ut

Multi-Agent System for Knowledge-Based Access to Distributed Databases




ut

Designing a Self-Assessment Item Repository: An Authentic Project in Higher Education




ut

Barriers to the Effective Deployment of Information Assets: An Executive Management Perspective




ut

The Generalized Requirement Approach for Requirement Validation with Automatically Generated Program Code




ut

How the Use of ICT can Contribute to a Misleading Picture of Conditions – A Five-Step Process

This paper contributes to the limited research on roles ICT can play in impression-management strategies and is based on case studies done in the Swedish Police. It also gives a theoretical contribution by adopting a holistic approach to explain how ICT can contribute to giving a misleading picture of conditions. Output generated by ICT has nowadays a central role in follow-up activities and decision-making. Even if this type of output, often in colourful, presentable, graphical arrangements, gives the impression of being accurate and reliable there is a risk of defective data quality. The phenomena can be described as a process divided into five steps. The first step is about how the data is generated and/or collected. The second step is linked to how the data is registered. The third step is about the output generated from the ICT-systems. The fourth step is how the output of ICT is selected for presentation. The fifth step concerns how output generated by ICT is interpreted. This paper shows that ICT can easily be used in impression-management strategies. For example, that personnel take shortcuts to affect the statistics rather than applying methods that may give the desired effects.




ut

Aspects of Digital Forensics in South Africa

This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.




ut

A Multi-task Principal Agent Model for Knowledge Contribution of Enterprise Staff

According to the different behavior characteristics of knowledge contribution of enterprise employees, a multi-task principal-agent relationship of knowledge contribution between enterprise and employees is established based on principal-agent theory, analyzing staff’s knowledge contribution behavior of knowledge creation and knowledge participation. Based on this, a multi-task principal agent model for knowledge contribution of enterprise staff is developed to formulate the asymmetry of information in knowledge contribution Then, a set of incentive measures are derived from the theoretic model, aiming to prompt the knowledge contribution in enterprise. The result shows that staff’s knowledge creation behavior and positive participation behavior can influence and further promote each other Enterprise should set up respective target levels of both knowledge creation contribution and knowledge participation contribution and make them irreplaceable to each other. This work contributes primarily to the development of the literature on knowledge management and principal-agent theory. In addition, the applicability of the findings will be improved by further empirical analysis.




ut

A Conceptual Model for the Creation of a Process-Oriented Knowledge Map (POK-Map) and Implementation in an Electric Power Distribution Company

Helping a company organize and capture the knowledge used by its employees and business processes is a daunting task. In this work we examine several proposed methodologies and synthesize them into a new methodology that we demonstrate through a case study of an electric power distribution company. This is a practical research study. First, the research approach for creating the knowledge map is process-oriented and the processes are considered as the main elements of the model. This research was done in four stages: literature review, model editing, model validation and case study. The Delphi method was used for the research model validation. Some of the important outputs of this research were mapping knowledge flows, determining the level of knowledge assets, expert-area knowledge map, preparing knowledge meta-model, and updating the knowledge map according to the company’s processes. Besides identifying, auditing and visualizing tacit and explicit knowledge, this knowledge mapping enables us to analyze the knowledge areas’ situation and subsequently help us to improve the processes and overall performance. So, a process map does knowledge mapping in a clear and accurate frame. Once the knowledge is used in processes, it creates value.




ut

The Application of a Knowledge Management Framework to Automotive Original Component Manufacturers

Aim/Purpose: This paper aims to present an example of the application of a Knowledge Man-agement (KM) framework to automotive original component manufacturers (OEMs). The objective is to explore KM according to the four pillars of a selected KM framework. Background: This research demonstrates how a framework, namely the George Washington University’s Four Pillar Framework, can be used to determine the KM status of the automotive OEM industry, where knowledge is complex and can influence the complexity of the KM system (KMS) used. Methodology: An empirical study was undertaken using a questionnaire to gather quantitative data. There were 38 respondents from the National Association of Automotive Component and Allied Manufacturers (NAACAM) and suppliers from three major automotive OEMs. The respondents were required to be familiar with the company’s KMS. Contribution: Currently there is a limited body of research available on the KM implementation frameworks for the automotive industry. This study presents a novel approach to the use of a KM framework to reveal the status of KM in automotive OEMs. At the time of writing, the relationship between the four pillars and the complexity of KMS had not yet been determined. Findings: The results indicate that there is a need to improve KM in the automotive OEM industry. According to the relationships investigated, the four pillars, namely leadership, organization, technology and learning, are considered important for KM, regardless of the level of KMS complexity, Recommendations for Practitioners: Automotive OEMs need to ensure that the KM aspects are established and should be periodically evaluated by using a KM framework such as the George Washington University’s Four Pillar Framework to identify KM weaknesses. Recommendation for Researchers: The establishment and upkeep of a successful KM environment is challenging due to the complexity involved with various influencing aspects. To ensure that all aspects are considered in KM environments, comprehensive KM frameworks, such as the George Washington University’s Four Pillar Framework, need to be applied. Impact on Society: The status of KM management and accessibility of knowledge in organizations needs to be periodically examined, in order to improve supplier and OEM knowledge sharing. Future Research: Although the framework used provides a process for KM status determination, this study could be extended by investigating a methodology that includes KMS best practice and tools. This study could be repeated at a national and international level to provide an indication of KM practice within the entire automotive industry.




ut

The Utilisation of Facebook for Knowledge Sharing in Selected Local Government Councils in Delta State, Nigeria

Aim/Purpose: Facebook has made it possible for organisation to embrace social and network centric knowledge processes by creating opportunities to connect, interact, and collaborate with stakeholders. We have witnessed a significant increase in the popularity and use of this tool in many organisations, especially in the private sector. But the utilisation of Facebook in public organisations is at its infancy, with many also believing that the use of Facebook is not a common practice in many public organisations in Nigeria. In spite of this fact, our discernment on the implications of Facebook usage in public organisations in Nigeria, especially organisations at the local level, seem to be remarkably limited. This paper specifically sought to ascertain if Facebook usage influenced inward and outward knowledge sharing in the selected local government councils in Delta State, Nigeria Methodology: The qualitative method was adopted. The study used interview as the primary means of data gathering. The study purposively sampled thirty-six employees as interviewees, twenty from Oshimili South and sixteen from Oshimili North local government councils respectively. The thematic content analysis method was used to analyse interview transcripts. Contribution: This research made distinct contributions to the available literature in social knowledge management, specifically bringing to the fore the intricacies surrounding the use of Facebook for knowledge sharing purposes in the public sector. Findings: The local government councils were yet to appreciate and utilise the interactive and collaborative nature of Facebook in improving stakeholders’ engagement, feedback, and cooperation. Facebook was used for outward knowledge sharing but not for inward knowledge sharing. Recommendations for Practitioners: Local government councils should encourage interaction via Facebook, show willingness to capture knowledge from identifiable sources, and effectively manage critical knowledge assets in order to build trust, cooperation, and confidence in the system. To gain strategic benefits from the use of Facebook for synchronous communication of knowledge, local government councils should ensure that the use of such technology is aligned with strategic plans and that directional change is in line with the new knowledge economy, where interaction and collaboration through technology are seen as strategic imperatives for continued success and sustainability. In addition, local government councils need to train stakeholders on effective use of Facebook for knowledge sharing, with special emphasis on how, why, who, when, and where to use such tool for knowledge sharing activities.




ut

Data Visualization in Support of Executive Decision Making

Aim/Purpose: This journal paper seeks to understand historical aspects of data management, leading to the current data issues faced by organizational executives in relation to big data and how best to present the information to circumvent big data challenges for executive strategic decision making. Background: This journal paper seeks to understand what executives value in data visualization, based on the literature published from prior data studies. Methodology: The qualitative methodology was used to understand the sentiments of executives and data analysts using semi-structured interview techniques. Contribution: The preliminary findings can provide practical knowledge for data visualization designers, but can also provide academics with knowledge to reflect on and use, specifically in relation to information systems (IS) that integrate human experience with technology in more valuable and productive ways. Findings: Preliminary results from interviews with executives and data analysts point to the relevance of understanding and effectively presenting the data source and the data journey, using the right data visualization technology to fit the nature of the data, creating an intuitive platform which enables collaboration and newness, the data presenter’s ability to convey the data message and the alignment of the visualization to core the objectives as key criteria to be applied for successful data visualizations Recommendations for Practitioners: Practitioners, specifically data analysts, should consider the results highlighted in the findings and adopt such recommendations when presenting data visualizations. These include data and premise understanding, ensuring alignment to the executive’s objective, possessing the ability to convey messages succinctly and clearly to the audience, having knowledge of the domain to answer questions effectively, and using the right technology to convey the message. Recommendation for Researchers: The importance of human cognitive and sensory processes and its impact in IS development is paramount. More focus can be placed on the psychological factors of technology acceptance. The current TAM model, used to describe use, identifies perceived usefulness and perceived ease-of-use as the primary considerations in technology adoption. However, factors that have been identified that impact on use do not express the importance of cognitive processes in technology adoption. Future Research: Future research requires further focus on intangible and psychological factors that could affect technology adoption and use, as well as understanding data visualization effectiveness in corporate environments, not only predominantly within the Health sector. Lessons from Health sector studies in data visualization should be used as a platform.




ut

PRATO: An Automated Taxonomy-Based Reviewer-Proposal Assignment System

Aim/Purpose: This paper reports our implementation of a prototype system, namely PRATO (Proposals Reviewers Automated Taxonomy-based Organization), for automatic assignment of proposals to reviewers based on categorized tracks and partial matching of reviewers’ profiles of research interests against proposal keywords. Background: The process of assigning reviewers to proposals tends to be a complicated task as it involves inspecting the matching between a given proposal and a reviewer based on different criteria. The situation becomes worse if one tries to automate this process, especially if a reviewer partially matches the domain of the paper at hand. Hence, a new controlled approach is required to facilitate the matching process. Methodology: Proposals and reviewers are organized into categorized tracks as defined by a tree of hierarchical research domains which correspond to the university’s colleges and departments. In addition, reviewers create their profiles of research interests (keywords) at the time of registration. Initial assignment is based on the matching of categorized sub-tracks of proposal and reviewer. Where the proposal and a reviewer fall under different categories (sub-tracks), assignment is done based on partial matching of proposal content against re-viewers’ research interests. Jaccard similarity coefficient scores are calculated of proposal keywords and reviewers’ profiles of research interest, and the reviewer with highest score is chosen. The system was used to automate the process of proposal-reviewer assignment at the Umm Al-Qura University during the 2017-2018 funding cycle. The list of proposal-reviewer assignments generated by the system was sent to human experts for voting and subsequently to make final assignments accordingly. With expert votes and final decisions as evaluation criteria, data system-expert agreements (in terms of “accept” or “reject”) were collected and analyzed by tallying frequencies and calculating rejection/acceptance ratios to assess the system’s performance. Contribution: This work helped the Deanship of Scientific Research (DSR), a funding agency at Umm Al-Qura University, in managing the process of reviewing proposals submitted for funding. We believe the work can also benefit any organizations or conferences to automate the assignment of papers to the most appropriate reviewers. Findings: Our developed prototype, PRATO, showed a considerable impact on the entire process of reviewing proposals at DSR. It automated the assignment of proposals to reviewers and resulted in 56.7% correct assignments overall. This indicates that PRATO performed considerably well at this early stage of its development. Recommendations for Practitioners: It is important for funding agencies and publishers to automate reviewing process to obtain better reviewing quality in a timely manner. Recommendation for Researchers: This work highlighted a new methodology to tackle the proposal-reviewer assignment task in an automated manner. More evaluation might be needed with consideration of different categories, especially for partially matched candidates. Impact on Society: The new methodology and knowledge about factors influencing the implementation of automated proposal-reviewing systems will help funding agencies and publishers to improve the quality of their internal processes. Future Research: In the future, we plan to examine PRATO’s performance on different classification schemes where specialty areas can be represented in graphs rather than trees. With graph representation, the scope for reviewer selection can be widened to include more general fields of specialty. Moreover, we will try to record the reasons for rejection to identify accurately whether the rejection was due to improper assignment or other reasons.




ut

To Read or Not to Read: Modeling Online Newspaper Reading Satisfaction and Its Impact on Revisit Intention and Word-Of-Mouth

Aim/Purpose: In this research, we examined the influence of the information system (IS) quality dimensions proposed by Wixom and Todd on reading satisfaction of online newspaper readers in Bangladesh, especially the readers’ intention to revisit and recommendations through electronic word-of-mouth (eWOM). Background: We identified the top 50 most visited websites, of which 13 were online newspapers, although their ranking among Bangladesh online newspapers varies from month to month. The literature illustrates that, despite the wide availability of online news portals and the fluctuations in frequency of visits, little is known about the factors that affect the satisfaction, word-of-mouth, and frequency of visits of readers. An understanding of reader satisfaction will help to gain richer insights into the phenomenon of readers’ intention to revisit and recommendation by eWOM. Stakeholders of online newspapers can then focus on those factors to increase visits to their websites, which will help them attract online advertisements from different organisations. Methodology: Data were collected using a structured questionnaire, from 217 people who responded to the survey. We used SmartPLS 3 to analyze the data collected, as it is based on second-generation analysis, which in turn is based on structural equation modeling (SEM). Contribution: This research explores the impacts of technological dimensions on readers’ satisfaction, as most of the previous research has focused on cultural or social dimensions. Findings: The results supported all of the hypothesized relationships between technological dimensions and reader satisfaction with online newspapers, except for one. The first, information, was predicted with accuracy and completeness, while the second object-based belief, system quality, was predicted by its accessibility, flexibility, reliability, and timeliness. Overall, quality factors influencing readers’ satisfaction were shown to lead to word-of-mouth revisit intentions. Our proposed model was empirically tested and has contributed to a nascent body of knowledge about readers’ revisit intentions and eWOM recommendations regarding online newspapers. It was also shown that strong satisfaction leads to higher revisit intention and eWOM. Recommendations for Practitioners: To keep the users satisfied, online newspapers need to focus on improving information quality (IQ) and system quality (SQ). If they do this well, they will be rewarded with higher revisit intention and recommendations by eWOM. Recommendation for Researchers: This study extends Oh’s customer loyalty model by integrating the Wixom-Todd model. This study reinforces an alternative rationale of the construct satisfaction. Future Research: We ignored negative stimulus like technostress, which can have an impact on satisfaction. In future, we will test the relationship between technostress and its impact on online newspaper reading.




ut

Exploring Perceptions of Bitcoin Adoption: The South African Virtual Community Perspective

Aim/Purpose: This paper explored the factors (enablers and barriers) that affect Bitcoin adoption in South Africa, a Sub-Saharan country with the high potential for Bitcoin adoption. Background: In recent years, Bitcoin has seen a rapid growth as a virtual cryptocurrency throughout the world. Bitcoin is a protocol which allows value to be exchanged over the internet without a central bank or intermediary. Cryptocurrencies such as Bitcoin are technological tools that arguably can contribute to reducing transactions costs. This paper explored the factors that affect Bitcoin adoption in South Africa, a Sub-Saharan country with the high potential for Bitcoin adoption, as little is known about the factors that affect Bitcoin adoption and the barriers to adoption. Methodology: A quantitative questionnaire was distributed to South African virtual communities where Bitcoin is a topic of interest, and 237 quantitative responses were received, along with 212 open-ended comments. Contribution: This research contributes to the body of knowledge in information systems by providing insights into factors that affect Bitcoin adoption in South Africa. It raises awareness of incentives and barriers to Bitcoin adoption at a time when financial literacy is a crucial issue both in South Africa and worldwide. Findings: The results indicate that perceived benefit, attitude towards Bitcoin, subjective norm, and perceived behavioral control directly affected the participants’ intentions to use Bitcoin. Perceived benefit, usefulness, ease of use, and trust-related risk were found to indirectly affect intention to use Bitcoin. Further, it emerges that the barriers to Bitcoin adoption in South Africa consist of the complex nature of Bitcoin and its high degree of volatility. Recommendations for Practitioners: Bitcoin can contribute to reducing transactions costs, but factors that affect adoption and the barriers to adoption should be taken into consideration. These findings can inform systems and software developers to develop applications that make managing Bitcoin keys and transacting using Bitcoin less complex and more intuitive for end users. Recommendation for Researchers: Bitcoin adoption in South Africa is a topic that has not been previously researched. Researchers could research similarities or differences in the various constructs that were used in this research model. Impact on Society: South African Bitcoin users consider it as a universal currency that makes cross-border payments cheaper. A large number of refugees and workers in South Africa make regular payments across borders. Bitcoin could reduce the costs of these transfers. Future Research: Future research could explore Bitcoin (and other cryptocurrencies) adoption in other developing countries. Researchers could look at factors that influence cryptocurrency adoption in general. The factors affecting adoption of other cryptocurrencies can be compared to the results of this study, and similarities and differences can thus be identified.




ut

Multilevel Authentication System for Stemming Crime in Online Banking

Aim/Purpose: The wide use of online banking and technological advancement has attracted the interest of malicious and criminal users with a more sophisticated form of attacks. Background: Therefore, banks need to adapt their security systems to effectively stem threats posed by imposters and hackers and to also provide higher security standards that assure customers of a secured environment to perform their financial transactions. Methodology : The use of authentication techniques that include the mutual secure socket layer authentication embedded with some specific features. Contribution: An approach was made through this paper towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment. Findings: The use of soft token as the final stage of authentication provides ease of management with no additional hardware requirement. Recommendations for Practitioners : This work is an approach made towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment to stem cybercrime. Recommendation for Researchers: With this approach, a reliable system of authentication is being suggested to stem the growing rate of hacking activities in the information technology sector. Impact on Society :This work if adopted will give the entire populace confidence in carrying out online banking without fear of any compromise. Future Research: This work can be adopted to model a real-life scenario.




ut

Contextualist Inquiry into E-Commerce Institutionalization in Developing Countries: The Case of Mozambican Women-led SMMES

Aim/Purpose: This study explores how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce by focusing on the ongoing interaction between the SMME, its context, and process of e-commerce institutionalization. Background: It is believed that institutionalization of e-commerce provides significant benefits of unlimited access to new markets, and access to new, improved, inexpensive and convenient operational methods of transacting. Although prior studies have examined the adoption of e-commerce and the enabling and constraining factors, few have examined e-commerce (i) institutionalization (that is, post-adoption), and (ii) from a gender perspective. This study aims to respond to this paucity in the literature by exploring how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce. Methodology: The study follows a qualitative inquiry approach for both data collection and analysis. Semi-structured interviews were adopted for data collection and thematic analysis implemented on the data. SMMEs were purposively sampled to allow for the selection of information-rich SMMEs for study and specifically those that have gone through the experience of adoption and in some cases have institutionalized e-commerce. Contribution: The empirical findings explain how the institutionalization process from interactive e-commerce to transactive e-commerce unfolds in the Mozambican context. Findings: Transition from interactive to transactive e-commerce is firstly influenced by (i) the type of business the SMME is engaged in; and (ii) customer and trading partner’s readiness for e-commerce. Secondly, the transition process is influenced by the internal factors of (i) manager’s demographic factors; (ii) mimetic behaviour arising from exposure to (foreign) organizations in the same industry that have mature forms of e-commerce; (iii) the business networks developed with some of these organizations that have mature forms of e-commerce; (iv) access to financial resources; and (v) social media technologies. Thirdly, the process is influenced by external contextual factors of (i) limited government intervention towards e-commerce endeavors; (ii) limited to lack of financial institutions readiness for e-commerce; (iii) lack of local available IT expertise; (iv) consumer’s low purchasing power due to economic recessions; (vi) international competitive pressure; and (vii) sociocultural practices. Recommendations for Practitioners: The study provides SMME managers, practitioners, and other stakeholders concerned with women’s development with a better understanding of the process in order to develop appropriate policies and interventions that are suitable for the reality of women-led SMMEs in Mozambique and other developing countries with similar contextual characteristics. Recommendation for Researchers: The study contributes to the existing debate of e-commerce and the use of ICT for development in developing countries by providing a distinct contribution of the institutionalization process and how the contextual structures influence this process. Impact on Society: Women-led SMME managers can learn from the different experiences, and compare their e-commerce efforts with SMMEs that were able to institutionalize and make strategies for improvements within their organizations. Future Research: The manner in which women-led SMMEs employ e-commerce requires further investigation to understand how issues related to gender, the cultural context, and different regions or countries impact this process.




ut

The Role of Social Network in Family Business Diversification: Evidence from South Eastern Nigeria

Aim/Purpose: This study seeks to investigate if participation in business association’s programs through the traditional and new media platforms influences family businesses in South Eastern Nigeria to diversify into similar or different businesses. Background: Before the advances in information and communication technology, businesses were carried on via the traditional media. The application of these advances has changed the way business communications and transactions are conducted globally in both family and non-family businesses. Businesses are adapting to today’s turbulent environment by opening similar or different businesses in the same or different locations that are hinged on the traditional and new media platforms. Nigerians are largely involved in social network through the traditional (face-to-face contact) and new media (e.g., Facebook, WhatsApp, Twitter, YouTube and Instagram). Moreover, in spite of the commonplaceness of family businesses in Nigeria, these businesses still experience weak diversification, bankruptcy and loss of socio-emotional wealth. Consequent upon the foregoing, this paper specifically investigates if involvement in social network via the traditional media (i.e., participation in business association’s meetings, workshops, seminars) and the new media (i.e., participation in the business association’s interactive sessions on trending business issues through the association’s online social platform like WhatsApp, Twitter), influence family businesses in South Eastern Nigeria to diversify into similar or different businesses. Methodology: The study adopted a qualitative methodology. The qualitative data were generated via interview involving 30 purposively selected businesses from South Eastern Nigeria. This comprises 15 family businesses each that have respectively adopted related and unrelated diversification strategies. Two respondents (i.e., the business owner and a top level manager) each were drawn from the selected businesses. In all, 60 respondents were interviewed. Since the unit of analysis is the family business, the interview transcriptions from all the respondents were subjected to thematic content analysis on the basis of the family businesses. Contribution: Active involvement and participation in all the meetings, discussions, workshops and seminars of the social network via the traditional and new media platforms facilitates the adoption of related or unrelated diversification in family businesses. Moreover, the adoption of similar social network platforms like WhatsApp and Twitter in all the relationships among and between employees and managers, and the transactions of the businesses is one of the key factors for achieving successful related or unrelated diversification in family businesses. Findings: In spite of the risky nature of the business environment, the adoption of related diversification strategies is significantly influenced by resources such as business consultancy services garnered through the traditional and new media platforms of the social network. Also, family businesses that are actively involved in a social network where the actors interact through the traditional and new media are influenced by the resources acquired to consider adopting unrelated diversification. These resources include: better understanding of the nature of business challenges, environments and experiences; and different lines of businesses. Thus, the traditional and new media platforms are complementary in their roles. Recommendations for Practitioners: Family business owner-managers could use the findings to develop related or unrelated strategies for diversifying into existing or new markets. This can be through the localization of manufacturing plant, improvement of product packaging, sitting of sales outlet closer to the consumers, introduction of lower prices for products/services, introduction of new and better ways of service delivery, or development of more compelling promotion strategies. Recommendation for Researchers: As a veritable guide, this study could guide future researchers in the formulation of their objectives, selection of instrument for data collection and respondents, and adoption of method of data analysis. Impact on Society: Successful diversification suggests the establishment of new or more businesses. Consequently, these new or more family businesses are expected to translate to more employment opportunities and by extension reduction in unemployment and poverty rates in the society. Future Research: Further studies should be carried out to enhance the development of family businesses, contribute to the existing literature and ensure the generalization of the findings.




ut

Knowledge Sharing Process and Innovation Success: Evidence from Public Organisations in Southern Nigeria

Aim/Purpose: This study investigates the relationship between knowledge sharing process and innovation success with specific emphasis on tacit knowledge. Based on the literature review, we hypothesised that knowledge donating and collecting have a positive relationship with innovation success. Methodology: The hypotheses were empirically tested using the partial least square path modelling with data collected from twelve state-owned public organisations operating in Southern Nigeria. Contribution: The research made distinct empirical contributions to the burgeoning literature on knowledge sharing and innovation from the public sector and developing country context. Findings: Knowledge donating and collecting contribute to innovation success positively and significantly. Knowledge donating effect on innovation success was found to be more significantly positive than the effect of knowledge collecting on innovation success. Recommendations for Practitioners: Public organisations should promote a supportive culture to spur innovation through the frequent share of experiences, information and skills among the various knowledge actors. Public managers should convey the importance of knowledge sharing and its value to knowledge users in clear terms and attend to creating conditions or contexts that encourage people to share knowledge freely and willingly with others. It is apt to improve organisational commitment and support for knowledge sharing activities such as mentorship programs, workshops, conferences, seminars and other related training and development programs in order to provide opportunities for employees to develop innovation competencies from the transfer of tacit knowledge developed over time from experience. To optimise innovation outcomes from knowledge sharing practices, knowledge sharing should be in tandem with the industry or global best practices. Future Research: Future studies should add interviews to provide depth in terms of insights and substance to the questionnaire, and may extend to public organisation with different ownership structure.




ut

The Role of Job Satisfaction in Turnover and Turn-away Intention of IT Staff in South Africa

Aim/Purpose: This study forms part of the World IT Project, which aims to gain a deeper understanding of individual, personal and organisational factors influencing IT staff in a modern, work environment. The project also aims to provide a global view that complements the traditional American/Western view. The purpose of this study is to investigate and report on some of these factors, in particular, the role that job satisfaction has in turnover intention (i.e., changing jobs within the IT industry) and turn-away intention (i.e., moving to another industry other than IT) in South Africa. Background: Several studies have reported on the importance of an employee’s job satisfaction to organisation success, and the various factors that influence it. Most studies on job satisfaction adopted a Westernised and not a global view. Very few empirical studies have been conducted on job satisfaction of IT workers in South Africa. This paper reports on the individual, personal and organisational factors that influence the job satisfaction of IT staff in South Africa. Methodology: The study uses statistical analysis of survey data acquired through the World IT Project. Both online and paper based questionnaires were used. A sample size of 301 respondents was obtained from the survey, which was conducted over a period of 6 months during 2017. The factors that influence IT job satisfaction were analysed using correlation analysis, multiple regression analysis and discriminant analysis. The factors investigated were employee and organisational demographics, aspects of occupational culture, and various job-related individual issues. Contribution: This paper presents the only study focused specifically on turnover and turn-away intention amongst IT staff in South Africa. The final proposed model, grounded in the empirical dataset, clearly shows job satisfaction as a strong mediating construct explaining most of the variance in the IT professional’s intention to leave the organisation (i.e. their turnover intention) and the industry (i.e. their turn-away intention). Findings: The findings revealed that there was a significant correlation between job satisfaction and turnover intention as well as between job satisfaction and turn-away intention of IT staff. Perceived professional self-efficacy, strain and experience were also highly correlated with turnover intention. Professional self-efficacy was also significantly correlated with turn-away intention. Based on the analyses that were conducted, a research model is presented that shows the relationships between the various antecedents of turnover and turn-away intention. Recommendations for Practitioners: Managers in organisations dealing with the shortage of IT skills can use the model to plan interventions to reduce IT staff turnover rates by focussing on addressing the identified individual issues such as strain, job (in)security and work load as well as the personal value and IT occupational culture issues. Recommendation for Researchers: Researchers in the field of IT staff recruitment and management can find value for their research in the proposed refined model of IT job satisfaction and turnover intention. Future research could possibly replicate the study in other countries or could focus on different factors. Impact on Society: IT skills play a crucial role in society today and are therefore in high demand. However, this demand is not being satisfied by the current rate of supply. Research into what factors influence IT staff to leave the organisation or the industry can assist managers with improving their employee relations and job conditions so as to reduce this turnover and increase organisations’ and society’s competitiveness and economic growth. Future Research: It would be interesting to determine if the findings are similar for a sample of smaller organisations and/or younger IT employees since this study focussed on larger organisations and more experienced staff. Future research could also compare the findings of South African organisations with those in other countries.




ut

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.




ut

Software as a Service (SaaS) Cloud Computing: An Empirical Investigation on University Students’ Perception

Aim/Purpose: This study aims to propose and empirically validate a model and investigates the factors influencing acceptance and use of Software as a Services cloud computing services (SaaS) from individuals’ perspectives utilizing an integrative model of Theory of Planned Behavior (TPB) and Technology Acceptance Model (TAM) with modifications to suit the objective of the study. Background: Even though SaaS cloud computing services has gained the acceptance in its educational and technical aspects, it is still expanding constantly with emerging cloud technologies. Moreover, the individual as an end-user of this technology has not been given the ample attention pertaining to SaaS acceptance and adoption (AUSaaS). Additionally, the higher education sector needs to be probed regarding AUSaaS perception, not only from a managerial stance, but also the individual. Hence, further investigation in all aspects, including the human factor, deserves deeper inspection. Methodology: A quantitative approach with probability multi-stage sampling procedure conducted utilizing survey instrument distributed among students from three public Malaysian universities. The valid collected responses were 289 Bachelor’s degree students. The survey included the demographic part as well as the items to measure the constructs relationships hypothesized. Contribution: The empirical results disclosed the appropriateness of the integrated model in explaining the individual’s attitude (R2 = 57%), the behavior intention (R2 = 64%), and AUSaaS at the university settings (R2 = 50%). Also, the study offers valuable findings and examines new relationships that considered a theoretical contribution with proven empirical results. That is, the subjective norms effect on attitude and AUSaaS is adding empirical evidence of the model hypothesized. Knowing the significance of social effect is important in utilizing it to promote university products and SaaS applications – developed inside the university – through social media networks. Also, the direct effect of perceived usefulness on AUSaaS is another important theoretical contribution the SaaS service providers/higher education institutes should consider in promoting the usefulness of their products/services developed or offered to students/end-users. Additionally, the research contributes to the knowledge of the literature and is considered one of the leading studies on accepting SaaS services and applications as proliferation of studies focus on the general and broad concept of cloud computing. Furthermore, by integrating two theories (i.e., TPB and TAM), the study employed different factors in studying the perceptions towards the acceptance of SaaS services and applications: social factors (i.e., subjective norms), personal capabilities and capacities (i.e., perceived behavioral control), technological factors (i.e., perceived usefulness and perceived ease of use), and attitudinal factors. These factors are the strength of both theories and utilizing them is articulated to unveil the salient factors affecting the acceptance of SaaS services and applications. Findings: A statistically positive significant influence of the main TPB constructs with AUSaaS was revealed. Furthermore, subjective norms (SN) and perceived usefulness (PU) demonstrated prediction ability on AUSaaS. Also, SN proved a statically significant effect on attitude (ATT). Specifically, the main contributors of intention are PU, perceived ease of use, ATT, and perceived behavioral control. Also, the proposed framework is validated empirically and statistically. Recommendation for Researchers: The proposed model is highly recommended to be tested in different settings and cultures. Also, recruiting different respondents with different roles, occupations, and cultures would likely draw more insights of the results obtained in the current research and its generalizability Future Research: Participants from private universities or other educational institutes suggested in future work as the sample here focused only on public sector universities. The model included limited number of variables suggesting that it can be extended in future works with other constructs such as trialability, compatibility, security, risk, privacy, and self-efficacy. Comparison of different ethnic groups, ages, genders, or fields of study in future research would be invaluable to enhance the findings or reveal new insights. Replication of the study in different settings is encouraged.




ut

Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa

Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving.




ut

Adoption of Telecommuting in the Banking Industry: A Technology Acceptance Model Approach

Aim/Purpose: Currently, the world faces unprecedented challenges due to COVID-19, particularly concerning individuals’ health and livelihood and organizations and industrial performance. Indeed, the pandemic has caused rapid intensifying socio-economic effects. For instance, organizations are shifting from traditional working patterns toward telecommuting. By adopting remote working, organizations might mitigate the impact of COVID-19 on their workforce, explicitly concerning their safety, wellbeing, mobility, work-life balance, and self-efficiency. From this perceptive, this study examines the factors that influence employees’ behavioral intention to adopt telecommuting in the banking industry. Background: The study’s relevance stems from the fact that telecommuting and its benefits have been assumed rather than demonstrated in the banking sector. However, the pandemic has driven the implementation of remote working, thereby revealing possible advantages of working from home in the banking industry. The study investigated the effect of COVID-19 in driving organizations to shift from traditional working patterns toward telecommuting. Thereby, the study investigates the banking sector employees’ behavioral intention to adopt telecommuting. Methodology: The study employed a survey-based questionnaire, which entails gathering data from employees of twelve banks in Jordan, as the banking sector in Jordan was the first to transform from traditional working to telecommuting. The sample for this research was 675 respondents; convenience sampling was employed as a sampling technique. Subsequently, the data were analyzed with the partial least square structural equation modeling (PLS-SEM) to statistically test the research model. Contribution: Firstly, this study provides a deep examination and understanding of facilitators of telecommuting in a single comprehensive model. Secondly, the study pro-vides a deeper insight into the factors affecting behavioral intention towards telecommuting from the employees’ perspective in the banking sector. Finally, this study is the first to examine telecommuting in the emerging market of Jordan. Thereby, this study provides critical recommendations for managers to facilitate the implementation of telecommuting. Findings: Using the Technology Acceptance Model (TAM), this study highlights significant relationships between telecommuting systems, quality, organizational support, and the perceived usefulness and ease of use in telecommuting. Employees who perceive telecommuting systems to be easy and receive supervision and training for using these systems are likely to adopt this work scheme. The results present critical theoretical and managerial implications regarding employees’ behavioral intentions toward telecommuting. Recommendations for Practitioners: This study suggests the importance of work-life balance for employees when telecommuting. Working from home while managing household duties can create complications for employees, particularly parents. Therefore, flexibility in terms of working hours is needed to increase employees’ acceptance of telecommuting as they will have more control over their life. These increase employees’ perceived self-efficacy with telecommuting, which smooths the transition toward remote working in the future. In addition, training will allow employees to solve technical issues that can arise from using online systems. Recommendation for Researchers: This study focused on the context of the banking sector. The sensitivity of data and transactions in this sector may influence employers’ and employees’ willingness to work remotely. In addition, the job descriptions of employees in banks moderate specific factors outlined in this model, including work-life balance. For instance, executive managers may have a higher overload in banks in contrast to front-line employees. Thus, future studies should explore different contexts, including manufacturing and consultation, to understand the industry’s effect on remote working. Similarly, future research should concentrate on the influence of job descriptions on employees’ intentions toward telecommuting. Impact on Society: The COVID-19 pandemic created a sudden shift towards telecommuting, which made employees struggle to adopt new work schemes. Therefore, managers had to provide training for their employees to be well prepared and increase their acceptance of telecommuting. Furthermore, telecommuting has a positive effect on work-life balance, it provides employees with the flexibility to organize their daily schedule into more activities. Along the same line, the study highlighted the correlation between work-life balance and telecommuting. Such a relationship provides further evidence for the need to understand employees’ lifestyles in facilitating the adoption of telecommuting. Moreover, the study extends the stream of literature by outlining critical factors affecting employees’ acceptance of telecommuting. Future Research: Future studies should explore different contexts, including manufacturing and consultation, to understand the industry’s effect on remote working. Similarly, future research should concentrate on the influence of job descriptions on employees’ intentions toward telecommuting. Furthermore, the research team conducted the study by surveying 12 banks. Future research recommends surveying the whole banking industry to add more validation to the model.




ut

Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems

Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed.




ut

Traits Contributing to the Promotion of the Individual’s Continuance Usage Intention and Perceived Value of M-University Services

Aim/Purpose: This study aims to examine the roles of key traits of m-university services and their users in promoting two crucial post-adoption outcomes of these services; namely, continuance usage intention and perceived value. Background: M-university (i.e., a university providing services via mobile technologies) has gained a great interest in the higher education sector as a driver of new business models and innovative service offerings. However, its assessment has been greatly overlooked, especially in evaluating the factors that drive the stakeholders’ continuance intention to use it and the determinants of its post-adoption perceived value. Consequently, research efforts undertaking such assessment facets empirically are highly required. Methodology: An integrated research model that enables such assessment was developed and evaluated using a quantitative research methodology. Accordingly, data were collected using a formulated closed-ended survey questionnaire. The target population consisted of the academic staff of a Saudi public university that has witnessed an extensive adoption of m-university services. The obtained data (i.e., 207 fully completed responses) were evaluated using the structural equation modeling approach. Contribution: To the best of our knowledge, this is the first study that gains the chance to provide the research community and m-service providers with new knowledge and understanding about the predictors that drive the continuance usage intention and value of m-university services. Findings: The findings showed that all of the examined traits of m-university services and their users (i.e., reliability, usability, customization, self-efficacy, and involvement) are having positive roles in promoting the continuance intention to use these services, while only two traits (i.e., reliability and involvement) contribute significantly to augmenting the perceived value. Recommendations for Practitioners: The study recommends developing effective design and implementation specifications that strengthen the contributions of the examined traits in the post-adoption stage of m-university services. Recommendation for Researchers: Further studies should be devoted to addressing the notable need to assess the factors influencing the adoption of m-university services, as well as to explore which ones are having significant roles in the attainment of post-adoption outcomes. Impact on Society: The empirical insights provided by the present study are essential for both university stakeholders and mobile service providers in their endeavors to improve the key aspects of the anticipated post-adoption outcomes of the provided services. Future Research: Further empirical investigations are needed to examine the roles of more m-university services and user traits in achieving a broad range of post-adoption outcomes of such services.




ut

BITCOIN: An Exploratory Study Investigating Adoption in South Africa

Aim/Purpose: This paper identified and explored the factors influencing Bitcoin adoption and use in South Africa. Background: Since its introduction in 2008, the value and popularity of Bitcoin has risen exponentially. Captivating the eyes of the world, from regulators to economists, Bitcoin promises to revolutionize the digital currency space. Despite being over 10 years old, the concept of cryptocurrency is fairly new in South Africa, a developing country. South African’s interest in Bitcoin continues to grow with the country constantly ranking within the top 10 in online searches for “Bitcoin” and “cryptocurrency” on Google. The primary objective of this research was to identify adoption factors amongst South African citizens, an area that has not received much research focus in the past. In addition to this, the study aimed to identify how Bitcoin is primarily used in South Africa. Methodology: A survey-based questionnaire was utilized to obtain responses from adopters of Bitcoin in South Africa. The quantitative survey was completed by 204 respondents. Contribution: This research contributes to the body of knowledge relating to Bitcoin adoption, specifically from a developing country. Adoption factors are identified that can be utilized by businesses that intend to adopt cryptocurrency, to strategically prepare for the potential risks or opportunities brought about by Bitcoin and cryptocurrency in general. Findings: The findings of this study indicate that while perceived usefulness, perceived ease of use, subjective norms, and facilitating conditions positively influence intention to adopt Bitcoin, trust was the only construct that is statistically significant and hence is the greatest driver of adoption in South Africa. In terms of its primary use in South Africa, the study revealed that Bitcoin is used as a speculative instrument for short-term trading in South Africa followed by being used as a long-term investment in the crypto-asset class. No respondent indicated that they utilize Bitcoin as a payment method in South Africa. Recommendations for Practitioners: When developing crypto-based investment products, custodians of assets must ensure that a minimum-security protocol is followed to safeguard these assets. This will enhance the trust that potential investors and customers have in their systems and products. Recommendation for Researchers: This study focused on adoption factors for South African citizens. Future studies should be conducted to identify adoption factors by businesses in South Africa. Impact on Society: Bitcoin offers an alternate trading instrument and investment option, with the possibility of large gains over a relatively short period. Bitcoin also presents the possibility of cross-border transactions at a significantly lower cost compared to traditional cross-border transfers of funds. Future Research: Studies should be conducted to explore the factors influencing the adoption of altcoins to determine if the technological differences influence the adoption of one currency over the other. Research should also be conducted comparing the taxation of cryptocurrency in various countries around the world.




ut

NOTICE OF RETRACTION: The Influence of Ethical and Transformational Leadership on Employee Creativity in Malaysia's Private Higher Education Institutions: The Mediating Role of Organizational Citizenship Behaviour

Aim/Purpose: ************************************************************************ After its investigation, the Research Ethics, Integrity, and Governance team at RMIT University found that the primary author of this paper breached the Australian Code and/or RMIT Policy and requested that the article be retracted. ************************************************************************** This paper aimed to examine the influence of ethical and transformational leadership on employee creativity in Malaysia’s private higher education institutions (PHEIs) and the mediating role of organizational citizenship behavior. Background: To ensure their survival and success in today’s market, organizations need people who are creative and driven. Previous studies have demonstrated the importance of ethical leadership in fostering employee innovation and good corporate responsibility. Research on ethical leadership and transformational leadership, in particular, has played a significant role in elucidating the role of leadership in relation to organizational citizenship behavior (OCB). In this study, we have focused on ethical and transformational leadership as an antecedent for enhancing employee creativity. Despite an increase in leadership research, little is known about the underlying mechanisms that link ethical leadership and transformational leadership to OCB. Because it sheds light on factors other than ethical leadership and transformational leadership that influence employees’ extra-role activity, this research is relevant theoretically. OCB may have a mediating function between ethical leadership and transformational leadership style and employee creativity because it is associated with the greatest outcomes, but empirical research has yet to prove this. So, one of the study’s goals is to add to the hypotheses about how ethical leadership style and transformational leadership affect employee creativity by using an important mediating variable – OCB. Methodology: This study adopted a quantitative approach based on a cross-sectional survey and descriptive design to gather the data in a specific period. A convenient sampling approach was used to gauge 275 employees from Malaysia’s PHEIs. To test the hypotheses and obtain a conclusion, the acquired data was analyzed using the partial least square technique (PLS-SEM). Contribution: The study contributes to leadership literature by advancing OCB as a mediating factor that accounts for the link between ethical and transformational leadership and employee creativity in the higher education sector. Findings: According to the research, OCB has a substantial influence on the creativity of employees. Furthermore, ethical leadership boosted OCB and boosted employee creativity, according to the research. OCB and employee creativity have both been demonstrated to benefit greatly from transformational leadership. Further research revealed that OCB is a mediating factor in the link between leadership styles and creative thinking among employees. Recommendations for Practitioners: Higher education institutions should focus on developing leaders who value transparency and self-awareness in their interactions with followers and who demonstrate an inner moral perspective in addition to balanced information processing to ensure positive outcomes at the individual and organizational levels. Higher education institutions should place a priority on hiring leaders that exhibit ethical and transformational traits to raise awareness of these leadership styles among employees. Recommendation for Researchers: The new study also adds significantly to the body of knowledge by examining the relationship between ethical and transformational leadership and the creativity of the workforce. It aimed to identify the relationship between transformational leadership style and individual creativity in higher education by examining the mediating influence of OCB. Impact on Society: Higher education institutions should devise strategies for developing ethical and transformative leaders who will assist boost OCB and creativity within their workforce. Students and faculty in higher education can benefit from these leadership methods by learning to think in more diverse ways and by developing thought processes that lead to a larger pool of innovative ideas and solutions. As a consequence, employees who show creative behavior may be effectively managed by leaders who utilize ethical and transformational leadership styles and motivate them to show OCB that allow them to solve creative problems creatively. Future Research: A mixed-methods approach should be used in future research, and this should be done in public institutions in developing and developed nations to put the findings to use and generalize them even further. Future research will be able to examine other mediators to learn more about how and why ethical and transformational leadership styles affect PHEI employees’ creativity.




ut

Maternal Recommender System Systematic Literature Review: State of the Art and Future Studies

Aim/Purpose: This paper illustrates the potential of health recommender systems (HRS) to support and enhance maternal care. The study aims to explore the recent implementations of maternal HRS and to discover the challenges of the implementations. Background: The sustainable development goals (SDG) aim to reduce maternal mortality to less than 70 per 100,000 live births by 2030. However, progress is uneven between countries, with primary causes being severe bleeding, infections, high blood pressure, and failed abortions. Regular antenatal care (ANC) visits are crucial for detecting and managing complications, such as hypertensive illnesses, anemia, and gestational diabetes mellitus. Utilizing maternal evaluations during ANC visits can help identify and treat problems early, lowering morbidity and death rates for both mothers and fetuses. Technology-enabled daily health recording can help monitor pregnancy by providing actionable guides to patients and health workers based on patient status. Methodology: A systematic literature review was conducted using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) to identify maternal HRS reported in studies between November 2022 and December 2022. Information was subsequently extracted to understand the potential benefits of maternal HRS. Titles and abstracts of 1,851 studies were screened for the full-text screening, in which two reviewers independently selected articles and systematically extracted data using a predefined extraction form. Contribution: This study adds to the explorations of the challenges of implementing HRS for maternal care. This study also emphasizes the significance of explainability, data-driven methodologies, automation, and the necessity for integration and interoperability in the creation and deployment of health recommendation systems for maternity care. Findings: The majority of maternal HRS use a knowledge-based (constraint-based) ap-proach with more than half of the studies generating recommendations based on rules defined by experts or available guidelines. We also derived four types of interfaces that can be used for delivering recommendations. Moreover, patient health records as data sources can hold data from patients’ or health workers’ input or directly from the measurement devices. Finally, the number of studies in the pilot or demonstration stage is twice that in the sustained stages. We also discovered crucial challenges where the explainability of the methods was needed to ensure trustworthiness, comprehensibility, and effective enhancement of the decision-making process. Automatic data collection was also required to avoid complexity and reduce workload. Other obstacles were also identified where data integration between systems should be established and decent connectivity must be provided so that complete services can be admin-istered. Lastly, sustainable operations would depend on the availability of standards for integration and interoperability as well as sufficient financial sup-port. Recommendations for Practitioners: Developers of maternal HRS should consider including the system in the main healthcare system, providing connectivity, and automation to deliver better service and prevent maternal risks. Regulations should also be established to support the scale-up. Recommendation for Researchers: Further research is needed to do a thorough comparison of the recommendation techniques used in maternal HRS. Researchers are also recommended to explore more on this topic by adding more research questions. Impact on Society: This study highlights the lack of sustainability studies, the potential for scaling up, and the necessity for a comprehensive strategy to integrate the maternal recommender system into the larger maternal healthcare system. Researchers can enhance and improve health recommendation systems for maternity care by focusing on these areas, which will ultimately increase their efficacy and facilitate clinical practice integration. Future Research: Additional research can concentrate on creating and assessing methods to increase the explainability and interpretability of data-driven health recommender systems and integrating automatic measurement into the traditional health recommender system to enhance the anticipated outcome of antenatal care. Comparative research can also be done to assess how well various models or algorithms utilized in these systems function. Future research can also examine creative solutions to address resource, infrastructure, and technological constraints, such as connectivity and automation to help address the shortage of medical personnel in remote areas, as well as define tactics for long-term sustainability and integration into current healthcare systems.




ut

Predicting Software Change-Proneness From Software Evolution Using Machine Learning Methods

Aim/Purpose: To predict the change-proneness of software from the continuous evolution using machine learning methods. To identify when software changes become statistically significant and how metrics change. Background: Software evolution is the most time-consuming activity after a software release. Understanding evolution patterns aids in understanding post-release software activities. Many methodologies have been proposed to comprehend software evolution and growth. As a result, change prediction is critical for future software maintenance. Methodology: I propose using machine learning methods to predict change-prone classes. Classes that are expected to change in future releases were defined as change-prone. The previous release was only considered by the researchers to define change-proneness. In this study, I use the evolution of software to redefine change-proneness. Many snapshots of software were studied to determine when changes became statistically significant, and snapshots were taken biweekly. The research was validated by looking at the evolution of five large open-source systems. Contribution: In this study, I use the evolution of software to redefine change-proneness. The research was validated by looking at the evolution of five large open-source systems. Findings: Software metrics can measure the significance of evolution in software. In addition, metric values change within different periods and the significance of change should be considered for each metric separately. For five classifiers, change-proneness prediction models were trained on one snapshot and tested on the next. In most snapshots, the prediction performance was excellent. For example, for Eclipse, the F-measure values were between 80 and 94. For other systems, the F-measure values were higher than 75 for most snapshots. Recommendations for Practitioners: Software change happens frequently in the evolution of software; however, the significance of change happens over a considerable length of time and this time should be considered when evaluating the quality of software. Recommendation for Researchers: Researchers should consider the significance of change when studying software evolution. Software changes should be taken from different perspectives besides the size or length of the code. Impact on Society: Software quality management is affected by the continuous evolution of projects. Knowing the appropriate time for software maintenance reduces the costs and impacts of software changes. Future Research: Studying the significance of software evolution for software refactoring helps improve the internal quality of software code.




ut

Unveiling Roadblocks and Mapping Solutions for Blockchain Adoption by Governments: A Systematic Literature Review

Aim/Purpose: Blockchain technology (BCT) has emerged as a potential catalyst for transforming government institutions and services, yet the adoption of blockchain in governments faces various challenges, for which previous studies have yet to provide practical solutions. Background: This study aims to identify and analyse barriers, potential solutions, and their relations in implementing BC for governments through a systematic literature review (SLR). The authors grouped the challenges based on the Technology-Organisation-Environment (TOE) framework while exercising a thematic grouping for the solutions, followed by a comprehensive mapping to unveil the relationship between challenges and solutions. Methodology: This study employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology, combined with the tollgate method, to improve the quality of selected articles. The authors further administer a three-level approach (open coding, axial coding, and selective coding) to analyse the challenges and solutions from the articles. Contribution: The authors argue that this study enriches the existing literature on BC adoption, particularly in the government context, by providing a comprehensive framework to analyse and address the unique challenges and solutions, thus contributing to the development of new theories and models for future research in BC adoption in government settings and fostering deeper exploration in the field. Findings: The authors have unveiled 40 adoption challenges categorised using the TOE framework. The most prevalent technological challenges include security concerns and integration & interoperability, while cultural resistance, lack of support and involvement, and employees’ capability hinder adoption at the organisational level. Notably, the environmental dimension lacks legal and standard frameworks. The study further unveils 28 potential solutions, encompassing legal frameworks, security and privacy measures, collaboration and governance, technological readiness and infrastructure, and strategic planning and adoption. The authors of the study have further mapped the solutions to the identified challenges, revealing that the establishment of legal frameworks stands out as the most comprehensive solution. Recommendations for Practitioners: Our findings provide a big picture regarding BC adoption for governments around the globe. This study charts the problems commonly encountered by government agencies and presents proven solutions in their wake. The authors endeavour practitioners, particularly those in governments, to embrace our findings as the cornerstone of BC/BCT adoption. These insights can aid practitioners in identifying existing or potential obstacles in adopting BC, pinpointing success factors, and formulating strategies tailored to their organisations. Recommendation for Researchers: Researchers could extend this study by making an in-depth analysis of challenges or solutions in specific types of countries, such as developed and developing countries, as the authors believe this approach would yield more insights. Researchers could also test, validate, and verify the mapping in this study to improve the quality of the study further and thus can be a great aid for governments to adopt BC/BCT fully. Impact on Society: This study provides a comprehensive exploration of BC adoption in the government context, offering detailed explanations and valuable insights that hold significant value for government policymakers and decision-makers, serving as a bedrock for successful implementation by addressing roadblocks and emphasising the importance of establishing a supportive culture and structure, engaging stakeholders, and addressing security and privacy concerns, ultimately enhancing the efficiency and effectiveness of BC adoption in government institutions and services. Future Research: Future research should address the limitations identified in this study by expanding the scope of the literature search to include previously inaccessible sources and exploring alternative frameworks to capture dynamic changes and contextual factors in BC adoption. Additionally, rigorous scrutiny, review, and testing are essential to establish the practical and theoretical validity of the identified solutions, while in-depth analyses of country-specific and regional challenges will provide valuable insights into the unique considerations faced by different governments.




ut

How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data

Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor.




ut

The Relationship Between Electronic Word-of-Mouth Information, Information Adoption, and Investment Decisions of Vietnamese Stock Investors

Aim/Purpose: This study investigates the relationship between Electronic Word-of-Mouth (EWOM), Information Adoption, and the stock investment of Vietnamese investors. Background: Misinformation spreads online, and a lack of strong information analysis skills can lead Vietnamese investors to make poor stock choices. By understanding how online conversations and information processing influence investment decisions, this research can help investors avoid these pitfalls. Methodology: This study applies Structural Equation Modelling (SEM) to investigate how non-professional investors react to online information and which information factors influence their investment decisions. The final sample includes 512 investors from 18 to 65 years old from various professional backgrounds (including finance, technology, education, etc.). We conducted a combined online and offline survey using a convenience sampling method from August to November 2023. Contribution: This study contributes to the growing literature on Electronic Word-of-Mouth (EWOM) and its impact on investment decisions. While prior research has explored EWOM in various contexts, we focus on Vietnamese investors, which can offer valuable insights into its role within a developing nation’s stock market. Investors, particularly those who are new or less experienced, are often susceptible to the influence of EWOM. By examining EWOM’s influence in Vietnam, this study sheds light on a crucial factor impacting investment behavior in this emerging market. Findings: The results show that EWOM has a moderate impact on the Information Adoption and investment decisions of Vietnamese stock investors. Information Quality (QL) is the factor that has the strongest impact on Information Adoption (IA), followed by Information Credibility (IC) and Attitude Towards Information (AT). Needs for Information (NI) only have a small impact on Information Adoption (IA). Finally, Information Adoption (IA) has a limited influence on investor decisions in stock investment. We also find that investors need to verify information through official sites before making investment decisions based on posts in social media groups. Recommendations for Practitioners: The findings suggest that state management and media agencies need to coordinate to improve the quality of EWOM information to protect investors and promote the healthy development of the stock market. Social media platform managers need to moderate content, remove false information, prioritize displaying authentic information, cooperate with experts, provide complete information, and personalize the experience to enhance investor trust and positive attitude. Securities companies need to provide complete, accurate, and updated information about the market and investment products. They can enhance investor trust and positive attitude by developing news channels, interacting with investors, and providing auxiliary services. Listed companies need to take the initiative to improve the quality of information disclosure and ensure clarity, comprehensibility, and regular updates. Use diverse communication channels and improve corporate governance capacity to increase investor trust and positive attitude. Investors need to seek information from reliable sources, compare information from multiple sources, and carefully check the source and author of the information. They should improve their investment knowledge and skills, consult experts, define investment goals, and build a suitable investment portfolio. Recommendation for Researchers: This study synthesized previous research on EWOM, but there is still a gap in the field of securities because each nation has its laws, regulations, and policies. The relationships between the factors in the model are not yet clear, and there is a need to develop a model with more interactive factors. The research results need to be further verified, and more research can be conducted on the influence of investor psychology, investment experience, etc. Impact on Society: This study finds that online word-of-mouth (EWOM) can influence Vietnamese investors’ stock decisions, but information quality is more important. Policymakers should regulate EWOM accuracy, fund managers should use social media to reach investors, and investors should diversify their information sources. Future Research: This study focuses solely on the stock market, while individual investors in Vietnam may engage in various other investment forms such as gold, real estate, or cryptocurrencies. Therefore, future research could expand the scope to include other investment types to gain a more comprehensive understanding of how individual investors in Vietnam utilize electronic word-of-mouth (EWOM) and adopt information in their investment decision-making process. Furthermore, while these findings may apply to other emerging markets with similar levels of financial literacy as Vietnam, they may not fully extend to countries with higher financial literacy rates. Hence, further studies could be conducted in developed countries to examine the generalizability of these findings. Finally, future research could see how EWOM’s impact changes over a longer period. Additionally, a more nuanced understanding of the information adoption process could be achieved by developing a research model with additional factors.




ut

Revolutionizing Autonomous Parking: GNN-Powered Slot Detection for Enhanced Efficiency

Aim/Purpose: Accurate detection of vacant parking spaces is crucial for autonomous parking. Deep learning, particularly Graph Neural Networks (GNNs), holds promise for addressing the challenges of diverse parking lot appearances and complex visual environments. Our GNN-based approach leverages the spatial layout of detected marking points in around-view images to learn robust feature representations that are resilient to occlusions and lighting variations. We demonstrate significant accuracy improvements on benchmark datasets compared to existing methods, showcasing the effectiveness of our GNN-based solution. Further research is needed to explore the scalability and generalizability of this approach in real-world scenarios and to consider the potential ethical implications of autonomous parking technologies. Background: GNNs offer a number of advantages over traditional parking spot detection methods. Unlike methods that treat objects as discrete entities, GNNs may leverage the inherent connections among parking markers (lines, dots) inside an image. This ability to exploit spatial connections leads to more accurate parking space detection, even in challenging scenarios with shifting illumination. Real-time applications are another area where GNNs exhibit promise, which is critical for autonomous vehicles. Their ability to intuitively understand linkages across marking sites may further simplify the process compared to traditional deep-learning approaches that need complex feature development. Furthermore, the proposed GNN model streamlines parking space recognition by potentially combining slot inference and marking point recognition in a single step. All things considered, GNNs present a viable method for obtaining stronger and more precise parking slot recognition, opening the door for autonomous car self-parking technology developments. Methodology: The proposed research introduces a novel, end-to-end trainable method for parking slot detection using bird’s-eye images and GNNs. The approach involves a two-stage process. First, a marking-point detector network is employed to identify potential parking markers, extracting features such as confidence scores and positions. After refining these detections, a marking-point encoder network extracts and embeds location and appearance information. The enhanced data is then loaded into a fully linked network, with each node representing a marker. An attentional GNN is then utilized to leverage the spatial relationships between neighbors, allowing for selective information aggregation and capturing intricate interactions. Finally, a dedicated entrance line discriminator network, trained on GNN outputs, classifies pairs of markers as potential entry lines based on learned node attributes. This multi-stage approach, evaluated on benchmark datasets, aims to achieve robust and accurate parking slot detection even in diverse and challenging environments. Contribution: The present study makes a significant contribution to the parking slot detection domain by introducing an attentional GNN-based approach that capitalizes on the spatial relationships between marking points for enhanced robustness. Additionally, the paper offers a fully trainable end-to-end model that eliminates the need for manual post-processing, thereby streamlining the process. Furthermore, the study reduces training costs by dispensing with the need for detailed annotations of marking point properties, thereby making it more accessible and cost-effective. Findings: The goal of this research is to present a unique approach to parking space recognition using GNNs and bird’s-eye photos. The study’s findings demonstrated significant improvements over earlier algorithms, with accuracy on par with the state-of-the-art DMPR-PS method. Moreover, the suggested method provides a fully trainable solution with less reliance on manually specified rules and more economical training needs. One crucial component of this approach is the GNN’s performance. By making use of the spatial correlations between marking locations, the GNN delivers greater accuracy and recall than a completely linked baseline. The GNN successfully learns discriminative features by separating paired marking points (creating parking spots) from unpaired ones, according to further analysis using cosine similarity. There are restrictions, though, especially where there are unclear markings. Successful parking slot identification in various circumstances proves the recommended method’s usefulness, with occasional failures in poor visibility conditions. Future work addresses these limitations and explores adapting the model to different image formats (e.g., side-view) and scenarios without relying on prior entry line information. An ablation study is conducted to investigate the impact of different backbone architectures on image feature extraction. The results reveal that VGG16 is optimal for balancing accuracy and real-time processing requirements. Recommendations for Practitioners: Developers of parking systems are encouraged to incorporate GNN-based techniques into their autonomous parking systems, as these methods exhibit enhanced accuracy and robustness when handling a wide range of parking scenarios. Furthermore, attention mechanisms within deep learning models can provide significant advantages for tasks that involve spatial relationships and contextual information in other vision-based applications. Recommendation for Researchers: Further research is necessary to assess the effectiveness of GNN-based methods in real-world situations. To obtain accurate results, it is important to employ large-scale datasets that include diverse lighting conditions, parking layouts, and vehicle types. Incorporating semantic information such as parking signs and lane markings into GNN models can enhance their ability to interpret and understand context. Moreover, it is crucial to address ethical concerns, including privacy, potential biases, and responsible deployment, in the development of autonomous parking technologies. Impact on Society: Optimized utilization of parking spaces can help cities manage parking resources efficiently, thereby reducing traffic congestion and fuel consumption. Automating parking processes can also enhance accessibility and provide safer and more convenient parking experiences, especially for individuals with disabilities. The development of dependable parking capabilities for autonomous vehicles can also contribute to smoother traffic flow, potentially reducing accidents and positively impacting society. Future Research: Developing and optimizing graph neural network-based models for real-time deployment in autonomous vehicles with limited resources is a critical objective. Investigating the integration of GNNs with other deep learning techniques for multi-modal parking slot detection, radar, and other sensors is essential for enhancing the understanding of the environment. Lastly, it is crucial to develop explainable AI methods to elucidate the decision-making processes of GNN models in parking slot detection, ensuring fairness, transparency, and responsible utilization of this technology.




ut

Data Lost, Decisions Made: Teachers in Routine and Emergency Remote Teaching

Aim/Purpose: This study explored teachers’ data-driven decision-making processes during routine and emergency remote teaching, as experienced during the COVID-19 pandemic. Background: Decision-making is essential in teaching, with informed decisions promoting student learning and teachers’ professional development most effectively. However, obstacles to the use of data have been identified in many studies. Methodology: Using a qualitative methodology (N=20), we studied how teachers make decisions, what data is available, and what data they would like to have to improve their decision-making. We used an inductive approach (bottom-up), utilizing teachers’ statements related to decision-making as the unit of analysis. Contribution: Our findings shed an important light on teachers’ Data-Driven Decision-Making (DDDM), highlighting the differences between routine and Emergency Remote Teaching (ERT). Findings: Overall, we found that teachers make teaching decisions in three main areas: pedagogy, discipline-related issues, and appearance and behavior. They shift between making decisions based on data and making decisions based on intuition. Academic-related decisions are the most prominent in routine teaching, and during ERT, they were almost the only area in which teachers’ decisions were made. Teachers reported collecting data about students’ academic achievements and emotional state and considered the organizational culture, consultation with colleagues, and parents’ involvement before decision-making. Recommendations for Practitioners: Promote a culture of data-driven decision-making across the education system; Make diverse and rich data of different types accessible to teachers; Increase professional and emotional support for teachers. Recommendation for Researchers: Researchers have the potential to expand the scope of this study by conducting research using other methodologies and in different countries. Impact on Society: This study highlights the importance of teachers’ data-driven decision-making in improving teaching practices and promoting students’ achievement. Future Research: Additional research is required to examine data-driven decision-making in diverse circumstances.




ut

Navigating the Future: Exploring AI Adoption in Chinese Higher Education Through the Lens of Diffusion Theory

Aim/Purpose: This paper aims to investigate and understand the intentions of management undergraduate students in Hangzhou, China, regarding the adoption of Artificial Intelligence (AI) technologies in their education. It addresses the need to explore the factors influencing AI adoption in the educational context and contribute to the ongoing discourse on technology integration in higher education. Background: The paper addresses the problem by conducting a comprehensive investigation into the perceptions of management undergraduate students in Hangzhou, China, regarding the adoption of AI in education. The study explores various factors, including Perceived Relative Advantage and Trialability, to shed light on the nuanced dynamics influencing AI technology adoption in the context of higher education. Methodology: The study employs a quantitative research approach, utilizing the Confirmatory Tetrad Analysis (CTA) and Partial Least Squares Structural Equation Modeling (PLS-SEM) methodologies. The research sample consists of management undergraduate students in Hangzhou, China, and the methods include data screening, principal component analysis, confirmatory tetrad analysis, and evaluation of the measurement and structural models. We used a random sampling method to distribute 420 online, self-administered questionnaires among management students aged 18 to 21 at universities in Hangzhou. Contribution: This paper explores how management students in Hangzhou, China, perceive the adoption of AI in education. It identifies factors that influence AI adoption intention. Furthermore, the study emphasizes the complex nature of technology adoption in the changing educational technology landscape. It offers a thorough comprehension of this process while challenging and expanding the existing literature by revealing the insignificant impacts of certain factors. This highlights the need for an approach to AI integration in education that is context-specific and culturally sensitive. Findings: The study highlights students’ positive attitudes toward integrating AI in educational settings. Perceived relative advantage and trialability were found to impact AI adoption intention significantly. AI adoption is influenced by social and cultural contexts rather than factors like compatibility, complexity, and observability. Peer influence, instructor guidance, and the university environment were identified as pivotal in shaping students’ attitudes toward AI technologies. Recommendations for Practitioners: To promote the use of AI among management students in Hangzhou, practitioners should highlight the benefits and the ease of testing these technologies. It is essential to create communication strategies tailored to the student’s needs, consider cultural differences, and utilize the influence of peers and instructors. Establishing a supportive environment within the university that encourages innovation through policies and regulations is vital. Additionally, it is recommended that students’ attitudes towards AI be monitored constantly, and strategies adjusted accordingly to keep up with the changing technological landscape. Recommendation for Researchers: Researchers should conduct cross-disciplinary and cross-cultural studies with qualitative and longitudinal research designs to understand factors affecting AI adoption in education. It is essential to investigate compatibility, complexity, observability, individual attitudes, prior experience, and the evolving role of peers and instructors. Impact on Society: The study’s insights into the positive attitudes of management students in Hangzhou, China, toward AI adoption in education have broader societal implications. It reflects a readiness for transformative educational experiences in a region known for technological advancements. However, the study also underscores the importance of cautious integration, considering associated risks like data privacy and biases to ensure equitable benefits and uphold educational values. Future Research: Future research should delve into AI adoption in various academic disciplines and regions, employing longitudinal designs and qualitative methods to understand cultural influences and the roles of peers and instructors. Investigating moderating factors influencing specific factors’ relationship with AI adoption intention is essential for a comprehensive understanding.




ut

Decoding YouTube Video Reviews: Uncovering The Factors That Determine Video Review Helpfulness

Aim/Purpose: This study aims to identify the characteristics of YouTube video reviews that consumers utilize to evaluate review helpfulness and explores how they process such information. This study aims to investigate the effect of argument quality, review popularity, number of likes, and source credibility on consumers’ perception of YouTube’s video review helpfulness. Background: Video reviews posted on YouTube are an emerging form of online reviews, which have the potential to be more helpful than textual reviews due to their visual and audible cues that deliver more vivid information about product features and specifications. With the availability of an enormous number of video reviews with unpredictable quality, it becomes challenging for consumers to find helpful reviews without consuming significant time and effort. In addition, YouTube does not provide a specific feature that indicates a review helpfulness similar to the one found on e-commerce websites. Consequently, consumers have to examine the characteristics of video reviews that are readily available on YouTube, evaluate them, and form a perception of whether a review is helpful or not. Despite the increasing popularity of YouTube’s video reviews, video reviews’ helpfulness received inadequate attention in the literature. The antecedents of the helpfulness of online video reviews are still underinvestigated, and more research is needed to identify the characteristics that consumers depend upon to assess video review helpfulness. Furthermore, it is important to understand how consumers process the information they gain from these characteristics to form a perception of their helpfulness. Methodology: Following an extended investigation of the relevant literature, we identified four key video characteristics that consumers presumably utilize to evaluate review helpfulness on YouTube (i.e., review popularity, number of likes, source credibility, and argument quality). By employing the Elaboration Likelihood Model (ELM), we classified these characteristics along the central and peripheral routes. The central route characteristics require a high cognitive effort by consumers to process the review’s message and reach a logical decision. In contrast, the peripheral route assumes that consumers judge the review’s message based on superficial qualities without substantial cognitive effort. A research model is introduced to investigate the effect of central and peripheral cues and their corresponding video review characteristics on review helpfulness. Accordingly, argument quality is proposed in the central route of the model, while review popularity, number of likes, and source credibility are proposed in the peripheral route. Furthermore, the study investigates how consumers process the information they obtain from these routes jointly or independently. To empirically test the proposed model, a convenient sample of 361 YouTube users was obtained through an online survey. The partial least squares method was used to investigate the effect of the proposed characteristics on video review helpfulness. Contribution: This study contributes to the literature in several ways. First, it is one of the few studies that investigate online video reviews’ helpfulness. Second, this study identifies several unique characteristics of YouTube’s video reviews that span peripheral and central routes, which potentially contribute to review helpfulness. Third, this study proposes a conceptual model based on the ELM to explore the effect of central and peripheral cues and their corresponding review characteristics on review helpfulness. Fourth, the research findings provide implications for research and practice that advance the theoretical understanding of video reviews’ helpfulness and serve as guidelines to create more helpful video reviews by better understanding the consumer’s cognitive processes. Findings: The results show that among the four characteristics proposed in the research model, argument quality in the central route is the strongest determinant factor affecting video review helpfulness. Results also show that review popularity, source credibility, and the number of likes in the peripheral route have significant effects on video review helpfulness. Altogether, our results show that the effect of the peripheral route adds up to 0.463 compared to 0.430, which is the impact magnitude of the argument quality construct in the central route. Based on the comparable effect magnitude of the central and peripheral routes of the model on video review helpfulness, our results indicate that both peripheral and central cues significantly affect consumers’ perception of video review helpfulness. The two routes are not mutually exclusive, and their cues can be processed in parallel or consecutive ways. Recommendations for Practitioners: The study recommends creating a dedicated category for reviews on YouTube with a specific feature for consumers to indicate the helpfulness of a video review, similar to the helpful vote button in textual reviews. The study also recommends that reviewers deliver more appealing and convincing argument quality, work toward improving their credibility, and understand the factors that contribute to video popularity. Impact on Society: Identifying the characteristics that affect video review helpfulness on YouTube helps consumers access helpful reviews more efficiently and improves their purchase decisions. Future Research: Future research could look into different types of data that could be extracted from YouTube to investigate the helpfulness of online video reviews. Future studies could employ machine learning and sentiment analysis techniques to reach more insights. Future research could also investigate the effect of product types in the context of online video reviews.




ut

Continued Usage Intention of Mobile Learning (M-Learning) in Iraqi Universities Under an Unstable Environment: Integrating the ECM and UTAUT2 Models

Aim/Purpose: This study examines the adoption and continued use of m-learning in Iraqi universities amidst an unstable environment by extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) and Expectation-Confirmation Model (ECM) models. The primary goal is to address the specific challenges and opportunities in Iraq’s higher education institutions (HEIs) due to geopolitical instability and understand their impact on student acceptance, satisfaction, and continued m-learning usage. Background: The research builds on the growing importance of m-learning, especially in HEIs, and recognizes the unique challenges faced by institutions in Iraq, given the region’s instability. It identifies gaps in existing models and proposes extensions, introducing the variable “civil conflicts” to account for the volatile context. The study aims to contribute to a deeper understanding of m-learning acceptance in conflict-affected regions and provide insights for improving m-learning initiatives in Iraqi HEIs. Methodology: To achieve its objectives, this research employed a quantitative survey to collect data from 399 students in five Iraqi universities. PLS-SEM is used for the analysis of quantitative data, testing the extended UTAUT2 and ECM models. Contribution: The study’s findings are expected to contribute to the development of a nuanced understanding of m-learning adoption and continued usage in conflict-affected regions, particularly in the Iraqi HEI context. Findings: The study’s findings may inform strategies to enhance the effectiveness of m-learning initiatives in Iraqi HEIs and offer insights into how education can be supported in regions characterized by instability. Recommendations for Practitioners: Educators and policymakers can benefit from the research by making informed decisions to support education continuity and quality, particularly in conflict-affected areas. Recommendation for Researchers: Researchers can build upon this study by further exploring the adoption and usage of m-learning in unstable environments and evaluating the effectiveness of the proposed model extensions. Impact on Society: The research has the potential to positively impact society by improving access to quality education in regions affected by conflict and instability. Future Research: Future research can expand upon this study by examining the extended model’s applicability in different conflict-affected regions and assessing the long-term impact of m-learning initiatives on students’ educational outcomes.




ut

Automatic pectoral muscles and artefacts removal in mammogram images for improved breast cancer diagnosis

Breast cancer is leading cause of mortality among women compared to other types of cancers. Hence, early breast cancer diagnosis is crucial to the success of treatment. Various pathological and imaging tests are available for the diagnosis of breast cancer. However, it may introduce errors during detection and interpretation, leading to false-negative and false-positive results due to lack of pre-processing of it. To overcome this issue, we proposed a effective image pre-processing technique-based on Otsu's thresholding and single-seeded region growing (SSRG) to remove artefacts and segment the pectoral muscle from breast mammograms. To validate the proposed method, a publicly available MIAS dataset was utilised. The experimental finding showed that proposed technique improved 18% breast cancer detection accuracy compared to existing methods. The proposed methodology works efficiently for artefact removal and pectoral segmentation at different shapes and nonlinear patterns.




ut

Coevolution of trust dynamics and formal contracting in governing inter-organisation exchange

Recently, interest in the correlation between 'contract' in transaction governance and 'trust' in relational governance mechanisms has been growing. This study focuses on issues related to the evolution of contract and inter-organisational trust dynamics in transaction governance and uses mixed research method to investigate sectors related to transaction governance in Taiwan's electronics industry. The study finds higher flexibility in contract implementation to be a promoter of trust between two parties in a relationship, thereby promoting project execution efficiency in the case of Taiwanese firms. Organisational management differs between the East and West; therefore, Western firms should understand how various contractual provisions can be used to accommodate different transactions when cooperating with Taiwanese electronics companies.




ut

International Journal of Social and Humanistic Computing




ut

An integrated framework for the alignment of stakeholder expectations with student learning outcomes

In this paper, two hypothetical frameworks are proposed through the application of quality function deployment (QFD) to integrate the current institutional level and program level student learning focus areas with the relevant institutional and program specific stakeholder expectations. A generic skillset proficiency expected of all the graduating students at the institutional level by the stakeholders is considered in the first QFD application example and a program specific knowledge proficiency expected at the program level by the stakeholders is considered in the second QFD application example. Operations management major/option is considered for illustration purposes at the program level. In addition, an assurance of learning based approach rooted in continuous improvement philosophy is proposed to align the stakeholder expectations with the relevant student learning outcomes at different learning tiers.




ut

Hybrid encryption of Fernet and initialisation vector with attribute-based encryption: a secure and flexible approach for data protection

With the continuous growth and importance of data, the need for strong data protection becomes crucial. Encryption plays a vital role in preserving the confidentiality of data, and attribute-based encryption (ABE) offers a meticulous access control system based on attributes. This study investigates the integration of Fernet encryption with initialisation vector (IV) and ABE, resulting in a hybrid encryption approach that enhances both security and flexibility. By combining the advantages of Fernet encryption and IV-based encryption, the hybrid encryption scheme establishes an effective and robust mechanism for safeguarding data. Fernet encryption, renowned for its simplicity and efficiency, provides authenticated encryption, guaranteeing both the confidentiality and integrity of the data. The incorporation of an initialisation vector (IV) introduces an element of randomness into the encryption process, thereby strengthening the overall security measures. This research paper discusses the advantages and drawbacks of the hybrid encryption of Fernet and IV with ABE.




ut

To be intelligent or not to be? That is the question - reflection and insights about big knowledge systems: definition, model and semantics

This paper aims to share the author's vision on possible research directions for big knowledge-based AI. A renewed definition of big knowledge (BK) and big knowledge systems (BKS) is first introduced. Then the first BKS model, called cloud knowledge social intelligence (CKEI) is provided with a hierarchy of knowledge as a service (KAAS). At last, a new semantics, the big-and-broad step axiomatic structural operational semantics (BBASOS) for applications on BKS is introduced and discussed with a practical distributed BKS model knowledge graph network KGN and a mini example.




ut

On large automata processing: towards a high level distributed graph language

Large graphs or automata have their data that cannot fit in a single machine, or may take unreasonable time to be processed. We implement with MapReduce and Giraph two algorithms for intersecting and minimising large and distributed automata. We provide some comparative analysis, and the experiment results are depicted in figures. Our work experimentally validates our propositions as long as it shows that our choice, in comparison with MapReduce one, is not only more suitable for graph-oriented algorithms, but also speeds the executions up. This work is one of the first steps of a long-term goal that consists in a high level distributed graph processing language.




ut

Map reduce-based scalable Lempel-Ziv and application in route prediction

Prediction of route based on historical trip observation of users is widely employed in location-based services. This work concentrates on building a route prediction system using Lempel-Ziv technique applied to a historical corpus of user travel data. Huge continuous logs of historical GPS traces representing the user's location in past are decomposed into smaller logical units known as trips. User trips are converted into sequences of road network edges using a process known as map matching. Lempel-Ziv is applied on road network edges to build the prediction model that captures the user's travel pattern in the past. A two-phased model is proposed using a map reduce framework without losing accuracy and efficiency. Model is then used to predict the user's end-to-end route given a partial route travelled by the user at any point in time. The objective of the proposed work is to build a Route Prediction system in which model building and prediction both are horizontally scalable.




ut

Data as a potential path for the automotive aftersales business to remain active through and after the decarbonisation

This study aims to identify and understand the perspectives of automotive aftersales stakeholders regarding current challenges posed by decarbonisation strategies. It examines potential responses that the automotive aftersales business could undertake to address these challenges. Semi-structured interviews were undertaken with automotive industry experts from Europe and Latin America. This paper focuses primarily on impacts of decarbonisation upon automotive aftersales and the potential role of data in that business. Results show that investment in technology will be a condition for businesses that want to remain active in the industry. Furthermore, experts agree that incumbent manufacturers are not filling the technology gap that the energy transition is creating in the automotive sector, a consequence of which will be the entrance of new players from other sectors. The current aftersales businesses will potentially lose bargaining control. Moreover, policy makers are seen as unreliable leaders of the transition agenda.




ut

A New Learning Object Repository for Language Learning: Methods and Possible Outcomes




ut

The Present and Future of Standards for E-Learning Technologies




ut

An Integrated Approach for Automatic Aggregation of Learning Knowledge Objects




ut

Validation of a Learning Object Review Instrument: Relationship between Ratings of Learning Objects and Actual Learning Outcomes