess the level of Information System acceptance, such as Technology Acceptance Model 3 (TAM3) or Unified Theory of Acceptance and Use of Technology 2 (UTAUT2), can be used in future research to deepen the exploration of factors that influence ERP post-implementation success in an organization. Impact on Society: This study can guide companies, particularly in the construction sector, to maintain ERP performance, conduct training for new users, and regularly survey user satisfaction to ensure the ERP system’s reliability, security, and performance are maintained and measurable. Future Research: It is increasing the sample size with a larger population at other loci (private and state-owned) that use ERP to see the factors influencing ERP post-implementation success and using mixed methods to produce a better understanding. With varied modes, it is possible to get better results by adding unique factors to the research, and future integration of other models can be used to improve the proposed model.




ndo

Factors Affecting Individuals’ Behavioral Intention to Use Online Capital Market Investment Platforms in Indonesia

Aim/Purpose: This study aims to examine the ten factors from the Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), and Unified Theory of Acceptance and Use of Technology (UTAUT) theories in order to analyze behavioral intentions to use the Indonesian online capital market investment platforms and the effect of behavioral intentions on actual usage. Background: The potential growth of capital market investors in Indonesia is large, and the low use of the Internet for investment purposes makes it necessary for stakeholders to understand the factors that affect people’s intentions to invest, especially through online platforms. Several previous studies have explained the intention to use online investment platforms using the TAM and TPB theories. This study tries to combine TAM, TPB, and UTAUT theories in analyzing behavioral intentions to use an online capital market investment platform in Indonesia. Methodology: The research approach employed is a mixed method, particularly explanatory research, which employs quantitative methods first, followed by qualitative methods. Data were collected by conducting interviews and sending online surveys. This study was successful in collecting information on the users of online capital market investment platforms in Indonesia from 1074 respondents, which was then processed and analyzed using Covariance-Based Structural Equation Modeling (CB-SEM) with the IBM AMOS 26.0 application. Contribution: This study complements earlier theories like TAM, TPB, and UTAUT by looking at the intention to use online capital market investment platforms from technological, human, and environmental viewpoints. This study looks at the intention to use the online capital market investing platform as a whole rather than separately depending on investment instruments. This study also assists practitioners including regulators, the government, developers, and investors by offering knowledge of the phenomena and factors that can increase the capital market’s investment intention in Indonesia. Findings: Attitudes, perceived ease of use, perceived behavioral control, subjective norm, and national pride were found to be significant predictors of the intention to use online investment platforms in Indonesia, whereas perceived usefulness, perceived risk, perceived trust, perceived privacy, and price value were not. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. The government can enact legislation that emphasizes the simplicity and convenience of investment, as well as launch campaigns that encourage people to participate in economic recovery by investing in the capital market. Meanwhile, the developers are concentrating on facilitating the flow of investment transactions through the platform, increasing education and awareness of the benefits of investing in the capital market, and providing content that raises awareness that investing in the capital market can help to restore the national economy. Recommendation for Researchers: Further research is intended to include other variables such as perceived benefits and perceived security, as well as other frameworks such as TRA, to better explain individuals’ behavioral intentions to use online capital investment platforms. Impact on Society: This study can help all stakeholders understand what factors can increase Indonesians’ interest in investing in the capital market, particularly through online investment platforms. This understanding is expected to increase the number of capital market participants and, as a result, have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use an online capital market investment platform, such as perceived benefits and perceived security, as well as the addition of control variables such as age, gender, education, and income. International research across nations is also required to build a larger sample size in order to examine the behavior of investors in developing and developed countries and acquire a more thorough understanding of the online capital market investment platform.




ndo

Enhancing Waste Management Decisions: A Group DSS Approach Using SSM and AHP in Indonesia

Aim/Purpose: This research aims to design a website-based group decision support system (DSS) user interface to support an integrated and sustainable waste management plan in Jagatera. The main focus of this research is to design a group DSS to help Jagatera prioritize several waste alternatives to be managed so that Jagatera can make the right decisions to serve the community. Background: The Indonesian government and various stakeholders are trying to solve the waste problem. Jagatera, as a waste recycling company, plays a role as a stakeholder in managing waste. In 2024, Jagatera plans to accept all waste types, which impacts the possibility of increasing waste management costs. If Jagatera does not have a waste management plan, this will impact reducing waste management services in the community. To solve this problem, the group DSS assists Jagatera in prioritizing waste based on aspects of waste management cost. Methodology: Jagatera, an Indonesian waste recycling company, is implementing a group DSS using the soft system methodology (SSM) method. The SSM process involves seven stages, including problem identification, problem explanation using rich pictures, system design, conceptual model design, real-life comparison, changes, and improvement steps. The final result is a prototype user interface design addressing the relationship between actors and the group DSS. The analytical hierarchy process (AHP) method prioritized waste based on management costs. This research obtained primary data from interviews with Jagatera management, a literature review regarding the group DSS, and questionnaires to determine the type of waste and evaluate user interface design. Contribution: This research focuses on determining waste handling priorities based on their management. It contributes the DSS, which uses a decision-making approach based on management groups developed using the SSM and AHP methods focused on waste management decisions. It also contributes to the availability of a user interface design from the DSS group that explains the interactions between actors. The implications of the availability of DSS groups in waste recycling companies can help management understand waste prioritization problems in a structured manner, increase decision-making efficiency, and impact better-quality waste management. Combining qualitative approaches from SSM to comprehend issues from different actor perspectives and AHP to assist quantitative methods in prioritizing decisions can yield theoretical implications when using the SSM and AHP methods together. Findings: This research produces a website-based group DSS user interface design that can facilitate decision-making using AHP techniques. The user interface design from the DSS group was developed using the SSM approach to identify complex problems at waste recycling companies in Indonesia. This study also evaluated the group DSS user interface design, which resulted in a score of 91.67%. This value means that the user interface design has met user expectations, which include functional, appearance, and comfort needs. These results also show that group DSS can enhance waste recycling companies’ decision-making process. The results of the AHP technique using all waste process information show that furniture waste, according to the CEO, is given more priority, and textile waste, according to the Managing Director. Group DSS developed using the AHP method allows user actors to provide decisions based on their perspectives and authority. Recommendations for Practitioners: This research shows that the availability of a group DSS is one of the digital transformation efforts that waste recycling companies can carry out to support the determination of a sustainable waste management plan. Managers benefit from DSS groups by providing a digital decision-making process to determine which types of waste should be prioritized based on management costs. Timely and complete information in the group DSS is helpful in the decision-making process and increases organizational knowledge based on the chosen strategy. Recommendation for Researchers: Developing a group DSS for waste recycling companies can encourage strategic decision-making processes. This research integrates SSM and AHP to support a comprehensive group DSS because SSM encourages a deeper and more detailed understanding of waste recycling companies with complex problems. At the same time, AHP provides a structured approach for recycling companies to make decisions. The group DSS that will be developed can be used to identify other more relevant criteria, such as environmental impact, waste management regulations, and technological capabilities. Apart from more varied criteria, the group DSS can be encouraged to provide various alternatives such as waste paper, metal, or glass. In addition to evaluating the group DSS’s user interface design, waste recycling companies need to consider training or support for users to increase system adoption. Impact on Society: The waste problem requires the role of various stakeholders, one of which is a waste recycling company. The availability of a group DSS design can guide waste recycling companies in providing efficient and effective services so that they can respond more quickly to the waste management needs of the community. The community also gets transparent information regarding their waste management. The impact of good group DSS is reducing the amount of waste in society. Future Research: Future research could identify various other types of waste used as alternatives in the decision-making process to illustrate the complexity of the prioritization process. Future research could also identify other criteria, such as environmental impact, social aspects of community involvement, or policy compliance. Future research could involve decision-makers from other parties, such as the government, who play an essential role in the waste industry.




ndo

Student Acceptance of LMS in Indonesian High Schools: The SOR and Extended GETAMEL Frameworks

Aim/Purpose: This study aims to develop a theoretical model based on the SOR (Stimulus – Organism – Response) framework and GETAMEL, which cover environmental, personal, and learning quality aspects to identify factors influencing students’ acceptance of the use of LMS in high schools, especially after COVID-19 pandemic. Background: After the COVID-19 pandemic, many high schools reopened for in-person classes, which led to a decreased reliance on e-learning. The shift from online to traditional face-to-face learning has influenced students’ perceptions of the importance of e-learning in their academic activities. Consequently, high schools are facing the challenge of ensuring that LMS can still be integrated into the teaching-learning process even after the pandemic ends. Therefore, this study proposes a model to investigate the factors that affect students’ actual use of LMS in the high school environment. Methodology: This study used 890 high school students to validate the theoretical model using Structural Equation Modeling (SEM) analysis to deliver direct, indirect, and moderating effect analysis. Contribution: This study combines SOR and acceptance theory to provide a model to explain high school students’ intention to use technology. The involvement of direct, indirect, and moderating effects analysis offers an alternative result and discussion and is considered another contribution of this study from a technical perspective. Findings: The findings show that perceived satisfaction is the most influential factor affecting the use of LMS, followed by perceived usefulness. Meanwhile, from indirect effect analysis, subjective norms and computer self-efficacy were found to indirectly affect actual use through perceived usefulness as a mediator. Content quality was also an indirect predictor of the actual use of LMS through perceived satisfaction. Further, the moderating effect of age influenced perceived satisfaction’s direct effect on actual use. Recommendations for Practitioners: This study provides practical recommendations that can be useful to high schools and other stakeholders in improving the use of LMS in educational environments. Specifically, exploring the implementation of LMS in high schools prior to and following the COVID-19 outbreak can offer valuable insights into the changing educational environment. Recommendation for Researchers: The results of this study present a significant theoretical contribution by employing a comprehensive approach to explain the adoption of LMS among high school students after the COVID-19 pandemic. This contribution extends the GETAMEL framework by incorporating environmental, personal, and learning quality aspects while also analyzing both direct and indirect effects, which have not been previously explored in this context. Impact on Society: This study provides knowledge to high schools for improving the use of LMS in educational environments post-COVID-19, leading to an enhanced teaching-learning process. Future Research: This study, however, is limited to collecting responses exclusively from Indonesian respondents. Therefore, the replication of the finding needs to consider the characteristics and culture similar to Indonesian students, which is regarded as the limitation of this study.




ndo

Recommendation System for an Online Shopping Pay-Later System Using a Multistage Approach: A Case Study from Indonesia

Aim/Purpose: In this study, we developed a recommendation system model designed to support decision-makers in identifying consumers eligible for pay-later options via consensus-based decision-making. This approach was chosen due to the high and complex risks involved, such as delayed payments, challenges in reaching consumers, and issues of bad credit. Background: The “pay-later” option, which allows consumers to postpone payment for e-commerce purchases, offers convenience and flexibility but also introduces several challenges: (i) by enabling payment deferral, merchants face financial risks, including potential delays or defaults in payment, adversely affecting their cash flow and profitability; and (ii) this payment delay can also heighten the risk of fraud, including identity theft and unauthorized transactions. Methodology: This study initiated a risk analysis utilizing the ROAD process. Considering contemporary economic developments and advancements in neural networks, integrating these networks into risk assessment has become crucial. Consequently, model development involved the amalgamation of three deep learning methods – CNN (Convolutional Neural Networks), RNN (Recurrent Neural Networks), and LSTM (Long Short-Term Memory) – to address various risk alternatives and facilitate multi-stage decision-making recommendations. Contribution: Our primary contribution is threefold. First, our study identified potential consumers by prioritizing those with the smallest associated problem consequence values. Second, we achieved an optimal recall value using a candidate generator. Last, we categorized consumers to assess their eligibility for pay-later rights. Findings: The findings from this study indicate that our multi-stage recommendation model is effective in minimizing the risk associated with consumer debt repayment. This method of consumer selection empowers policymakers to make informed decisions regarding which consumers should be granted pay-later privileges. Recommendations for Practitioners: This recommendation system is proposed to several key parties involved in the development, implementation, and use of pay-later systems. These parties include E-commerce Executive Management for financial analysis and risk evaluation, the Risk Management Team to assess and manage risks related to users utilizing Pay-Later services, and Sales Managers to integrate Pay-Later services into sales strategies. Recommendation for Researchers: Advanced fraud detection mechanisms were implemented to prevent unauthorized transactions effectively. The goal was to cultivate user confidence in the safety of their financial data by ensuring secure payment processing. Impact on Society: Ensuring consumers understand the terms and conditions of pay-later arrangements, including interest rates, repayment schedules, and potential fees, is crucial. Providing clear and transparent information, along with educating consumers about their financial responsibilities, helps prevent misunderstandings and disputes. Future Research: Our future development plans involve the ongoing assessment of the system’s performance to enhance prediction accuracy. This includes updating models and criteria based on feedback and changes in economic or market conditions. Upholding compliance with security and data privacy regulations necessitates the implementation of protective measures to safeguard consumer information. The implementation of such a system requires careful consideration to ensure fairness and adherence to legal standards. Additionally, it is important to acknowledge that algorithms and models may evolve over time through the incorporation of additional data and continuous evaluations.




ndo

Fostering Trust Through Bytes: Unravelling the Impact of E-Government on Public Trust in Indonesian Local Government

Aim/Purpose: This study aims to investigate the influence of e-government public services on public trust at the local government level, addressing the pressing need to understand the factors shaping citizen perceptions and trust in government institutions. Background: With the proliferation of e-government initiatives worldwide, governments are increasingly turning to digital solutions to enhance public service delivery and promote transparency. However, despite the potential benefits, there remains a gap in understanding how these initiatives impact public trust in government institutions, particularly at the local level. This study seeks to address this gap by examining the relationship between e-government service quality, individual perceptions, and public trust, providing valuable insights into the complexities of citizen-government interactions in the digital age. Methodology: Employing a quantitative approach, this study utilises surveys distributed to users of e-government services in one of the regencies in Indonesia. The sample consists of 278 individuals. Data analysis is conducted using Partial Least Squares Structural Equation Modelling, allowing for the exploration of relationships among variables and their influence on public trust. Contribution: This study provides insights into the factors influencing public trust in e-government services at the local government level, offering a nuanced understanding of the relationship between service quality, individual perceptions, and public trust. Findings: This study emphasises information quality and service quality in e-government-based public services as crucial determinants of individual perception in rural areas. Interestingly, system quality in e-government services has no influence on individual perception. In the individual perception, perceived security and privacy emerge as the strongest antecedent of public trust, highlighting the need to guarantee secure and private services for citizens in rural areas. These findings emphasise the importance of prioritising high-quality information, excellent service delivery, and robust security measures to foster and sustain public trust in e-government services. Recommendations for Practitioners: Practitioners must prioritise enhancing the quality of e-government services due to their significant impact on individual perception, leading to higher public trust. Government agencies must ensure reliability, responsiveness, and the effective fulfilment of user needs. Additionally, upholding high standards of information quality in e-government services by delivering accurate, relevant, and timely information remains crucial. Strengthening security measures through robust protocols such as data encryption and secure authentication becomes essential for protecting user data. With that in mind, the authors believe that public trust in government would escalate. Recommendation for Researchers: Researchers could investigate the relation between system quality in e-government services and individual perception in different rural settings. Longitudinal studies could also elucidate how evolving service quality, information quality, and security measures impact user satisfaction and trust over time. Comparative studies across regions or countries can reveal cultural and contextual differences in individual perceptions, identifying both universal principles and region-specific strategies for e-government platforms. Analysing user behaviour and preferences across various demographic groups can inform targeted interventions. Furthermore, examining the potential of emerging technologies such as blockchain or artificial intelligence in enhancing e-government service delivery, security, and user engagement remains an interesting topic. Impact on Society: This study’s findings have significant implications for fostering public trust in government institutions, ultimately strengthening democracy and citizen-government relations. By understanding how e-government initiatives influence public trust, policymakers can make informed decisions to improve service delivery, enhance citizen engagement, and promote transparency, thus contributing to more resilient and accountable governance structures. Future Research: Future research could opt for longitudinal studies to evaluate the long-term effects of enhancements in service quality, information quality, and security. Cross-cultural investigations can uncover universal principles and contextual differences in user experiences, supporting global e-government strategies in rural areas. Future research could also improve the research model by adding more variables, such as risk aversion or fear of job loss, to gauge individual perceptions.




ndo

Open the Windows of Communication: Promoting Interpersonal and Group Interactions Using Blogs in Higher Education




ndo

Comprendiendo Nuestras Politicas: The Need for an Effective C&IT Policy for a Nation’s Development, The Venezuelan Case




ndo

A Method for Indoor Vehicle Obstacle Avoidance by Fusion of Image and LiDAR

Background and Objective: In response to the challenges of poor mapping outcomes and susceptibility to obstacles encountered by indoor mobile vehicles relying solely on pure cameras or pure LiDAR during their movements, this paper proposes an obstacle avoidance method for indoor mobile vehicles that integrates image and LiDAR data, thus achieving obstacle avoidance for mobile vehicles. Materials and Methods: This method combines data from a depth camera and LiDAR, employing the Gmapping SLAM algorithm for environmental mapping, along with the A* algorithm and TEB algorithm for local path planning. In addition, this approach incorporates gesture functionality, which can be used to control the vehicle in certain special scenarios where “pseudo-obstacles” exist. The method utilizes the YOLO V3 algorithm for gesture recognition. Results: This paper merges the maps generated by the depth camera and LiDAR, resulting in a three-dimensional map that is more enriched and better aligned with real-world conditions. Combined with the A* algorithm and TEB algorithm, an optimal route is planned, enabling the mobile vehicles to effectively obtain obstacle information and thus achieve obstacle avoidance. Additionally, the introduced gesture recognition feature, which has been validated, also effectively controls the forward and backward movements of the mobile vehicles, facilitating obstacle avoidance. Conclusion: The experimental platform for the mobile vehicles, which integrates depth camera and LiDAR, built in this study has been validated for real-time obstacle avoidance through path planning in indoor environments. The introduced gesture recognition also effectively enables obstacle avoidance for the mobile vehicles.




ndo

Maxthon Cloud Browser 5.2.7.5000 for PC Windows

Maxthon Cloud Browser is a powerful web browser which has a highly customizable interface. The browser has multiple tools that make your web experience more enjoyable, such as resource sniffer, screen capture tool, night mode and cloud functionality...




ndo

McAfee Labs Stinger 12.1.0.3218 Antivirus for PC Windows

Stinger is a quick and installation-free standalone tool for detecting and removing prevalent malware and threats, ideal if your PC is already infected. While not a replacement for full fledged antivirus software, Stinger is updated multiple times a ...




ndo

Avast Secure Browser 75.0.1447.81 Privacy and Security Tool for PC Windows

Avast Secure Browser strives to offer a ‘private, fast and secure’ service for Windows users. Simply put, this product has been built for privacy by security experts. It boasts an array of features to make sure that all cybersecurity bases are more t...