Abstract: The fundamental issues in ICT Governance (ICTG)
implementation for Malaysian Public Sector (MPS) is how ICT be
applied to support improvements in productivity, management
effectiveness and the quality of services offered to its citizens. Our
main concern is to develop and adopt a common definition and
framework to illustrate how ICTG can be used to better align ICT
with government’s operations and strategic focus. In particular, we
want to identify and categorize factors that drive a successful ICTG
process. This paper presents the results of an exploratory study to
identify, validate and refine such Critical Success Factors (CSFs) and
confirmed seven CSFs and nineteen sub-factors as influential factors
that fit MPS after further validated and refined. The Delphi method
applied in validation and refining process before being endorsed as
appropriate for MPS. The identified CSFs reflect the focus areas that
need to be considered strategically to strengthen ICT Governance
implementation and ensure business success.
Abstract: The aim of this paper is to analyze the ability to
identify and acquire knowledge from external sources at the regional
level in the Czech Republic. The results show that the most important
sources of knowledge for innovative activities are sources within the
businesses themselves, followed by customers and suppliers.
Furthermore, the analysis of relationships between the objective of
the innovative activity and the ability to identify and acquire
knowledge implies that knowledge obtained from (1) customers aims
at replacing outdated products and increasing product quality; (2)
suppliers aims at increasing capacity and flexibility of production;
and (3) competing businesses aims at growing market share and
increasing the flexibility of production and services. Regions should
therefore direct their support especially into development and
strengthening of networks within the value chain.
Abstract: Consumer-to-Consumer (C2C) E-commerce has been
growing at a very high speed in recent years. Since identical or
nearly-same kinds of products compete one another by relying on
keyword search in C2C E-commerce, some sellers describe their
products with spam keywords that are popular but are not related to
their products. Though such products get more chances to be retrieved
and selected by consumers than those without spam keywords,
the spam keywords mislead the consumers and waste their time.
This problem has been reported in many commercial services like
ebay and taobao, but there have been little research to solve this
problem. As a solution to this problem, this paper proposes a method
to classify whether keywords of a product are spam or not. The
proposed method assumes that a keyword for a given product is
more reliable if the keyword is observed commonly in specifications
of products which are the same or the same kind as the given
product. This is because that a hierarchical category of a product
in general determined precisely by a seller of the product and so is
the specification of the product. Since higher layers of the hierarchical
category represent more general kinds of products, a reliable degree
is differently determined according to the layers. Hence, reliable
degrees from different layers of a hierarchical category become
features for keywords and they are used together with features only
from specifications for classification of the keywords. Support Vector
Machines are adopted as a basic classifier using the features, since
it is powerful, and widely used in many classification tasks. In
the experiments, the proposed method is evaluated with a golden
standard dataset from Yi-han-wang, a Chinese C2C E-commerce,
and is compared with a baseline method that does not consider
the hierarchical category. The experimental results show that the
proposed method outperforms the baseline in F1-measure, which
proves that spam keywords are effectively identified by a hierarchical
category in C2C E-commerce.
Abstract: The study examines the influence of marital status on
consumers of products and services using blogs as a source of
information. A pre-designed questionnaire was used to collect the
primary data from the respondents (experiences). Data were collected
from one hundred and eighty seven respondents residing in and
around the Emirates of Sharjah and Dubai of the United Arab
Emirates. The collected data was analyzed with the help of statistical
tools such as averages, percentages, factor analysis, Student’s t-test
and Structural Equation Modelling Technique.
Objectives of the study are to know the reasons how married and
unmarried or single consumers of products and services are
motivated to use blogs as a source of information, to know whether
the consumers of products and services irrespective of their marital
status share their views and experiences with other bloggers and to
know the respondents’ future intentions towards blogging.
The study revealed the following: Majority of the respondents
have the motivation to blog because they are willing to receive
comments on what they post about services, convenience of blogs to
search for information about services and products, by blogging
respondents share information on the symptoms of a disease/ disorder
that may be experienced by someone, helps to share information
about ready to cook mix products and are keen to spend more time
blogging in the future.
Abstract: There is an increasing demand for broadband services
in Indonesia. Therefore, the answer is the use of Ka-Band which has
some advantages such as wider bandwidth, the higher transmission
speeds, and smaller size of antenna in the ground. However, rain
attenuation is the primary factor in the degradation of signal at the
Kaband. In this paper, the author will determine whether the Ka-band
frequency can be implemented in Indonesia which has high intensity
of rainfall.
Abstract: In this study, we will touch upon the legal arrangements issued in Turkey for prevention of condensation and for ensuring pluralism in the media. We will mention the legal arrangements concerning the regulatory and supervisory authority, namely the Radio and Television Supreme Council, for the visual and auditory media. In this context; the legal arrangements, which have been introduced by the Law No 6112 on the Establishment of Radio and Television Enterprises and Their Media Services in relation to the media ownership, will be reviewed through comparison with the Article 29 of the repealed Law No 3984.
Abstract: The article is proposing a base plan for the future Patient Care Information Systems in a changing health care environment where it is necessary to assure quality patient care services and reducing cost and where new technology trends give the opportunities to develop clinical applications and services patient focused according to new business objectives.
Abstract: Service Oriented Architecture (SOA) allows modeling of dynamic interaction between incongruous providers, which enables governing the development of complex applications. However, implementation of SOA comes with some challenges, including its adaptability and robustness. Dynamism is inherent to the nature of service based applications and of their running environment. These factors lead to necessity for dynamic adaptation. In this paper we try to describe basics and main structure of SOA adaptation process with a conceptual view to this issue. In this survey we will review the relevant adaptation approaches. This paper allows studying how different approaches deal with service oriented architecture adaptation life-cycle and provides basic guidelines for their analysis, evaluation and comparison.
Abstract: Compared with traditional distributed environment, the
net-centric environment brings on more demanding challenges for
information sharing with the characteristics of ultra-large scale and
strong distribution, dynamic, autonomy, heterogeneity, redundancy.
This paper realizes an information sharing model and a series of core
services, through which provides an open, flexible and scalable
information sharing platform.
Abstract: This research analyzes factors affecting the success of Bitcoin Value within Thailand and develops a guideline for self-reliance for effective business implementation. Samples in this study included 121 people through surveys. The results revealed four main factors affecting the success as follows: 1) A great majority didn't know what Bitcoin was. 2) Didn't grasp the concept of a digital currency or see the benefit of a digital currency. 3) There is a great need to educate the next generation of learners on the benefits of Bitcoin within the community. 4) Future Career training should be pursued in applied Bitcoin development.
The guideline for self-reliance planning consisted of 4 aspects: 1) Local communities need to develop awareness of the usefulness of Bitcoin and share the value of Bitcoin among friends and family. 2) Computer Science and Business Management staff should develop skills to expand on the benefits of Bitcoin within their departments. 3) Further research should be pursued on how Bitcoin Value can improve business and tourism within Thailand. Local communities should focus on developing Bitcoin awareness by encouraging street vendors to accept Bitcoin as another form of payment for services rendered. 4) Development planning: by arranging meet up groups to conduct further education on Bitcoin and share solutions on adoption into every day usage.
Abstract: Prior literature on innovation diffusion or acceptance has almost exclusively concentrated on consumers’ positive attitudes and behaviors for new products/services. Consumers’ negative attitudes or behaviors to innovations have received relatively little marketing attention, but it happens frequently in practice. This study discusses consumer psychological factors when they try to learn or use new technologies. According to recent research, technological innovation acceptance has been considered as a dynamic or mediated process. This research argues that consumers can experience inertia and emotions in the initial use of new technologies. However, given such consumer psychology, the argument can be made as to whether the inclusion of consumer inertia (routine seeking and cognitive rigidity) and emotions increases the predictive power of new technology acceptance model. As data from the empirical study find, the process is potentially consumer emotion changing (independent of performance benefits) because of technology complexity and consumer inertia, and impact innovative technology use significantly. Finally, the study presents the superior predictability of the hypothesized model, which let managers can better predict and influence the successful diffusion of complex technological innovations.
Abstract: With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.
Abstract: As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors.
The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter.
This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services.
Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change.
The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.
Abstract: Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.
Abstract: Experimental Film Class Project is supported by the Institute for Research and Development at Suan Sunandha Rajabhat University. This project is purported to provide academic and professional services to improve the quality standards of the community and locals in accordance with the mission of the university, which is to improve and expand knowledge for the community and to develop and transfer such knowledge and professions to the next generation. Eventually, it leads to sustainable development because the development of human resources is deemed as the key for sustainable development. Moreover, the Experimental Film Class is an integral part of the teaching of film production at Suan Sunandha International School of Art (SISA). By means of giving opportunities to students for participation in projects by sharing experience, skill and knowledge and participation in field activities, it helps students in the film production major to enhance their abilities and potentials as preparation for their readiness in the marketplace. Additionally, in this class, we provide basic film knowledge, screenwriting techniques, editing and subtitles including uploading videos on social media such as YouTube and Facebook for the participant students.
Abstract: To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.
Abstract: Indoor wireless localization systems have played an
important role to enhance context-aware services. Determining the
position of mobile objects in complex indoor environments, such as
those in multi-floor buildings, is very challenging problems. This
paper presents an effective floor estimation algorithm, which can
accurately determine the floor where mobile objects located. The
proposed algorithm is based on the confidence interval of the
summation of online Received Signal Strength (RSS) obtained from
the IEEE 802.15.4 Wireless Sensor Networks (WSN).We compare
the performance of the proposed algorithm with those of other floor
estimation algorithms in literature by conducting a real
implementation of WSN in our facility. The experimental results and
analysis showed that the proposed floor estimation algorithm
outperformed the other algorithms and provided highest percentage
of floor accuracy up to 100% with 95-percent confidence interval.
Abstract: Overbooking is an approach of selling more goods or services than available capacities because sellers anticipate that some buyers will not show-up or may cancel their bookings. At present, many airlines deploy overbooking strategy in order to deal with the uncertainty of their customers. Particularly, some airlines sell more cargo capacity than what they have available to freight forwarders with beliefs that some of them will cancel later. In this paper, we propose methods to find the optimal overbooking level of volume and weight for air cargo in order to minimize the total cost, containing cost of spoilage and cost of offloaded. Cancellations of volume and weight are jointly random variables with a known joint distribution. Heuristic approaches applying the idea of weight and volume independency is considered to find an appropriate answer to the full problem. Computational experiments are used to explore the performance of approaches presented in this paper, as compared to a naïve method under different scenarios.
Abstract: The elements for success in the service industry for many organizations have been studied and quantified. They range from effective performance evaluation and management to adequately implementing seven P’s. However, the success story of every organization is unique. What might work for one organization might not for another as every company is inherently distinctive. In this paper, the strategic framework behind the success of Liberty Automobiles Dubai is captured. The primary data necessary for this paper was collected through in-depth interviews with the managers for sales, service and marketing as well as the group general manager. Subsequently, the key areas that led to the success of Liberty Autos will be discussed in this paper.
Abstract: Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.