cts

The Communication System in Project Teams: Problems of Transfer of Knowledge and Information for the Management of IT Projects




cts

Exploring the Aspects of Digital Divide in a Developing Country




cts

Responding to the Employability Challenge: Final Projects for IT-based Organizational Training




cts

How Business Departments Manage the Requirements Engineering Process in Information Systems Projects in Small and Medium Enterprises




cts

Project Management Principles Applied in Academic Research Projects




cts

Enterprise Resource Planning (ERP) Systems – Is Botswana Winning? A Question on Culture Effects




cts

Comparing Social Isolation Effects on Students Attrition in Online Versus Face-to-Face Courses in Computer Literacy

This paper compares the effect of social isolation on students enrolled in online courses versus students enrolled in on campus courses (called in this paper Face-to-Face or F2F). Grade data was collected from one online section and two F2F sections of a computer literacy course that was recently taught by one of the authors of this study. The same instructor taught all sections thereby providing a controlled comparison between the two forms of teaching (F2F and online). This paper first introduces the plan and the limitation of this study. It provides a literature review and notes the trend of social isolation found in online courses. This paper then presents a summary of the collected data; and offers a conclusion based on the collected data.




cts

Are We Ready to Go Live with Our Team Projects?

Project work forms a large part in work undertaken by graduates when they enter the workforce, so projects are used in higher education to prepare students for their working lives and to enable students to apply creativity in their studies as they present a solution to a problem, using technical skills they have learned in different units of study. Projects, both at work and in higher education, may be completed in teams, thus providing experience and the opportunity to develop team working skills. The team projects presented in this paper have been provided by external organisations, so that students work in a team on a real life problem, but with the support of their tutors, in the university setting. In this way the projects more closely resemble the sorts of problems they might encounter in the workplace, giving an experience that cannot be gained by working on tutor devised problems, because the teams have to communicate with an external client to analyse and solve an authentic problem. Over the three years that the Live Projects have been running, feedback indicates that the students gain employability skills from the projects, and the organisations involved develop links with the university and benefit from output from the projects. A number of suggestions for improving the administration of the Live Projects were suggested, such as providing clients with information on timescales and providing students with more guidance on managing the projects.




cts

Representations of Practice – Distributed Sensemaking Using Boundary Objects

Aim/Purpose: This article examines how learning activities draw on resources in the work context to learn. Background The background is that if knowledge no longer is seen mainly as objects, but processes, how then to understand boundary objects? Our field study of learning activities reveals the use of pictures, documents and emotions for learning in the geographically distributed Norwegian Labor Inspection Authority Methodology: The study is a qualitative study consisting of interview data, observation data, and documents. Contribution: Contribute to practice based theorizing. Findings: Three ideal types of representing practices have been identified, i.e., ‘Visualizing’, ‘Documenting’ and ‘Testing’. All three are combined with storytelling, sensing, reflections and sensemaking, which point at the importance of processes in learning. The article also add insights about how emotions can be an important resource for boundary spanning – and sensemaking – by creating the capability of reflecting upon and integrating different knowledge areas in the in- practice context. Recommendations for Practitioners: Look for boundary objects within your field to promote online learning. Recommendation for Researchers: Study boundary objects in work context to understand learning. Impact on Society Role of objects in human learning. Future Research: Focus on how emotions can be used for online learning.




cts

Transition to First Year University Study: A Qualitative Descriptive Study on the Psychosocial and Emotional Impacts of a Science Workshop

Aim/purpose The purpose of this article is to discuss the psychosocial and emotional outcomes of an introductory health science workshop designed to support and assist incoming health science students before starting their university study.   Background For the past two decades, a South Australian university offered an on-campus face to face workshop titled ‘Preparation for Health Sciences’ to incoming first-year students from eleven allied health programs such as Nursing, Physiotherapy and Medical Imaging. While many were locals, a good number came from regional and rural areas, and many were international students also. They consisted of both on-campus and off-campus students.   The workshop was created as a new learning environment that was available for students of diverse age groups, educational and cultural backgrounds to prepare them to study sciences. The content of the four-day workshop was developed in consultation with the program directors of the allied health programs. The objectives were to: introduce the assumed foundational science knowledge to undertake health sciences degree; gain confidence in approaching science subjects; experience lectures and laboratory activities; and become familiar with the University campus and its facilities. The workshop was delivered a week before the orientation week, before first-year formal teaching weeks. The topics covered were enhancing study skills, medical and anatomical terminology, body systems, basic chemistry and physics, laboratory activities, and assessment of learning.   Methodology In order to determine the outcomes of the workshop, a survey was used requiring participants to agree or disagree about statements concerning the preparatory course and answer open-ended questions relating to the most important information learned and the best aspects of the workshop. Several students piloted this questionnaire before use in order to ascertain the clarity of instructions, terminology and statements. The result of the 2015-2018 pre- and post-evaluation showed that the workshop raised confidence and enthusiasm in commencing university and that the majority considered the workshop useful overall. The findings of the survey are drawn upon to examine the psychosocial and emotional impacts of the workshop on participants. Using secondary qualitative analysis, the researchers identified the themes relating to the psychosocial and emotional issues conveyed by the participants.   Contribution The contributions of the article are in the areas of improving students’ confidence to complete their university degrees and increasing the likelihood of academic success. Findings Of the 285 students who participated in the workshops from 2015 to 2018, 166 completed the survey conducted at the conclusion of the initiative, representing a 58% response rate. The workshops achieved the objectives outlined at the outset. While there were many findings reported (Thalluri, 2016), the results highlighted in this paper relate to the psychosocial and emotional impacts of the workshop on students. Three themes emerged, and these were Increased preparedness and confidence; Networking and friendships that enhanced support, and Reduced anxiety to study sciences. Some drawbacks were also reported including the cost, time and travel involved. Recommendations for practitioners Students found the introductory workshop to be psychosocially and emotionally beneficial. It is recommended that the same approach be applied for teaching other challenging fields such as mathematics and physics within the university and in other contexts and institutions. Recommendations for researchers Improving and extending the workshop to provide greater accessibility and autonomy is recommended. A longitudinal study to follow up the durability of the workshop is also proposed. Impact on society The impacts in the broader community include: higher academic success for students; improved mental health due to social networking and friendship groups and reduced anxiety and fear; reduced dropout rate in their first year; greater potential to complete educational degrees; reduced wastage in human and financial resources; and increased human capital. Future research Addressing the limitations of cost, time and travel involved, and following-up with the participants’ academic and workplace performance are future directions for research.




cts

An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness

Aim/Purpose: Board of Directors seek to use their big data as a competitive advantage. Still, scholars note the complexities of corporate governance in practice related to information security risk management (ISRM) effectiveness. Background: While the interest in ISRM and its relationship to organizational success has grown, the scholarly literature is unclear about the effects of Chief Technology Officers (CTOs) leadership styles, the alignment of the governance of big data, and ISRM effectiveness in organizations in the West-ern United States. Methodology: The research method selected for this study was a quantitative, correlational research design. Data from 139 participant survey responses from Chief Technology Officers (CTOs) in the Western United States were analyzed using 3 regression models to test for mediation following Baron and Kenny’s methodology. Contribution: Previous scholarship has established the importance of leadership styles, big data governance, and ISRM effectiveness, but not in a combined understanding of the relationship between all three variables. The researchers’ primary objective was to contribute valuable knowledge to the practical field of computer science by empirically validating the relationships between the CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness. Findings: The results of the first regression model between CTOs leadership styles and ISRM effectiveness were statistically significant. The second regression model results between CTOs leadership styles and the alignment of the governance of big data were not statistically significant. The results of the third regression model between CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness were statistically significant. The alignment of the governance of big data was a significant predictor in the model. At the same time, the predictive strength of all 3 CTOs leadership styles was diminished between the first regression model and the third regression model. The regression models indicated that the alignment of the governance of big data was a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness. Recommendations for Practitioners: With big data growing at an exponential rate, this research may be useful in helping other practitioners think about how to test mediation with other interconnected variables related to the alignment of the governance of big data. Overall, the alignment of governance of big data being a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness suggests the significant role that the alignment of the governance of big data plays within an organization. Recommendations for Researchers: While this exact study has not been previously conducted with these three variables with CTOs in the Western United States, overall, these results are in agreement with the literature that information security governance does not significantly mediate the relationship between IT leadership styles and ISRM. However, some of the overall findings did vary from the literature, including the predictive relationship between transactional leadership and ISRM effectiveness. With the finding of partial mediation indicated in this study, this also suggests that the alignment of the governance of big data provides a partial intervention between CTOs leadership styles and ISRM effectiveness. Impact on Society: Big data breaches are increasing year after year, exposing sensitive information that can lead to harm to citizens. This study supports the broader scholarly consensus that to achieve ISRM effectiveness, better alignment of governance policies is essential. This research highlights the importance of higher-level governance as it relates to ISRM effectiveness, implying that ineffective governance could negatively impact both leadership and ISRM effectiveness, which could potentially cause reputational harm. Future Research: This study raised questions about CTO leadership styles, the specific governance structures involved related to the alignment of big data and ISRM effectiveness. While the research around these variables independently is mature, there is an overall lack of mediation studies as it relates to the impact of the alignment of the governance of big data. With the lack of alignment around a universal framework, evolving frameworks could be tested in future research to see if similar results are obtained.




cts

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




cts

Applicability of Process Maps for Simulation Modeling in Business Process Change Projects




cts

Pair Modeling with DynaLearn – Students’ Attitudes and Actual Effects




cts

Text-Based Collaborative Work and Innovation: Effects of Communication Media Affordances on Divergent and Convergent Thinking in Group-Based Problem-Solving




cts

The Effects of Knowledge Sharing and Absorption on Organizational Innovation Performance – A Dynamic Capabilities Perspective




cts

Change management in information systems projects for public organizations

It can be argued that public organizations, in order to provide the public with sufficient services in the current, highly competitive and continuously evolving environment, require changes. The changes that become necessary are often related to the implementation of information systems (IS). Moreover, when organizations are faced with changes, a change management (CM) process needs to be put in place. CM theories that are currently available to practitioners and academics are often contradictory; they mostly lack empirical evidence and are supported by unchallenged hypotheses concerning the nature of the contemporary CM. The aim of this paper is, therefore, to identify critical success factors (CFSs) for CM in IS projects. In order to reach this aim an explanation of changes in public organizations and the nature of CM are presented. Following this, a framework of CFSs for CM in IS projects are identified based on the literature review. The paper also examines two IS projects and uses them to demonstrate CFSs influencing CM in IS projects in Polish pubic organizations. A discussion of the research findings is provided and the paper concludes with a presentation of the study’s contributions and limitations as well as the stream of future work.




cts

Aspects of Digital Forensics in South Africa

This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics. The paper paints a picture of the cybercrime threats facing South Africa and argues for the need to develop a skill base in digital forensics in order to counter the threats through detection of cybercrime, by analyzing cybercrime reports, consideration of current legislation, and an analysis of computer forensics course provision in South African universities. The paper argues that there is a need to develop digital forensics skills in South Africa through university programs, in addition to associated training courses. The intention in this paper is to promote debate and discussion in order to identify the cyber threats to South Africa and to encourage the development of a framework to counter the threats – through legislation, high tech law enforcement structures and protocols, digital forensics education, digital forensics skills development, and a public and business awareness of cybercrime threats.




cts

Factors Affecting the Adoption and Usage of ICTs within Polish Households

Information and communication technologies (ICTs) encompassing computer and network hardware and software, and so on, as well as various services and applications associated with them, are assuming a growing presence within the modern homestead and have an indelible impact on the professional and everyday life of people. This research aims to explore factors influencing the successful adoption and usage of ICTs within Polish households. Based on prior literature and practical experiences, a framework of success factors is provided. The required data was collected from a survey questionnaire administered to a sample of Polish households to examine this framework and identifies which factors are of greatest importance for the adoption and usage of ICTs within households in Poland. Based on 751 questionnaires the paper indicates that the adoption of ICTs within households is mainly influenced by the economic status of households and cost of ICTs, perceived economic benefits from the usage of ICTs, technological availability and security of ICTs, ICT competences and awareness, as well as satisfaction with the adoption of ICTs. Furthermore, gender, education, and place of residence do not reflect significant differences on the factors. Yet, there are significant differences among the factors that could be attributed to age. Both, policy makers and ICT providers can benefit from the findings with regard to bridging the gap of ICT adoption and use in the Polish households.




cts

Behavioural Aspects of ERP Implementation: A Conceptual Review

Recently ERP implementation has seen increasing significance in different sectors. The research related to the implementation issues of ERP has also increased during the past decade. Particularly the behavioral aspects of ERP implementations have been researched in terms of identifying appropriate frameworks, critical success factors, perception and attitude of users and managers, the role of change agents, leadership, etc. This conceptual review summarizes some of the studies done on the above aspects and suggests further research areas. It is suggested that leadership competencies, learning attitude of the users, and organizational power dynamics can be potential areas of research in the context of ERP implementation.




cts

Factors Affecting Re-usage Intentions of Virtual Communities Supporting Cosmetic Products

Aim/Purpose: This study uses a cosmetic virtual community (VC) as the research context and the UTAUT model as the theoretical structure aim to explore factors affecting the re-usage intentions of VC members. Background: The Internet use rate of VC was up to 50%, thereby implying that VC gained the attention of Internet users. Therefore, operating a VC will be an effective way to communicate with customers. However, to maintain an existing member is more efficient than creating a new one. As such, understanding determinants of VC members’ re-use intentions becomes important for firms. Methodology: Through an online survey, 276 valid responses were gathered. The collected data were examined by performing confirmatory factor analysis, structural equation modelling procedures, as well as the moderator analysis. Contribution: This study shows the importance in the context of online cosmetics-related VC, which was rarely explored before. We provide issues for future research, despite the accumulated academic literature related to UTAUT and VC. Findings: Results show that only performance expectancy and social influence significantly affecting re-usage intentions and only gender has moderating effects on the path from performance expectancy to VC re-use intention and from trust to VC re-use intention. Recommendations for Practitioners : This study found that users emphasized performance expectancy most of all. A cosmetic product-related VC should introduce products abundantly, offer useful information, and help people accomplish tasks quickly and productively. Recommendation for Researchers: Future researchers may use our findings to conduct further positivist research in the area of social influence using different subjects and research contexts.




cts

The Mechanism of Internet Capability Driving Knowledge Creation Performance: The Effects of Strategic Flexibility and Informatization Density

Aim/Purpose: This study analyzes the mechanism of Internet capability (IC) driving knowledge creation performance (KCP). We consider the mediating role of strategic flexibility and the moderating role of informatization density. Background: The key to achieving KCP for firms is to transform knowledge created into new products or services and to realize the economic benefits. However, the research has not paid enough attention to firms’ KCP. Based on dynamic capability theory, this study empirically reveals how firms drive KCP through Internet capability. Methodology: The study uses survey data from 399 organizations in China. Through structural equation modeling, this study assesses the relationship between Internet capability, strategic flexibility, and KCP and uses hierarchical regression to test the moderating role of informatization density. Contribution: First, this study expands research on knowledge creation and focuses on the further achievement of knowledge creation performance. The study also enriches the exploration of KCP in the Internet context and deepens the research on the internal mechanism by which Internet capability influences KCP. Second, this study highlights the important role of informatization density in the Internet context and expands the research on the impact of external factors on the internal mechanism. Findings: First, Internet capability has a significantly positive effect on both strategic flexibility and KCP. Furthermore, Internet capability directly impacts strategic flexibility, yet it affects KCP both directly and indirectly through strategic flexibility, which confirms that strategic flexibility is a partial mediator in the relationship between Internet capability and KCP. Second, strategic flexibility positively influences KCP. Third, informatization density has a significant moderating effect on the relationship between Internet capability and KCP. Recommendations for Practitioners: The results indicate that firms should consider the importance of Internet capability and strategic flexibility for KCP in the Internet context. This study also provides a theoretical basis that could guide the Chinese government’s informatization construction of the industrial chain. Recommendation for Researchers: Researchers could further explore the role of other mediator variables (e.g., business process management, organizational agility) and consider the role of other moderator variables (e.g., resource commitment, learning orientation). Impact on Society: This study provides a reference for enterprises with similar cultural backgrounds in using Internet capability to enhance their competitive advantage. Future Research: Future research could collect data from various countries and regions to test the research model and conduct longitudinal studies to increase the robustness of the conclusions.




cts

The Effects of the Critical Success Factors for ERP Implementation on the Comprehensive Achievement of the Crucial Roles of Information Systems in the Higher Education Sector

Aim/Purpose: The aim of this study is to examine empirically the effects of certain key Critical Success Factors (CSFs) for the implementation of Enterprise Resource Planning (ERP) Systems on the comprehensive achievement of the crucial roles of Computer-Based Information Systems (CBISs) Background: The effects of the CSFSs were examined in the higher education sector in the Kingdom of Saudi Arabia (KSA) using a case study of the ERP adoption in Prince Sattam Bin Abdulaziz University. Methodology: A theoretical model was proposed based on the literature written on the CSFs and the roles of CBISs in business. The model encompasses six key CSFs and their associations with the realization of the crucial roles of CBISs. To test the proposed model, a questionnaire was developed by considering the most frequently used measurements items in the ERP’s literature. The data were collect-ed from 219 key stakeholders. Contribution: This study acts as one of the few empirical studies in assessing the effects of the important CSFs for ERP implementation upon its successful implementation. Its outcomes provide more insights and clarifications about the effects of six key CSFs on the comprehensive achievement of the crucial CBIS’s roles. Particularly, the uniqueness of this study lies in addressing the effects of these CSFs on the achievement of the vital CBIS’s roles collectively rather than the achievement of each role individually. Moreover, the study examined these effects in the higher education environment, which is characterized by its own special business processes and services. Findings: The results reveal that the six key CSFs have a positive relationship with the comprehensive achievement of the crucial roles of CBISs. These findings are consistent with many previous studies on the effects of the CSFs on the realization of the expected benefits of the enterprise systems. Recommendations for Practitioners: The managers and other key stakeholders should carefully manage the vital aspects of the CSFs in order to realize the promised ERP’s benefits, including the CBIS’s roles. Future Research: Additional empirical examinations are needed to investigate the effects of the rest of the CSFs on realizing the roles of information systems.




cts

Effects of Advocacy Banners after Abandoning Products in Online Shopping Carts

Aim/Purpose: This study empirically analyzed and examined the effectiveness of the online advocacy banners on customers’ reactions to make replacements with the similar products in their shopping carts. Background: When a product in a shopping cart is removed, it might be put back into the cart again during the same purchase or it may be bought in the future. Otherwise, it might be abandoned and replaced with a similar item based on the customer’s enquiry list or on the recommendation of banners. There is a lack of understanding of this phenomenon in the existing literature, pointing to the need for this study. Methodology: With a database from a Taiwanese e-retailer, data were the tracks of empirical webpage clickstreams. The used data for analyses were particularly that the products were purchased again or replaced with the similar ones upon the advocacy banners being shown when they were removed from customers’ shopping carts. Few pre-defined Apriori rules as well as similarity algorithm, Jaccard index, were applied to derive the effectiveness. Contribution: This study addressed a measurement challenge by leveraging the information from clickstream data – particularly clickstream data behavior. These data are most useful to observe the real-time behavior of consumers on websites and also are applied to studying click-through behavior, but not click-through rates, for web banners. The study develops a new methodology to aid advertisers in evaluating the effectiveness of their banner campaign. Findings: The recommending/advocating titles of “you probably are interested” and “the most viewed” are not significantly effective on saving back customers’ removed products or repurchasing similar items. For the banners entitled “most buy”, “the most viewed” might only show popularity of the items, but is not enough to convince them to buy. At the current stage on the host website, customers may either not trust in the host e-retailer or in such mechanism. Additionally, the advocating/recommending banners only are effective on the same customer visits and their effects fade over time. As time passes, customers’ impressions of these banners may become vague. Recommendations for Practitioners: One managerial implication is more effective adoption of advocacy/recommendation banners on e-retailing websites. Another managerial implication is the evaluation of the advocacy/recommendation banners. By using a data mining technique to find the association between removed products and restored ones in e-shoppers’ shopping carts, the approach and findings of this study, which are important for e-retailing marketers, reflect the connection between the usage of banners and the personalized purchase changes in an individual customer’s shopping cart. Recommendation for Researchers: This study addressed a new measurement which challenges to leverage the information from clickstream data instead of click-through rates – particularly retailing webpages browsing behavior. These data are most useful to observe the real-time behavior of consumers on websites and also are applied to studying click-through behavior. Impact on Society: Personalization has become an important technique that allows businesses to improve both sales and service relationships with their online customers. This personalization gives e-marketers the ability to deliver real effectiveness in the use of banners. Future Research: The effectiveness is time- and case-sensible. Business practitioners and academic researchers are encouraged to apply the mining methodology to longevity studies, specific marketing campaigns of advertising and personal recommendations, and any further recommendation algorithms.




cts

Critical Success Factors for Implementing Business Intelligence Projects (A BI Implementation Methodology Perspective)

Aim/Purpose: The purpose of this paper is to identify Critical Success Factors (CSFs) for Business Intelligence (BI) implementation projects by studying the existing BI project implementation methodologies and to compare these methodologies based on the identified CSFs. Background: The implementation of BI project has become one of the most important technological and organizational innovations in modern organizations. The BI project implementation methodology provides a framework for demonstrating knowledge, ideas and structural techniques. It is defined as a set of instructions and rules for implementing BI projects. Identifying CSFs of BI implementation project can help the project team to concentrate on solving prior issues and needed resources. Methodology: Firstly, the literature review was conducted to find the existing BI project implementation methodologies. Secondly, the content of the 13 BI project implementation methodologies was analyzed by using thematic analysis method. Thirdly, for examining the validation of the 20 identified CSFs, two questionnaires were distributed among BI experts. The gathered data of the first questionnaire was analyzed by content validity ratio (CVR) and 11 of 20 CSFs were accepted as a result. The gathered data of the second questionnaire was analyzed by fuzzy Delphi method and the results were the same as CVR. Finally, 13 raised BI project implementation methodologies were compared based on the 11 validated CSFs. Contribution: This paper contributes to the current theory and practice by identifying a complete list of CSFs for BI projects implementation; comparison of existing BI project implementation methodologies; determining the completeness degree of existing BI project implementation methodologies and introducing more complete ones; and finding the new CSF “Expert assessment of business readiness for successful implementation of BI project” that was not expressed in previous studies. Findings: The CSFs that should be considered in a BI project implementation include: “Obvious BI strategy and vision”, “Business requirements definition”, “Business readiness assessment”, “BI performance assessment”, “Establishing BI alignment with business goals”, “Management support”, “IT support for BI”, “Creating data resources and source data quality”, “Installation and integration BI programs”, “BI system testing”, and “BI system support and maintenance”. Also, all the 13 BI project implementation methodologies can be divided into four groups based on their completeness degree. Recommendations for Practitioners: The results can be used to plan BI project implementation and help improve the way of BI project implementation in the organizations. It can be used to reduce the failure rate of BI implementation projects. Furthermore, the 11 identified CSFs can give a better understanding of the BI project implementation methodologies. Recommendation for Researchers: The results of this research helped researchers and practitioners in the field of business intelligence to better understand the methodology and approaches available for the implementation and deployment of BI systems and thus use them. Some methodologies are more complete than other studied methodologies. Therefore, organizations that intend to implement BI in their organization can select these methodologies according to their goals. Thus, Findings of the study can lead to reduce the failure rate of implementation projects. Future Research: Future researchers may add other BI project implementation methodologies and repeat this research. Also, they can divide CSFs into three categories including required before BI project implementation, required during BI project implementation and required after BI project implementation. Moreover, researchers can rank the BI project implementation CSFs. As well, Critical Failure Factors (CFFs) need to be explored by studying the failed implementations of BI projects. The identified CSFs probably affect each other. So, studying the relationship between them can be a topic for future research.




cts

A Decision Support System and Warehouse Operations Design for Pricing Products and Minimizing Product Returns in a Food Plant

Aim/Purpose: The first goal is to develop a decision support system for pricing and production amounts for a firm facing high levels of product returns. The second goal is to improve the management of the product returns process. Background: This study was conducted at a food importer and manufacturer in Israel facing a very high rate of product returns, much of which is eventually discarded. The firm’s products are commonly considered to be a low-cost generic alternative and are therefore popular among low-income families. Methodology: A decision support module was added to the plant’s business information system. The module is based on a supply chain pricing model and uses the sales data to infer future demand’s distribution. Ergonomic models were used to improve the design of the returns warehouse and the handling of the returns. Contribution: The decision support system allows to improve the plant’s pricing and quantity planning. Consequently, it reduced the size of product returns. The new design of the returns process is expected to improve worker’s productivity, reduces losses and results in safer outcomes. This study also demonstrates a successful integration and of a theoretical economical model into an information system. Findings: The results show the promise of incorporating pricing supply chain models into informing systems to achieve a practical business task. We were able to construct actual demand distributions from the data and offer actual pricing recommendations that reduce the number of returns while increasing potential profits. We were able to identify key deficiencies in the returns operations and added a module to the decisions support system that improves the returns management and links it with the sales and pricing modules. Finally, we produced a better warehouse design that supports efficient and ergonomic product returns handling. Recommendations for Practitioners: This work can be replicated for different suppliers, manufacturers and retailers that suffer from product returns. They will benefit from the reduction in returns, as well as the decrease in the losses associated with these returns. Recommendation for Researchers: It is worthwhile to research whether decision support systems can be applied to other aspects of the organizations’ operations. Impact on Society: Product returns is a lose-lose situation for producers, retailers and customers. Moreover, mismanagement of these returns is harmful for the environment and may result in the case of foods, in health hazards. Reducing returns and improving the handling improves sustainability and is beneficial for society. Future Research: The decision support system’s underlying pricing model assumes a specific business setting. This can be extended using other pricing models and applying them in a similar fashion to the current application.




cts

The Impacts of KM-Centred Strategies and Practices on Innovation: A Survey Study of R&D Firms in Malaysia

Aim/Purpose: The aim of this paper is to examine the influences of KM-centred strategies on innovation capability among Malaysian R&D firms. It also deepens understanding of the pathways and conditions to improve the innovation capability by assessing the mediating role of both KM practices, i.e., knowledge exploration practices, and knowledge exploitation practices. Background: Knowledge is the main organisational resource that is able to generate a competitive advantage through innovation. It is a critical success driver for both knowledge exploration and exploitation for firms to achieve sustainable competitive advantages. Methodology: A total of 320 questionnaires were disseminated to Malaysian R&D firms and the response rate was 47 percent. The paper utilised structural equation modelling and cross-sectional design to test hypotheses in the proposed research model. Contribution: This paper provides useful information and valuable initiatives in exploring the mediating role of knowledge exploration and knowledge exploitation in influencing innovation in Malaysian R&D firms. It helps R&D firms to frame their KM activities to drive the capability of creating and retaining a greater value onto their core business competencies. Findings: The findings indicate that all three KM-centred strategies (leadership, HR practices, and culture) have a direct effect on innovation. In addition, KM exploration practices mediate HR practices on innovation while KM exploitation mediates both leadership and HR practices on innovation. Recommendations for Practitioners: This paper serves as a guide for R&D managers to determine the gaps and appropriate actions to collectively achieve the desired R&D results and national innovation. It helps R&D firms frame their KM activities to enhance the capability of creating and retaining a greater value to their core business competencies. Recommendation for Researchers: This paper contributes significantly to knowledge management and innovation research by establishing new associations among KM-centred strategies, i.e., leadership, HR practices, and culture, both KM practices (knowledge exploration and knowledge exploitation), and innovation. Impact on Society: This paper highlights the important role of knowledge leaders and the practice of effective HR practices to help R&D firms to create a positive environment that facilitates both knowledge exploration and knowledge exploitation in enhancing innovation capabilities. Future Research: Further research could use a longitudinal sample to examine relationships of causality, offering a more comprehensive view of the effect of KM factors on innovation over the long term. Future research should also try to incorporate information from new external sources, such as customers or suppliers.




cts

Antecedents of Business Analytics Adoption and Impacts on Banks’ Performance: The Perspective of the TOE Framework and Resource-Based View

Aim/Purpose: This study utilized a comprehensive framework to investigate the adoption of Business Analytics (BA) and its effects on performance in commercial banks in Jordan. The framework integrated the Technological-Organizational-Environmental (TOE) model, the Diffusion of Innovation (DOI) theory, and the Resource-Based View (RBV). Background: The recent trend of utilizing data for business operations and decision-making has positively impacted organizations. Business analytics (BA) is a leading technique that generates valuable insights from data. It has gained considerable attention from scholars and practitioners across various industries. However, guidance is lacking for organizations to implement BA effectively specific to their business contexts. This research aims to evaluate factors influencing BA adoption by Jordanian commercial banks and examine how its implementation impacts bank performance. The goal is to provide needed empirical evidence surrounding BA adoption and outcomes in the Jordanian banking sector. Methodology: The study gathered empirical data by conducting an online questionnaire survey with senior and middle managers from 13 commercial banks in Jordan. The participants were purposefully selected, and the questionnaire was designed based on relevant and well-established literature. A total of 307 valid questionnaires were collected and considered for data analysis. Contribution: This study makes a dual contribution to the BA domain. Firstly, it introduces a research model that comprehensively examines the factors that influence the adoption of BA. The proposed model integrates the TOE framework, DOI theory, and RBV theory. Combining these frameworks allows for a comprehensive examination of BA adoption in the banking industry. By analyzing the technological, organizational, and environmental factors through the TOE framework, understanding the diffusion process through the DOI theory, and assessing the role of resources and capabilities through the RBV theory, researchers and practitioners can better understand the complex dynamics involved. This integrated approach enables a more nuanced assessment of the factors that shape BA adoption and its subsequent impact on business performance within the banking industry. Secondly, it uncovers the effects of BA adoption on business performance. These noteworthy findings stem from a rigorous analysis of primary data collected from commercial banks in Jordan. By presenting a holistic model and delving into the implications for business performance, this research offers valuable insights to researchers and practitioners alike in the field of BA. Findings: The findings revealed that various technological (data quality, complexity, compatibility, relative advantage), organizational (top management support, organizational readiness), and environmental (external support) factors are crucial in shaping the decision to adopt BA. Furthermore, the study findings demonstrated a positive relationship between BA adoption and performance outcomes in Jordanian commercial banks. Recommendations for Practitioners: The findings suggest that Jordanian commercial banks should enforce data quality practices, provide clear standards, invest in data quality tools and technologies, and conduct regular data audits. Top management support is crucial for fostering a data-driven decision-making culture. Organizational readiness involves having the necessary resources and skilled personnel, as well as promoting continuous learning and improvement. Highlighting the benefits of BA helps overcome resistance to technological innovation and encourages adoption by demonstrating improved decision-making processes and operational efficiency. Furthermore, external support is crucial for banks to adopt Business Analytics (BA). Banks should partner with experienced vendors to gain expertise and incorporate best practices. Vendors also provide training and technical support to overcome technological barriers. Compatibility is essential for optimal performance, requiring managers to modify workflows and IT infrastructure. Complexity, including data, organizational, and technical complexities, is a major obstacle to BA adoption. Banks should take a holistic approach, focusing on people, processes, and technology, and prioritize data quality and governance. Building a skilled team, fostering a data-driven culture, and investing in technology and infrastructure are essential. Recommendation for Researchers: The integration of the TOE framework, the DOI theory, and the RBV theory can prove to be a powerful approach for comprehensively analyzing the various factors that influence BA adoption within the dynamic banking industry. Furthermore, this combined framework enables us to gain deeper insights into the subsequent impact of BA adoption on overall business performance. Impact on Society: Examining the factors influencing BA adoption in the banking industry and its subsequent impact on business performance can have wide-ranging societal implications. It can promote data-driven decision-making, enhance customer experiences, strengthen fraud detection, foster financial inclusion, contribute to economic growth, and trigger discussions on ethical considerations. Future Research: To further advance future research, there are several avenues to consider. One option is to broaden the scope by including a larger sample size, allowing for a more comprehensive analysis. Another possibility is to investigate the impact of BA adoption on various performance indicators beyond the ones already examined. Additionally, incorporating qualitative research methods would provide a more holistic understanding of the organizational dynamics and challenges associated with the adoption of BA in Jordanian commercial banks.




cts

Unveiling the Secrets of Big Data Projects: Harnessing Machine Learning Algorithms and Maturity Domains to Predict Success

Aim/Purpose: While existing literature has extensively explored factors influencing the success of big data projects and proposed big data maturity models, no study has harnessed machine learning to predict project success and identify the critical features contributing significantly to that success. The purpose of this paper is to offer fresh insights into the realm of big data projects by leveraging machine-learning algorithms. Background: Previously, we introduced the Global Big Data Maturity Model (GBDMM), which encompassed various domains inspired by the success factors of big data projects. In this paper, we transformed these maturity domains into a survey and collected feedback from 90 big data experts across the Middle East, Gulf, Africa, and Turkey regions regarding their own projects. This approach aims to gather firsthand insights from practitioners and experts in the field. Methodology: To analyze the feedback obtained from the survey, we applied several algorithms suitable for small datasets and categorical features. Our approach included cross-validation and feature selection techniques to mitigate overfitting and enhance model performance. Notably, the best-performing algorithms in our study were the Decision Tree (achieving an F1 score of 67%) and the Cat Boost classifier (also achieving an F1 score of 67%). Contribution: This research makes a significant contribution to the field of big data projects. By utilizing machine-learning techniques, we predict the success or failure of such projects and identify the key features that significantly contribute to their success. This provides companies with a valuable model for predicting their own big data project outcomes. Findings: Our analysis revealed that the domains of strategy and data have the most influential impact on the success of big data projects. Therefore, companies should prioritize these domains when undertaking such projects. Furthermore, we now have an initial model capable of predicting project success or failure, which can be invaluable for companies. Recommendations for Practitioners: Based on our findings, we recommend that practitioners concentrate on developing robust strategies and prioritize data management to enhance the outcomes of their big data projects. Additionally, practitioners can leverage machine-learning techniques to predict the success rate of these projects. Recommendation for Researchers: For further research in this field, we suggest exploring additional algorithms and techniques and refining existing models to enhance the accuracy and reliability of predicting the success of big data projects. Researchers may also investigate further into the interplay between strategy, data, and the success of such projects. Impact on Society: By improving the success rate of big data projects, our findings enable organizations to create more efficient and impactful data-driven solutions across various sectors. This, in turn, facilitates informed decision-making, effective resource allocation, improved operational efficiency, and overall performance enhancement. Future Research: In the future, gathering additional feedback from a broader range of big data experts will be valuable and help refine the prediction algorithm. Conducting longitudinal studies to analyze the long-term success and outcomes of Big Data projects would be beneficial. Furthermore, exploring the applicability of our model across different regions and industries will provide further insights into the field.




cts

Automatic pectoral muscles and artefacts removal in mammogram images for improved breast cancer diagnosis

Breast cancer is leading cause of mortality among women compared to other types of cancers. Hence, early breast cancer diagnosis is crucial to the success of treatment. Various pathological and imaging tests are available for the diagnosis of breast cancer. However, it may introduce errors during detection and interpretation, leading to false-negative and false-positive results due to lack of pre-processing of it. To overcome this issue, we proposed a effective image pre-processing technique-based on Otsu's thresholding and single-seeded region growing (SSRG) to remove artefacts and segment the pectoral muscle from breast mammograms. To validate the proposed method, a publicly available MIAS dataset was utilised. The experimental finding showed that proposed technique improved 18% breast cancer detection accuracy compared to existing methods. The proposed methodology works efficiently for artefact removal and pectoral segmentation at different shapes and nonlinear patterns.




cts

Modeling the Organizational Aspects of Learning Objects in Semantic Web Approaches to Information Systems




cts

Developing Learning Objects for Secondary School Students: A Multi-Component Model




cts

Learning Objects, Learning Object Repositories, and Learning Theory: Preliminary Best Practices for Online Courses




cts

Teaching, Designing, and Sharing: A Context for Learning Objects




cts

Scoping and Sequencing Educational Resources and Speech Acts: A Unified Design Framework for Learning Objects and Educational Discourse




cts

Decoupling the Information Application from the Information Creation: Video as Learning Objects in Three-Tier Architecture




cts

Learning Objects: Using Language Structures to Understand the Transition from Affordance Systems to Intelligent Systems




cts

Interactive QuickTime: Developing and Evaluating Multimedia Learning Objects to Enhance Both Face-To-Face and Distance E-Learning Environments




cts

Interoperability and Learning Objects: An Overview of E-Learning Standardization




cts

The OSEL Taxonomy for the Classification of Learning Objects




cts

Clicker Sets as Learning Objects




cts

Guidelines and Standards for the Development of Fully Online Learning Objects




cts

A Cognitive and Logic Based Model for Building Glass-Box Learning Objects




cts

Using Podcasts as Audio Learning Objects




cts

Learning Objects: Adaptive Retrieval through Learning Styles




cts

Learning Objects and E-Learning: an Informing Science Perspective




cts

The Development and Implementation of Learning Objects in a Higher Education Setting




cts

An Integrated Approach for Automatic Aggregation of Learning Knowledge Objects




cts

Learning Pod: A New Paradigm for Reusability of Learning Objects




cts

Validation of a Learning Object Review Instrument: Relationship between Ratings of Learning Objects and Actual Learning Outcomes