Abstract: In a none-super-competitive environment the concepts
of closed system, management control remains to be the dominant
guiding concept to management. The merits of closed loop have been
the sources of most of the management literature and culture for
many decades. It is a useful exercise to investigate and poke into the
dynamics of the control loop phenomenon and draws some lessons to
use for refining the practice of management. This paper examines the
multitude of lessons abstracted from the behavior of the Input /output
/feedback control loop model, which is the core of control theory.
There are numerous lessons that can be learned from the insights this
model would provide and how it parallels the management dynamics
of the organization. It is assumed that an organization is basically a
living system that interacts with the internal and external variables. A
viable control loop is the one that reacts to the variation in the
environment and provide or exert a corrective action. In managing
organizations this is reflected in organizational structure and
management control practices. This paper will report findings that
were a result of examining several abstract scenarios that are
exhibited in the design, operation, and dynamics of the control loop
and how they are projected on the functioning of the organization.
Valuable lessons are drawn in trying to find parallels and new
paradigms, and how the control theory science is reflected in the
design of the organizational structure and management practices. The
paper is structured in a logical and perceptive format. Further
research is needed to extend these findings.
Abstract: This study aims to explore the relationship between the
disposition effect and herding behavior of investors trading Taiwanese
information technology stocks. This study differs from previous
literature in two aspects. First, in contrast with the earlier studies that
focused on investigating investors’ herding behavior, this study
explores the possibility that the disposition effect drives investors’
herding behavior. Additionally, it takes an in-depth look at the
interdependence between the disposition effect and herding behavior
of investors, including lead-lag relationship and volatility transmission
effect. Empirical results show that investors trading Taiwan’s
information technology stocks exhibit pronounced herding behavior
and that the disposition effect has a great impact on their herding
behavior.
Abstract: Amazing development of the information technology,
communications and internet expansion as well as the requirements
of the city managers to new ideas to run the city and higher
participation of the citizens encourage us to complete the electronic
city as soon as possible. The foundations of this electronic city are in
information technology. People-s participation in metropolitan
management is a crucial topic. Information technology does not
impede this matter. It can ameliorate populace-s participation and
better interactions between the citizens and the city managers.
Citizens can proffer their ideas, beliefs and votes through digital
mass media based upon the internet and computerization plexuses on
the topical matters to receive appropriate replies and services. They
can participate in urban projects by becoming cognizant of the city
views. The most significant challenges are as follows: information
and communicative management, altering citizens- views, as well as
legal and office documents
Electronic city obstacles have been identified in this research. The
required data were forgathered through questionnaires to identify the
barriers from a statistical community comprising specialists and
practitioners of the ministry of information technology and
communication, the municipality information technology
organization.
The conclusions demonstrate that the prioritized electronic city
application barriers in Iran are as follows:
The support quandaries (non-financial ones), behavioral, cultural
and educational plights, the security, legal and license predicaments,
the hardware, orismological and infrastructural curbs, the software
and fiscal problems.
Abstract: Information Technology (IT) projects are always
accompanied by various risks and because of high rate of failure in
such projects, managing risks in order to neutralize or at least
decrease their effects on the success of the project is strongly
essential. In this paper, fuzzy analytical hierarchy process (FAHP) is
exploited as a means of risk evaluation methodology to prioritize and
organize risk factors faced in IT projects. A real case of IT projects, a
project of design and implementation of an integrated information
system in a vehicle producing company in Iran is studied. Related
risk factors are identified and then expert qualitative judgments about
these factors are acquired. Translating these judgments to fuzzy
numbers and using them as an input to FAHP, risk factors are then
ranked and prioritized by FAHP in order to make project managers
aware of more important risks and enable them to adopt suitable
measures to deal with these highly devastative risks.
Abstract: Nowadays, under developed countries for progress in
science and technology and decreasing the technologic gap with
developed countries, increasing the capacities and technology
transfer from developed countries. To remain competitive, industry is
continually searching for new methods to evolve their products.
Business model is one of the latest buzzwords in the Internet and
electronic business world. To be successful, organizations must look
into the needs and wants of their customers. This research attempts to
identify a specific feature of the company with a strong competitive
advantage by analyzing the cause of Customer satisfaction. Due to
the rapid development of knowledge and information technology,
business environments have become much more complicated.
Information technology can help a firm aiming to gain a competitive
advantage. This study explores the role and effect of Information
Communication Technology in Business Models and Customer
satisfaction on firms and also relationships between ICTs and
Outsourcing strategic.
Abstract: Information technology managers nowadays are
facing with tremendous pressure to plan, implement, and adopt new
technology solution due to the rapidity of technology changes.
Resulted from a lack of study that have been done in this topic, the
aim of this paper is to provide a comparison review on current tools
that are currently being used in order to respond to technological
changes. The study is based on extensive literature review of
published works with majority of them are ranging from 2000 to the
first part of 2011. The works were gathered from journals, books,
and other information sources available on the Web. Findings show
that, each tools has different focus and none of the tools are
providing a framework in holistic view, which should include
technical, people, process, and business environment aspect. Hence,
this result provides potential information about current available
tools that IT managers could use to manage changes in technology.
Further, the result reveals a research gap in the area where the
industries a short of such framework.
Abstract: Intensive changes of environment and strong market
competition have raised management of information and knowledge
to the strategic level of companies. In a knowledge based economy
only those organizations are capable of living which have up-to-date,
special knowledge and they are able to exploit and develop it.
Companies have to know what knowledge they have by taking a
survey of organizational knowledge and they have to fix actual and
additional knowledge in organizational memory. The question is how
to identify, acquire, fix and use knowledge effectively. The paper will
show that over and above the tools of information technology
supporting acquisition, storage and use of information and
organizational learning as well as knowledge coming into being as a
result of it, fixing and storage of knowledge in the memory of a
company play an important role in the intelligence of organizations
and competitiveness of a company.
Abstract: In today's world where everything is rapidly changing
and information technology is high in development, many features of culture, society, politic and economy has changed. The advent of
information technology and electronic data transmission lead to easy communication and fields like e-learning and e-commerce, are
accessible for everyone easily. One of these technologies is virtual
training. The "quality" of such kind of education systems is critical. 131 questionnaires were prepared and distributed among university
student in Toba University. So the research has followed factors that affect the quality of learning from the perspective of staff, students, professors and this type of university. It is concluded that the important factors in virtual training are the quality of professors, the
quality of staff, and the quality of the university. These mentioned factors were the most prior factors in this education system and
necessary for improving virtual training.
Abstract: The trends of design and development of information systems have undergone a variety of ongoing phases and stages. These variations have been evolved due to brisk changes in user requirements and business needs. To meet these requirements and needs, a flexible and agile business solution was required to come up with the latest business trends and styles. Another obstacle in agility of information systems was typically different treatment of same diseases of two patients: business processes and information services. After the emergence of information technology, the business processes and information systems have become counterparts. But these two business halves have been treated under totally different standards. There is need to streamline the boundaries of these both pillars that are equally sharing information system's burdens and liabilities. In last decade, the object orientation has evolved into one of the major solutions for modern business needs and now, SOA is the solution to shift business on ranks of electronic platform. BPM is another modern business solution that assists to regularize optimization of business processes. This paper discusses how object orientation can be conformed to incorporate or embed SOA in BPM for improved information systems.
Abstract: Every organization is continually subject to new damages and threats which can be resulted from their operations or their goal accomplishment. Methods of providing the security of space and applied tools have been widely changed with increasing application and development of information technology (IT). From this viewpoint, information security management systems were evolved to construct and prevent reiterating the experienced methods. In general, the correct response in information security management systems requires correct decision making, which in turn requires the comprehensive effort of managers and everyone involved in each plan or decision making. Obviously, all aspects of work or decision are not defined in all decision making conditions; therefore, the possible or certain risks should be considered when making decisions. This is the subject of risk management and it can influence the decisions. Investigation of different approaches in the field of risk management demonstrates their progress from quantitative to qualitative methods with a process approach.
Abstract: Retention in the IT profession is critical for
organizations to stay competitive and operate reliably in the dynamic
business environment. Most organizations rely on compensation and
rewards as primary tools to enhance retention of employees. In this
quantitative survey-based study conducted at a large global bank, we
analyze the perceptions of 575 information technology (IT) software
professionals in India and Malaysia and find that fairness of rewards
has very little impact on retention likelihood. It is far more important
to actively involve employees in organizational activities. In
addition, our findings indicate that involvement is far more important
than information flow: the typical organizational communication to
keep employees informed.
Abstract: This paper demonstrates how the soft systems
methodology can be used to improve the delivery of a module in data warehousing for fourth year information technology students.
Graduates in information technology needs to have academic skills
but also needs to have good practical skills to meet the skills requirements of the information technology industry. In developing
and improving current data warehousing education modules one has to find a balance in meeting the expectations of various role players such as the students themselves, industry and academia. The soft
systems methodology, developed by Peter Checkland, provides a
methodology for facilitating problem understanding from different world views. In this paper it is demonstrated how the soft systems methodology can be used to plan the improvement of data
warehousing education for fourth year information technology students.
Abstract: Logistics is part of the supply chain processes that
plans, implements, and controls the efficient and effective forward
and reverse flow and storage of goods, services, and related
information between the point of origin and the point of consumption
in order to meet customer requirements. This research aims to
investigate the current status and future direction of the use of
Information Technology (IT) for logistics, focusing on Supply Chain
Management (SCM) and E-Commerce adoption in Malaysia.
Therefore, this research stresses on the type of technology being
adopted, factors, benefits and barriers affecting the innovation in
SCM and E-Commerce technology adoption among Logistics
Service Providers (LSP). A mailed questionnaire survey was
conducted to collect data from 265 logistics companies in Johor. The
research revealed a high level of SCM technology adoption among
LSP as they had adopted SCM technology in various business
processes while they perceived a high level of benefits from SCM
adoption.
Abstract: This paper presents an approach based on the
adoption of a distributed cognition framework and a non parametric
multicriteria evaluation methodology (DEA) designed specifically to
compare e-commerce websites from the consumer/user viewpoint. In
particular, the framework considers a website relative efficiency as a
measure of its quality and usability. A website is modelled as a black
box capable to provide the consumer/user with a set of
functionalities. When the consumer/user interacts with the website to
perform a task, he/she is involved in a cognitive activity, sustaining a
cognitive cost to search, interpret and process information, and
experiencing a sense of satisfaction. The degree of ambiguity and
uncertainty he/she perceives and the needed search time determine
the effort size – and, henceforth, the cognitive cost amount – he/she
has to sustain to perform his/her task. On the contrary, task
performing and result achievement induce a sense of gratification,
satisfaction and usefulness. In total, 9 variables are measured,
classified in a set of 3 website macro-dimensions (user experience,
site navigability and structure). The framework is implemented to
compare 40 websites of businesses performing electronic commerce
in the information technology market. A questionnaire to collect
subjective judgements for the websites in the sample was purposely
designed and administered to 85 university students enrolled in
computer science and information systems engineering
undergraduate courses.
Abstract: The objective of this research is to develop the
performance indicators (PIs) in operational level for the Pre-hospital Emergency Medical Service (EMS) system employing in Thailand. This research started with ascertaining the current pre-hospital care
system. The team analyzed the strategies of Narerthorn, a government unit under the ministry of public health, and the existing PIs of the pre-hospital care. Afterwards, the current National Strategic Plan of EMS development (2008-2012) of the Emergency
Medical Institute of Thailand (EMIT) was considered using strategic
analysis to developed Strategy Map (SM) and identified the Success
Factors (SFs). The analysis results from strategy map and SFs were used to develop the Performance Indicators (PIs). To verify the set of
PIs, the team has interviewed with the relevant practitioners for the possibilities to implement the PIs. To this paper, it was to ascertain
that all the developed PIs support the objectives of the strategic plan. Nevertheless, the results showed that the operational level PIs suited
only with the first dimension of National Strategic Plan
(infrastructure and information technology development). Besides,
the SF was the infrastructure development (to contribute the EMS system to people throughout with standard and efficiency both in normally and disaster conditions). Finally, twenty-nine indicators
were developed from the analysis results of SM and SFs.
Abstract: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today's commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98% detection rate (DR) in comparison with
other existing methods.
Abstract: The dramatic effect of information technology on
society is undeniable. In education, it is evident in the use of terms
like active learning, blended learning, electronic learning and mobile
learning (ubiquitous learning). This study explores the perceptions of
54 learners in a higher education institution regarding the use of
mobile devices in a third year module. Using semi-structured
interviews, it was found that mobile devices had a positive impact on
learner motivation, engagement and enjoyment. It also improved the
consistency of learning material, and the convenience and flexibility
(anywhere, anytime) of learning. User-interfacelimitation, bandwidth
and cognitive overload, however, were of concern. The use of cloud
based resources like Youtube and Google Docs, through mobile
devices, positively influenced learner perceptions, making them
prosumers (both consumers and producers) of education content.
Abstract: South Africa is facing a crisis with not being able to produce enough graduates in the scarce skills areas to sustain economic growth. The crisis is fuelled by a school system that does not produce enough potential students with Mathematics, Accounting and Science. Since the introduction of the new school curriculum in 2008, there is no longer an option to take pure maths on a standard grade level. Instead, only two mathematical subjects are offered: pure maths (which is on par with higher grade maths) and mathematical literacy. It is compulsory to take one or the other. As a result, lees student finishes Grade 12 with pure mathematics every year. This national problem needs urgent attention if South Africa is to make any headway in critical skills development as mathematics is a gateway to scarce skills professions. Higher education institutions initiated several initiatives in an attempt to address the above, including preparatory courses, bridging programmes and extended curricula with foundation provisions. In view of the above, and government policy directives to broaden access in the scarce skills areas to increase student throughput, foundation provision was introduced for Commerce and Information Technology programmes at the Vaal Triangle Campus (VTC) of North-West University (NWU) in 2010. Students enrolling for extended programmes do not comply with the minimum prerequisites for the normal programmes. The question then arises as to whether these programmes have the intended impact? This paper reports the results of a two year longitudinal study, tracking the first year academic achievement of the two cohorts of enrolments since 2010. The results provide valuable insight into the structuring of an extended programme and its potential impact.
Abstract: Educational institutions increasingly adopt the
students-as-customers concept to satisfy their students.
Understanding students- perspectives on the use of this business
concept in educational institutions is necessary for the institutions to
effectively align these perspectives with their management practice.
The study investigates whether students in technology and business
disciplines have significantly different attitudes toward using the
students-as-customers concept in educational institutions and
explores the impact of treating students as customers in technology
disciplines under students- perspectives. The results from
quantitative and qualitative data analyses show that technology
students, in contrast to business students, fairly disagree with
educational institutions to treat students as customers. Treating
students as customers in technology disciplines will have a negative
influence on teaching performance, instructor-student relationships
and educational institutions- aim, but a positive influence on service
quality in educational institutions. The paper discusses the findings
and concludes with implications and limitations of the study.
Abstract: This research aims to create a model for analysis of student motivation behavior on e-Learning based on association rule mining techniques in case of the Information Technology for Communication and Learning Course at Suan Sunandha Rajabhat University. The model was created under association rules, one of the data mining techniques with minimum confidence. The results showed that the student motivation behavior model by using association rule technique can indicate the important variables that influence the student motivation behavior on e-Learning.