![]() |
Interdisciplinary Journal of Information, Knowledge, and Management
Journal Prestige (SJR): 0.163 ![]() Citation Impact (citeScore): 1 Number of Followers: 13 ![]() ISSN (Print) 1555-1229 - ISSN (Online) 1555-1237 Published by Informing Science Institute ![]() |
- Factors Affecting Individuals’ Behavioral Intention to Use Online
Capital Market Investment Platforms in Indonesia
Authors: Clarita I Nainggolan, Putu Wuri Handayani
Pages: 001 - 029
Abstract: Aim/Purpose: This study aims to examine the ten factors from the Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB), and Unified Theory of Acceptance and Use of Technology (UTAUT) theories in order to analyze behavioral intentions to use the Indonesian online capital market investment platforms and the effect of behavioral intentions on actual usage.Background: The potential growth of capital market investors in Indonesia is large, and the low use of the Internet for investment purposes makes it necessary for stakeholders to understand the factors that affect people’s intentions to invest, especially through online platforms. Several previous studies have explained the intention to use online investment platforms using the TAM and TPB theories. This study tries to combine TAM, TPB, and UTAUT theories in analyzing behavioral intentions to use an online capital market investment platform in Indonesia.Methodology: The research approach employed is a mixed method, particularly explanatory research, which employs quantitative methods first, followed by qualitative methods. Data were collected by conducting interviews and sending online surveys. This study was successful in collecting information on the users of online capital market investment platforms in Indonesia from 1074 respondents, which was then processed and analyzed using Covariance-Based Structural Equation Modeling (CB-SEM) with the IBM AMOS 26.0 application.Contribution: This study complements earlier theories like TAM, TPB, and UTAUT by looking at the intention to use online capital market investment platforms from technological, human, and environmental viewpoints. This study looks at the intention to use the online capital market investing platform as a whole rather than separately depending on investment instruments. This study also assists practitioners including regulators, the government, developers, and investors by offering knowledge of the phenomena and factors that can increase the capital market’s investment intention in Indonesia.Findings: Attitudes, perceived ease of use, perceived behavioral control, subjective norm, and national pride were found to be significant predictors of the intention to use online investment platforms in Indonesia, whereas perceived usefulness, perceived risk, perceived trust, perceived privacy, and price value were not.Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. The government can enact legislation that emphasizes the simplicity and convenience of investment, as well as launch campaigns that encourage people to participate in economic recovery by investing in the capital market. Meanwhile, the developers are concentrating on facilitating the flow of investment transactions through the platform, increasing education and awareness of the benefits of investing in the capital market, and providing content that raises awareness that investing in the capital market can help to restore the national economy.Recommendation for Researchers: Further research is intended to include other variables such as perceived benefits and perceived security, as well as other frameworks such as TRA, to better explain individuals’ behavioral intentions to use online capital investment platforms.Impact on Society: This study can help all stakeholders understand what factors can increase Indonesians’ interest in investing in the capital market, particularly through online investment platforms. This understanding is expected to increase the number of capital market participants and, as a result, have an impact on economic recovery following the COVID-19 pandemic.Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use an online capital market investment platform, such as perceived benefits and perceived security, as well as the addition of control variables such as age, gender, education, and income. International research across nations is also required to build a larger sample size in order to examine the behavior of investors in developing and developed countries and acquire a more thorough understanding of the online capital market investment platform.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-01-16
DOI: https://doi.org/10.28945/5067
Issue No: Vol. 18 (2023)
- Investigating the Adoption of Social Commerce: A Case Study of SMEs in
Jordan
Authors: Ahmad Samed Al-Adwan, Ali Ahmad Trawnih, Anas Amayreh, Tha’er Majali, Hamood Mohammed Al-Hattami
Pages: 031 - 058
Abstract: Aim/Purpose: Social commerce is an emergent topic widely used for product and service sourcing. It helps companies to have frequent interaction with their customers and strive to achieve a competitive advantage. Yet there is only little empirical evidence focusing on social commerce and its adoption in SMEs to date. This study investigates the key factors affecting social commerce adoption in SMEs. This research designed a theoretical model using the Technology, Organization, and Environment (TOE) ModelBackground: Despite its rapid growth and usage, social commerce is still in its evolution phase and its current conception is vague and restricted. Therefore, considering the benefits of social commerce for consumers and businesses, it is important to explore the concept of social commerce.Methodology: The research floated a self-administered questionnaire and surveyed 218 Jordanian SME businesses. The data was analyzed using smart PLS and the results were drawn that covers the detail of the characteristics of respondents, study descriptive, results of regressions assumptions, e.g., data normality, reliability, validity, common method biases, and description of the measurement model, followed by the findings of hypothesis analysis.Contribution: This study has many significant contributions to the existing studies on firms’ adoption of social commerce. It indicates that organizational readiness from the organizational perspective and consumer pressure from the environmental dimension of the TOE model are significant influential elements in the adoption of social commerce in business, followed by high-level management support and trading partner pressure, respectively. This shows that organizational readiness to adopt social commerce and consumer pressure has a vital role in Jordanian SMEs’ adopting social commerce.Findings: The results were drawn from a survey of 218 Jordanian SMEs, indicating that organizational readiness from an organizational dimension and consumer pressure environmental perspective, followed by top management’s support and trading partner pressure, significantly predicts the adoption intentions of social commerce. However, perceived usefulness and security concerns from a technological context do not significantly impact behavioral intentions to utilize social commerce.Recommendations for Practitioners: Lack of awareness about new technology and its potential benefits are not well diffused in the Jordanian context. In short, both organizational and environmental dimensions of the TOE framework significantly influence the behavioral intentions for social commerce adoption in the Jordanian context whereas the third-dimension technological factors do not affect the behavioral intentions of SMEs to adopt social commerce. In the technological context, SMEs need to invest in technology and must spread awareness among Jordanian consumers about the potential benefits of technology and must encourage them to use social commerce platforms to interact because of the high significance of social commerce for businesses as it facilitates the quick completion of tasks, enhances the productivity, and improves the chances of high profitability.Recommendation for Researchers: First, the study is limited in scope as it discusses the direct links between the TOE framework, behavioral intentions to use social commerce, and the actual usage of social commerce in the Jordanian context rather than testing the mediation, and moderation. Future research may examine the mediators and moderators in the conceptual model. Second, the research examined the behavioral intentions of SMEs rather than consumers to adopt social commerce. Further research might consider the consumer perspective on social commerce.Impact on Society: This research aims to identify the key factor that impact the behavioral intentions of SME businesses to practice social commerce. The theoretical underpinning of the study lies in the TOE model, as using its basic assumptions the conceptual grounds and hypothesis of the study are developed.Future Research: The study findings are not generalizable in different contexts as it was specifically conducted by gathering data from the Jordanian population. However future studies may consider different contexts, sectors, cultures, or countries to examine the model. Lastly, the research collected data using convenience sampling from 218 SMEs in Jordan, which may create difficulty in the generalizability of the research, so needs to examine a larger sample in future studies.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-01-16
DOI: https://doi.org/10.28945/5071
Issue No: Vol. 18 (2023)
- The Influence of Big Data Management on Organizational Performance in
Organizations: The Role of Electronic Records Management System
Potentiality
Authors: Muaadh Mukred, Umi Asma’ Mokhtar, Burkan Hawash, Mohammed Islam Nofal
Pages: 059 - 086
Abstract: Aim/Purpose: The use of digital technology, such as an electronic records management system (ERMS), has prompted widespread changes across organizations. The organization needs to support its operations with an automation system to improve production performance. This study investigates ERMS’s potentiality to enhance organizational performance in the oil and gas industry. Background: Oil and gas organizations generate enormous electronic records that lead to difficulties in managing them without any system or digitalization procedure. The need to use a system to manage big data and records affects information security and creates several problems. This study supports decision-makers in oil and gas organizations to use ERMS to enhance organizational performance. Methodology: We used a quantitative method by integrating the typical partial least squares (SEM-PLS) approach, including measurement items, respondents’ demographics, sampling and collection of data, and data analysis. The SEM-PLS approach uses a measurement and structural model assessment to analyze data.Contribution: This study contributes significantly to theory and practice by providing advancements in identity theory in the context of big data management and electronic records management. This study is a foundation for further research on the role of ERMS in operations performance and Big Data Management (BDM). This research makes a theoretical contribution by studying a theory-driven framework that may serve as an essential lens to evaluate the role of ERMS in performance and increase its potentiality in the future. This research also evaluated the combined impacts of general technology acceptance theory elements and identity theory in the context of ERMS to support data management. Findings: This study provides an empirically tested model that helps organizations to adopt ERMS based on the influence of big data management. The current study’s findings looked at the concerns of oil and gas organizations about integrating new technologies to support organizational performance. The results demonstrated that individual characteristics of users in oil and gas organizations, in conjunction with administrative features, are robust predictors of ERMS. The results show that ERMS potentiality significantly influences the organizational performance of oil and gas organizations. The research results fit the big ideas about how big data management and ERMS affect respondents to adopt new technologies.Recommendations for Practitioners: This study contributes significantly to the theory and practice of ERMS potentiality and BDM by developing and validating a new framework for adopting ERMS to support the performance and production of oil and gas organizations. The current study adds a new framework to identity theory in the context of ERMS and BDM. It increases the perceived benefits of using ERMS in protecting the credibility and authenticity of electronic records in oil and gas organizations.Recommendation for Researchers: This study serves as a foundation for future research into the function and influence of big data management on ERMS that support the organizational performance. Researchers can examine the framework of this study in other nations in the future, and they will be able to analyze this research framework to compare various results in other countries and expand ERMS generalizability and efficacy.Impact on Society: ERMS and its impact on BDM is still a developing field, and readers of this article can assist in gaining a better understanding of the literature’s dissemination of ERMS adoption in the oil and gas industry. This study presents an experimentally validated model of ERMS adoption with the effect of BDM in the oil and gas industry.Future Research: In the future, researchers may be able to examine the impact of BDM and user technology fit as critical factors in adopting ERMS by using different theories or locations. Furthermore, researchers may include the moderating impact of demographical parameters such as age, gender, wealth, and experience into this study model to make it even more robust and comprehensive. In addition, future research may examine the significant direct correlations between human traits, organizational features, and individual perceptions of BDM that are directly related to ERMS potentiality and operational performance in the future.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-01-28
DOI: https://doi.org/10.28945/5072
Issue No: Vol. 18 (2023)
- Customer Churn Prediction in the Banking Sector Using Machine
Learning-Based Classification Models
Authors: Van-Ho Nguyen, Hoang Dang Tran, Ngoc Le
Pages: 087 - 105
Abstract: Aim/Purpose: Previous research has generally concentrated on identifying the variables that most significantly influence customer churn or has used customer segmentation to identify a subset of potential consumers, excluding its effects on forecast accuracy. Consequently, there are two primary research goals in this work. The initial goal was to examine the impact of customer segmentation on the accuracy of customer churn prediction in the banking sector using machine learning models. The second objective is to experiment, contrast, and assess which machine learning approaches are most effective in predicting customer churn.Background: This paper reviews the theoretical basis of customer churn, and customer segmentation, and suggests using supervised machine-learning techniques for customer attrition prediction.Methodology: In this study, we use different machine learning models such as k-means clustering to segment customers, k-nearest neighbors, logistic regression, decision tree, random forest, and support vector machine to apply to the dataset to predict customer churn.Contribution: The results demonstrate that the dataset performs well with the random forest model, with an accuracy of about 97%, and that, following customer segmentation, the mean accuracy of each model performed well, with logistic regression having the lowest accuracy (87.27%) and random forest having the best (97.25%).Findings: Customer segmentation does not have much impact on the precision of predictions. It is dependent on the dataset and the models we choose.Recommendations for Practitioners: The practitioners can apply the proposed solutions to build a predictive system or apply them in other fields such as education, tourism, marketing, and human resources.Recommendation for Researchers: The research paradigm is also applicable in other areas such as artificial intelligence, machine learning, and churn prediction. Impact on Society: Customer churn will cause the value flowing from customers to enterprises to decrease. If customer churn continues to occur, the enterprise will gradually lose its competitive advantage.Future Research: Build a real-time or near real-time application to provide close information to make good decisions. Furthermore, handle the imbalanced data using new techniques.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-02-28
DOI: https://doi.org/10.28945/5086
Issue No: Vol. 18 (2023)
- Agile Practices and Their Impact on Agile Maturity Level of Software
Companies in Nepal
Authors: Gangaram Biswakarma, Poojan Bhandari
Pages: 107 - 125
Abstract: Aim/Purpose: Using the Agile Adoption Framework (AAF), this study aims to examine the agile potential of software development companies in Nepal based on their agile maturity level. In addition, this study also examines the impact of various basic agile practices in determining the maturity level of the agile processes being implemented in the software industry of Nepal.Background: Even if most organizations in the software sector utilize agile development strategies, it is essential to evaluate their performance. Nepal’s software industry did not adopt agile techniques till 2014. The Nepalese industry must always adapt to new developments and discover ways to make software development more efficient and beneficial. The population of the study consists of 1,500 and 2,000 employees of software companies in Nepal implementing agile techniques.Methodology: The sample size considered was 150 employees working in software companies in Nepal. However, only 106 respondents responded after three follow-ups. The sample was collected with purposive sampling. A questionnaire was developed to gain information on Customer Adaptive, Customer Collaboration, Continuous Delivery, Human Centric, and Technical Excellence related to agile practices along with the Agile Maturity Level.Contribution: This research contributes to the understanding of agile practices adopted in software companies in developing countries like Nepal. It also reveals the determinants of the agility of software companies in developing countries.Findings: The results suggest that some of the basic principles of agile have a very significant role in Agile Maturity Level in the Nepali context. In the context of Nepal, human-centered practices have a very high level of correlation, which plays a vital role as a major predictor of the agile maturity level. In addition, Technical Excellence is the variable that has the highest level of association with the Agile Maturity Level, making it the most significant predictor of this quality.Recommendations for Practitioners: As Nepali software companies are mostly offshore or serve outsourcing companies, there is a very thin probability of Nepali developers being able to interact with actual clients and this might be one of the reasons for the Nepali industry not relying on Customer Adaptation and Collaboration as major factors of the Agile methodologies. Continuous Delivery, on the other hand, has a significant degree of correlation with Agile Maturity Level. Human-centric practices have a very high level of correlation as well as being a major predictor in determining the Agile Maturity Level in the context of Nepal.Technical Excellence is the most significant predictor and the variable which has the highest level of correlation with Agile Maturity Level. Practitioners should mainly focus on technical excellence as well as human-centric practices to achieve a higher level of Agile Maturity.Recommendation for Researchers: There has not been any such research in the Nepali context that anyone could rely on, to deep dive into their organizational concerns regarding agile strategies and plans. Researchers will need to focus on a more statistical approach with data-driven solutions to the issues related to people and processes. Researchers will need to cover freelancers as well as academics to get a different perspective on what can be the better practices to achieve a higher level of agile maturity.Impact on Society: This study on Agile work is accessible not only to the software industry but also to the general public. The Agile technique has had a huge impact on society’s project management. It has revolutionized how teams approach project planning, development, and execution. The paper’s findings will further information regarding the Agile methodology, which emphasizes collaboration and communication, fosters teamwork and higher quality work, and promotes the exchange of knowledge, ideas, and the pursuit of common goals.Future Research: Owing to the limitations of this study, it is necessary to analyze agile practices in the Nepalese software sector using additional factors that influence agile maturity. The conclusion that years of agile experience do not serve as a balancing factor for both agile practices and the Agile Maturity Level requires additional research. Whether a software outsourcing firm or not, the organization type had no bearing on the degree of maturity of agile methods; this leaves space for further research.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-03-16
DOI: https://doi.org/10.28945/5091
Issue No: Vol. 18 (2023)
- How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of
Customer Journey Affect Consent to Utilize Personal Data
Authors: Ari V Alamäki, Marko Mäki, Janne Kauttonen
Pages: 127 - 147
Abstract: Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns.Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors.Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality.Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables.Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor.Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy.Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-04-05
DOI: https://doi.org/10.28945/5098
Issue No: Vol. 18 (2023)
- A Model Predicting Student Engagement and Intention with Mobile Learning
Management Systems
Authors: Atallah AL-Shatnawi, Jehad Imlawi, Bader M AlFawwaz, Hasan M AL-Shatnawi, Sultan Al-masaeed
Pages: 149 - 172
Abstract: Aim/Purpose: The aim of this study is to develop and evaluate a comprehensive model that predicts students’ engagement with and intent to continue using mobile-Learning Management Systems (m-LMS).Background: m-LMS are increasingly popular tools for delivering course content in higher education. Understanding the factors that affect student engagement and continuance intention can help educational institutions to develop more effective and user-friendly m-LMS platforms.Methodology: Participants with prior experience with m-LMS were employed to develop and evaluate the proposed model that draws on the Technology Acceptance Model (TAM), Task-Technology Fit (TTF), and other related models. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the model.Contribution: The study provides a comprehensive model that takes into account a variety of factors affecting engagement and continuance intention and has a strong predictive capability.Findings: The results of the study provide evidence for the strong predictive capability of the proposed model and supports previous research. The model identifies perceived usefulness, perceived ease of use, interactivity, compatibility, enjoyment, and social influence as factors that significantly influence student engagement and continuance intention.Recommendations for Practitioners: The findings of this study can help educational institutions to effectively meet the needs of students for interactive, effective, and user-friendly m-LMS platforms.Recommendation for Researchers: This study highlights the importance of understanding the antecedents of students’ engagement with m-LMS. Future research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability.Impact on Society: The engagement model can help educational institutions to understand how to improve student engagement and continuance intention with m-LMS, ultimately leading to more effective and efficient mobile learning.Future Research: Additional research should be conducted to test the proposed model in different contexts and with different populations to further validate its applicability.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-04-25
DOI: https://doi.org/10.28945/5099
Issue No: Vol. 18 (2023)
- Ecommerce Fraud Incident Response: A Grounded Theory Study
Authors: Joshua Dwight
Pages: 173 - 202
Abstract: Aim/Purpose: This research study aimed to explore ecommerce fraud practitioners’ experiences and develop a grounded theory framework to help define an ecommerce fraud incident response process, roles and responsibilities, systems, stakeholders, and types of incidents. Background: With a surge in global ecommerce, online transactions have become increasingly fraudulent, complex, and borderless. There are undefined ecommerce fraud roles, responsibilities, processes, and systems that limit and hinder cyber incident response to fraudulent activities.Methodology: A constructivist grounded theory approach was used to investigate and develop a theoretical foundation of ecommerce fraud incident response based on fraud practitioners’ experiences and job descriptions. The study sample consisted of 8 interviews with ecommerce fraud experts.Contribution: This research contributes to the body of knowledge by helping define a novel framework that outlines an ecommerce fraud incident response process, roles and responsibilities, systems, stakeholders, and incident types.Findings: An ecommerce fraud incident response framework was developed from fraud experts’ perspectives. The framework helps define processes, roles, responsibilities, systems, incidents, and stakeholders. The first finding defined the ecommerce fraud incident response process. The process includes planning, identification, analysis, response, and improvement. The second finding was that the fraud incident response model did not include the containment phase. The next finding was that common roles and responsibilities included fraud prevention analysis, tool development, reporting, leadership, and collaboration. The fourth finding described practitioners utilizing hybrid tools and systems for fraud prevention and detection. The fifth finding was the identification of internal and external stakeholders for communication, collaboration, and information sharing. The sixth finding is that research participants experienced different organizational alignments. The seventh key finding was stakeholders do not have a holistic view of the data and information to make some connections about fraudulent behavior. The last finding was participants experienced complex fraud incidents.Recommendations for Practitioners: It is recommended to adopt the ecommerce fraud response framework to help ecommerce fraud and security professionals develop an awareness of cyber fraud activities and/or help mitigate cyber fraud activities. Future Research: Future research could entail conducting a quantitative analysis by surveying the industry on the different components such as processes, systems, and responsibilities of the ecommerce fraud incident response framework. Other areas to explore and evaluate are maturity models and organizational alignment, collaboration, information sharing, and stakeholders. Lastly, further research can be pursued on the nuances of ecommerce fraud incidents using frameworks such as attack graph generation, crime scripts, and attack trees to develop ecommerce fraud response playbooks, plans, and metrics.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-01
DOI: https://doi.org/10.28945/5110
Issue No: Vol. 18 (2023)
- Determinants of Radical and Incremental Innovation: The Roles of Human
Resource Management Practices, Knowledge Sharing, and Market Turbulence
Authors: Khoa Dinh Vu, Dat Tho Tran, Phong Ba Le, Phuong Thi Lan Tran
Pages: 203 - 224
Abstract: Aim/Purpose: Given the increasingly important role of knowledge and human resources for firms in developing and emerging countries to pursue innovation, this paper aims to study and explore the potential intermediating roles of knowledge donation and collection in linking high-involvement human resource management (HRM) practice and innovation capability. The paper also explores possible moderators of market turbulence in fostering the influences of knowledge-sharing (KS) behaviors on innovation competence in terms of incremental and radical innovation.Background: The fitness of HRM practice is critical for organizations to foster knowledge capital and internal resources for improving innovation and sustaining competitive advantage.Methodology: The study sample is 309 respondents and Structural Equation Model (SEM) was used for the analysis of the data obtained through a questionnaire survey with the aid of AMOS version 22.Contribution: This paper increases the understanding of the precursor role of high-involvement HRM practices, intermediating mechanism of KS activities, and the regulating influence of market turbulence in predicting and fostering innovation capability, thereby pushing forward the theory of HRM and innovation management.Findings: The empirical findings support the proposed hypotheses relating to the intermediating role of KS in the HRM practices-innovation relationship. It spotlights the crucial character of market turbulence in driving the domination of knowledge-sharing behaviors on incremental innovation.Recommendations for Practitioners: The proposed research model can be applied by leaders and directors to foster their organizational innovation competence.Recommendation for Researchers: Researchers are recommended to explore the influence of different models of HRM practices on innovation to identify the most effective pathway leading to innovation for firms in developing and emerging nations.Impact on Society: This paper provides valuable initiatives for firms in developing and emerging markets on how to leverage the strategic and internal resources of an organization for enhancing innovation.Future Research: Future studies should investigate the influence of HRM practices and knowledge resources to promote frugal innovation models for dealing with resource scarcity.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-06
DOI: https://doi.org/10.28945/5109
Issue No: Vol. 18 (2023)
- A New Model for Collecting, Storing, and Analyzing Big Data on Customer
Feedback in the Tourism Industry
Authors: Van-Ho Nguyen, Thanh Ho, Thien Le, Hoanh-Su Le, Dã Thôn Nguyen, Tu Mai, Anh Tran, Hoai-Phan Truong
Pages: 225 - 249
Abstract: Aim/Purpose: In this study, the research proposes and experiments with a new model of collecting, storing, and analyzing big data on customer feedback in the tourism industry. The research focused on the Vietnam market.Background: Big Data describes large databases that have been “silently” built by businesses, which include product information, customer information, customer feedback, etc. This information is valuable, and the volume increases rapidly over time, but businesses often pay little attention or store it discretely, not centrally, thereby wasting an extremely large resource and partly causing limitations for business analysis as well as data.Methodology: The study conducted an experiment by collecting customer feedback data in the field of tourism, especially tourism in Vietnam, from 2007 to 2022. After that, the research proceeded to store and mine latent topics based on the data collected using the Topic Model. The study applied cloud computing technology to build a collection and storage model to solve difficulties, including scalability, system stability, and system cost optimization, as well as ease of access to technology.Contribution: The research has four main contributions: (1) Building a model for Big Data collection, storage, and analysis; (2) Experimenting with the solution by collecting customer feedback data from huge platforms such as Booking.com, Agoda.com, and Phuot.vn based on cloud computing, focusing mainly on tourism Vietnam; (3) A Data Lake that stores customer feedback and discussion in the field of tourism was built, supporting researchers in the field of natural language processing; (4) Experimental research on the latent topic mining model from the collected Big Data based on the topic model.Findings: Experimental results show that the Data Lake has helped users easily extract information, thereby supporting administrators in making quick and timely decisions. Next, PySpark big data processing technology and cloud computing help speed up processing, save costs, and make model building easier when moving to SaaS. Finally, the topic model helps identify customer discussion trends and identify latent topics that customers are interested in so business owners have a better picture of their potential customers and business.Recommendations for Practitioners: Empirical results show that facilities are the factor that customers in the Vietnamese market complain about the most in the tourism/hospitality sector. This information also recommends that practitioners reduce their expectations about facilities because the overall level of physical facilities in the Vietnamese market is still weak and cannot be compared with other countries in the world. However, this is also information to support administrators in planning to upgrade facilities in the long term.Recommendation for Researchers: The value of Data Lake has been proven by research. The study also formed a model for big data collection, storage, and analysis. Researchers can use the same model for other fields or use the model and algorithm proposed by this study to collect and store big data in other platforms and areas.Impact on Society: Collecting, storing, and analyzing big data in the tourism sector helps government strategists to identify tourism trends and communication crises. Based on that information, government managers will be able to make decisions and strategies to develop regional tourism, propose price levels, and support innovative programs. That is the great social value that this research brings.Future Research: With each different platform or website, the study had to build a query scenario and choose a different technology approach, which limits the ability of the solution’s scalability to multiple platforms. Research will continue to build and standardize query scenarios and processing technologies to make scalability to other platforms easier.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-07
DOI: https://doi.org/10.28945/5107
Issue No: Vol. 18 (2023)
- Employing Artificial Neural Networks and Multiple Discriminant Analysis to
Evaluate the Impact of the COVID-19 Pandemic on the Financial Status of
Jordanian Companies
Authors: Khaled Halteh, Hakem Sharari
Pages: 251 - 267
Abstract: Aim/Purpose: This paper aims to empirically quantify the financial distress caused by the COVID-19 pandemic on companies listed on Amman Stock Exchange (ASE). The paper also aims to identify the most important predictors of financial distress pre- and mid-pandemic.Background: The COVID-19 pandemic has had a huge toll, not only on human lives but also on many businesses. This provided the impetus to assess the impact of the pandemic on the financial status of Jordanian companies. Methodology: The initial sample comprised 165 companies, which was cleansed and reduced to 84 companies as per data availability. Financial data pertaining to the 84 companies were collected over a two-year period, 2019 and 2020, to empirically quantify the impact of the pandemic on companies in the dataset. Two approaches were employed. The first approach involved using Multiple Discriminant Analysis (MDA) based on Altman’s (1968) model to obtain the Z-score of each company over the investigation period. The second approach involved developing models using Artificial Neural Networks (ANNs) with 15 standard financial ratios to find out the most important variables in predicting financial distress and create an accurate Financial Distress Prediction (FDP) model.Contribution: This research contributes by providing a better understanding of how financial distress predictors perform during dynamic and risky times. The research confirmed that in spite of the negative impact of COVID-19 on the financial health of companies, the main predictors of financial distress remained relatively steadfast. This indicates that standard financial distress predictors can be regarded as being impervious to extraneous financial and/or health calamities.Findings: Results using MDA indicated that more than 63% of companies in the dataset have a lower Z-score in 2020 when compared to 2019. There was also an 8% increase in distressed companies in 2020, and around 6% of companies came to be no longer healthy. As for the models built using ANNs, results show that the most important variable in predicting financial distress is the Return on Capital. The predictive accuracy for the 2019 and 2020 models measured using the area under the Receiver Operating Characteristic (ROC) graph was 87.5% and 97.6%, respectively.Recommendations for Practitioners: Decision makers and top management are encouraged to focus on the identified highly liquid ratios to make thoughtful decisions and initiate preemptive actions to avoid organizational failure.Recommendation for Researchers: This research can be considered a stepping stone to investigating the impact of COVID-19 on the financial status of companies. Researchers are recommended to replicate the methods used in this research across various business sectors to understand the financial dynamics of companies during uncertain times.Impact on Society: Stakeholders in Jordanian-listed companies should concentrate on the list of most important predictors of financial distress as presented in this study.Future Research: Future research may focus on expanding the scope of this study by including other geographical locations to check for the generalisability of the results. Future research may also include post-COVID-19 data to check for changes in results.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-08
DOI: https://doi.org/10.28945/5112
Issue No: Vol. 18 (2023)
- Factors Impacting the Behavioral Intention to Use Social Media for
Knowledge Sharing: Insights from Disaster Relief Practitioners
Authors: Muhammad Mahboob Khurshid, Yunis Ali Ahmed
Pages: 269 - 300
Abstract: Aim/Purpose: The primary purpose of this study is to investigate the factors that impact the behavioral intention to use social media (SM) for knowledge sharing (KS) in the disaster relief (DR) context.Background: With the continuing growth of SM for KS in the DR environment, disaster relief organizations across the globe have started to realize its importance in streamlining their processes in the post-implementation phase. However, SM-based KS depends on the willingness of members to share their knowledge with others, which is affected by several technological, social, and organizational factors. Methodology: A survey was conducted in Somalia to gather primary data from DR practitioners, using purposive sampling as the technique. The survey collected 214 valid responses, which were then analyzed with the PLS-SEM approach.Contribution: The study contributes to an understanding of the real-life hurdles faced by disaster relief organizations by expanding on the C-TAM-TPB model with the inclusion of top management support, organizational rewards, enjoyment in helping others, knowledge self-efficacy, and interpersonal trust factors. Additionally, it provides useful recommendations to managers of disaster relief organizations on the key factors to consider.Findings: The findings recorded that perceived usefulness, ease of use, top management support, enjoyment in helping others, knowledge self-efficacy, and interpersonal trust were critical factors in determining behavioral intention (BI) to use SM-based KS in the DR context. Furthermore, the mediator variables were attitude, subjective norms, and perceived behavioral control.Recommendations for Practitioners: Based on the research findings, it was determined that management should create different discussion forums among the disaster relief teams to ensure the long-term use of SM-based KS within DR organizations. They should also become involved in the discussions for disaster-related knowledge such as food supplies, shelter, or medical relief that disaster victims need. Disaster relief managers should consider effective and adequate training to enhance individual knowledge and self-efficacy since a lack of training may increase barriers and difficulties in using SM for KS during a DR process.Recommendation for Researchers: The conceptual model, further empirically investigated, can be employed by other developing countries in fostering acceptance of SM for KS during disaster relief operations.Impact on Society: Disaster relief operations can be facilitated using social media by considering the challenges DR practitioners face during emergencies.Future Research: In generalizing this study’s findings, other national or global disaster relief organizations should consider, when applying and testing, the research instruments and proposed model. The researchers may extend this study by collecting data from managers or administrators since they are different types of users of the SM-based KS system.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-11
DOI: https://doi.org/10.28945/5103
Issue No: Vol. 18 (2023)
- Investigating the Impact of Dual Network Embedding and Dual
Entrepreneurial Bricolage on Knowledge-Creation Performance: An Empirical
Study in Fujian, China
Authors: Caiyun Zhuang, Guohong Chen, Juan Liang, Yang Zou, Si Chen
Pages: 301 - 319
Abstract: Aim/Purpose: This study investigates the relationship between dual network embedding, dual entrepreneurial bricolage, and knowledge-creation performance. Background: The importance of new ventures for innovation and economic growth has been fully endorsed. Establishing incubation organizations to help new startups overcome constraints and dilemmas has become the consensus of various countries. In particular, the number of Chinese makerspaces has rapidly increased. Startups in the makerspaces form a loosely coupled dual network to cooperate and share resources, especially knowledge.Methodology: By convenience sampling, 400 startups in the makerspaces in Fujian Province, China were selected for the questionnaire survey study. In total, 307 valid responses were collected, yielding a response rate of 76.8%. The survey data were analyzed for hypothesis testing, using the PL-SEM technique with the AMOS20.0 software.Contribution: At the theoretical level, this research supplements the exploration of the influencing factors of the entrepreneurial bricolage of startups at the network level. It deepens the research on the internal mechanism of the dual network embeddedness affecting the knowledge-creation performance. In practice, it provides a theoretical basis and management inspiration for startups in makerspaces to overcome the inherent disadvantage of being too small and weak to explore innovative paths. Findings: First, relational embedding of startups in makerspaces directly affects knowledge-creation performance. Second, dual entrepreneurial bricolage plays a mediating role in diversity. Selective entrepreneurial bricolage plays a partial mediating role between relationship embedding and knowledge-creation performance. Parallel entrepreneurial bricolage plays a complete intermediary role between structural embedding and knowledge-creation performance. Dual entrepreneurial bricolage plays a complete intermediary role between knowledge embedding and knowledge-creation performance.Recommendations for Practitioners: Enterprises in the makerspaces should make dynamic adjustments to the network embedded state and dual entrepreneurial bricolage to improve knowledge-creation performance. When startups conduct selective entrepreneurship bricolage, they should strengthen relational and knowledge embeddedness to improve their relationship strength and tacit knowledge acquisition. When startups conduct parallel entrepreneurship bricolage, structural and knowledge embedding should be strengthened to improve the position of enterprises in the network to acquire diversified knowledge to explore and discover new business opportunities and project resources.Recommendation for Researchers: The heterogeneity of industries and regions may impact the dual network embedding mechanism of startups. Researchers can choose a wider range of regions and industries for sampling. Impact on Society: This study provides a theoretical basis and management inspiration for startups to overcome the inherent disadvantage of being too small and weak to explore innovative paths. It provides a basis to support startups in unleashing innovation vitality and achieving healthy growth.Future Research: Previous studies have shown that network relationships and bricolage behavior have a certain relationship with the enterprise life cycle. Future research can adopt a longitudinal research design across time points, which will increase the explanatory power of research conclusions.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-11
DOI: https://doi.org/10.28945/5111
Issue No: Vol. 18 (2023)
- Analysis of the Scale Types and Measurement Units in Enterprise
Architecture (EA) Measurement
Authors: Ammar Abdallah, Alain ABRAN, Malik Qasaimeh, Alaeddin Mohammad Khalaf Ahmad, Abdullah Al-Refai
Pages: 321 - 352
Abstract: Aim/Purpose: This study identifies the scale types and measurement units used in the measurement of enterprise architecture (EA) and analyzes the admissibility of the mathematical operations used.Background: The majority of measurement solutions proposed in the EA literature are based on researchers’ opinions and many with limited empirical validation and weak metrological properties. This means that the results generated by these solutions may not be reliable, trustworthy, or comparable, and may even lead to wrong investment decisions. While the literature proposes a number of EA measurement solutions, the designs of the mathematical operations used to measure EA have not yet been independently analyzed. It is imperative that the EA community works towards developing robust, reliable, and widely accepted measurement solutions. Only then can senior management make informed decisions about the allocation of resources for EA initiatives and ensure that their investment yields optimal results. Methodology: In previous research, we identified, through a systematic literature review, the EA measurement solutions proposed in the literature and classified them by EA entity types. In a subsequent study, we evaluated their metrology coverage from both a theoretical and empirical perspective. The metrology coverage was designed using a combination of the evaluation theory, best practices from the software measurement literature including the measurement context model, and representational theory of measurement to evaluate whether EA measurement solutions satisfy the metrology criteria. The research study reported here presents a more in-depth analysis of the mathematical operations within the proposed EA measurement solutions, and for each EA entity type, each mathematical operation used to measure EA was examined in terms of the scale types and measurement units of the inputs, their transformations through mathematical operations, the impact in terms of scale types, and measurement units of the proposed outputs.Contribution: This study adds to the body of knowledge on EA measurement by offering a metrology-based approach to analyze and design better EA measurement solutions that satisfy the validity of scale type transformations in mathematical operations and the use of explicit measurement units to allow measurement consistency for their usage in decision-making models. Findings: The findings from this study reveal that some important metrology and quantification issues have been overlooked in the design of EA measurement solutions proposed in the literature: a number of proposed EA mathematical operations produce numbers with unknown units and scale types, often the result of an aggregation of undetermined assumptions rather than explicit quantitative knowledge. The significance of such aggregation is uncertain, leading to numbers that have suffered information loss and lack clear meaning. It is also unclear if it is appropriate to add or multiply these numbers together. Such EA numbers are deemed to have low metrological quality and could potentially lead to incorrect decisions with serious and costly consequences.Recommendations for Practitioners: The results of the study provide valuable insights for professionals in the field of EA. Identifying the metrology limitations and weaknesses of existing EA measurement solutions may indicate, for instance, that practitioners should wait before using them until their design has been strengthened. In addition, practitioners can make informed choices and select solutions with a more robust metrology design. This, in turn, will benefit enterprise architects, software engineers, and other EA professionals in decision making, by enabling them to take into consideration factors more adequately such as cost, quality, risk, and value when assessing EA features. The study’s findings thus contribute to the development of more reliable and effective EA measurement solutions.Recommendation for Researchers: Researchers can use with greater confidence the EA measurement solutions with admissible mathematical operations and measurement units to develop new decision-making models. Other researchers can carry on research to address the weaknesses identified in this study and propose improved ones.Impact on Society: Developers, architects, and managers may be making inappropriate decisions based on seriously flawed EA measurement solutions proposed in the literature and providing undue confidence and a waste of resources when based on bad measurement design. Better quantitative tools will ultimately lead to better decision making in the EA domain, as in domains with a long history of rigor in the design of the measurement tools. Such advancements will benefit enterprise architects, software engineers, and other practitioners, by providing them with more meaningful measurements for informed decision making.Future Research: While the analysis described in this study has been explicitly applied to evaluating EA measurement solutions, researchers and practitioners in other domains can also examine measurement solutions proposed in their respective domains and design new ones.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-05-21
DOI: https://doi.org/10.28945/5113
Issue No: Vol. 18 (2023)
- The Influence of COVID-19 on Employees’ Use of Organizational
Information Systems
Authors: Dan Bouhnik, Maayan Nakash
Pages: 353 - 368
Abstract: Aim/Purpose.COVID-19 was an unprecedented disruptive event that accelerated the shift to remote work and encouraged widespread adoption of digital tools in organizations. This empirical study was conducted from an organizational-strategic perspective, with the aim of examining how the COVID-19 pandemic outbreak affected employees’ use of organizational information systems (IS) as reflected in frequency. Background.To date, only a limited effort has been made, and a rather narrow perspective has been adopted, regarding the consequences of the adoption of new work environments following COVID-19. It seems that the literature is lacking in information regarding employee use of organizational IS since the outbreak of the pandemic. Specifically, this issue has not yet been examined in relation to employees’ perception about the organization’s digital efforts and technological maturity for remote work. The present study bridges this gap.Methodology.The public sector in Israel, which employs about a third of the Israeli work-force, was chosen as a case study of information-intensive organizations. During the first year of COVID-19, 716 questionnaires were completed by employees and managers belonging to four government ministries operating in Israel. The responses were statistically analyzed using a Chi-Square and Spearman’s Rho tests.Contribution.Given that the global pandemic is an ongoing phenomenon and not a passing episode, the findings provide important theoretical and practical contributions. The period prior to the COVID-19 pandemic and the period of the pandemic are compared with regard to organizational IS use. Specifically, the study sheds new light on the fact that employee perceptions motivated increased IS use during an emergency. The results contribute to the developing body of empirical knowledge in the IS field in the era of digital transformation (DT).Findings.More than half of the respondents who reported that they did not use IS before COVID-19 stated that the pandemic did not change this. We also found a significant positive correlation between the perception of the digital efforts made by organizations to enable connection to the IS for remote work and a change in frequency of IS use. This frequency was also found to have a significant positive correlation with the perception of the organization’s technological maturity to enable effective and continuous remote work.Recommendations for Practitioners.In an era of accelerating DT, this paper provides insights that may support chief information officers and chief digital officers in understanding how to promote the use of IS. The results can be useful for raising awareness of the importance of communicating managerial messages for employees regarding the organizational strategy and the resilience achieved through IS not only in routine, but also in particular in emergency situations.Recommendations for Researchers.Considering that the continual crisis has created challenges in IS research, it is appropriate to continue researching the adaptation and acclimation of organizations to the “new normal”.Impact on Society.The COVID-19 pandemic created a sudden change in employment models, which have become more flexible than ever. The research insights enrich the knowledge about the concrete consequences of this critical change.Future Research.We suggest that researchers investigate this core issue in other sectors and/or other countries, in order to be obtain new and complementary empirical insights on a comparative basis.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-06-27
DOI: https://doi.org/10.28945/5164
Issue No: Vol. 18 (2023)
- The Perspectives of University Academics on Their Intention to Purchase
Green Smartphones in Sri Lanka
Authors: Pivithuru J Kumarasinghe, Qiubo Huang, Nilmini Rathnayake
Pages: 369 - 385
Abstract: Aim/Purpose: Most people use their phones for work and communication. Businesses today require sustainable mobile phones to limit the environmental impact of mobile phones. According to the Environmental Protection Agency (EPA), a green product uses less energy. Green smartphones need low radiation emission, are made from recyclable materials, and are designed to last longer than typical smartphones. Further, the manufacturing process needs to have a low environmental impact. The present study aims to identify the influence of variables (such as Green Awareness, Environmental Concern, Altruism, and Willingness to Pay) on green smartphone purchase intention among academics in the Sri Lankan higher education sector.Background: With the swift technological advances, almost everyone has begun to use smartphones. Simultaneously, smartphone manufacturers have begun to release cutting-edge smartphone models to the general public. As a result, it has generated a significant amount of e-waste for the environment. As a result, therefore, the sustainability of green smartphones has become a major societal concern in the developed world, but this is not yet true in the developing worldMethodology: The study used a qualitative research method in which the authors attempted to acquire primary data by conducting in-depth interviews with academics from the Sri Lankan higher education sector using a semi-structured interview guide. Eight interviews were conducted, audio recorded, and word-to-word transcribed for content analysis. Researchers used content analysis to determine the presence, meanings, and linkages of specific words, themes, or concepts. Contribution: The findings provide important environmental insights for smartphone makers and society, such as introducing waste reduction programs and energy-saving practices and creating awareness among people to change their consumption patterns. The study will provide valuable insights into the green smartphone phone purchasing intentions of academics in a developing country, especially helping green smartphone producers and marketers construct effective tactics with the insight of the current study based on university faculty members’ viewpoints.Findings: The current study’s findings revealed that academics acknowledge the need for environmental protection with an awareness of the green concept and environmental concerns. According to the interviews, most participants intended to move from their present smartphone to an ecologically friendly phone, as they explained on altruism. This implies that even academics in underdeveloped countries are worried about environmental issues and have shown a more robust understanding of these issues and how environmentally aware individuals’ activities may assist the earth’s sustainability. Further, academics have a willingness to pay for a green smartphone.Recommendations for Practitioners: Academics prioritize environmental conservation when making purchases. This implies that manufacturers and enterprises should focus on developing and in- novating more environmentally friendly products.Recommendation for Researchers: Using only academics as a sample approach is severely limited if the study’s population comprises people with various qualities. Nevertheless, this study presented only four independent variables, and more factors impacting green smartphone purchasing intention may exist. As a result, it is proposed that future research consider other factors.Impact on Society: It was discovered that most participants displayed altruism in their product purchases, implying that policymakers must strengthen the moral practice of concern for the welfare and happiness of other humans, even in developing countries.Future Research: A further in-depth study focusing on many perspectives such as limits and motivations for purchasing green products in various socioeconomic groups with varying moderating factors such as gender, education, rural-urban, and so on would be advantageous. Individual (emotions, habits, perceived behavioral control, trust, values, personal norm, knowledge) and situational (availability, product attributes, subjective norm, brand, eco-labeling) variables should be included in future research.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-07-09
DOI: https://doi.org/10.28945/5160
Issue No: Vol. 18 (2023)
- The Role of Corporate Social Responsibility in Business Performance: The
Moderation Influence of Blockchain Technology
Authors: Chih-Hung Chen
Pages: 387 - 405
Abstract: Aim/Purpose: The major challenges for firms to initiate corporate social responsibility (CSR) arise from resource constraints, complexity, and uncertainty. Consuming considerable financial and human resources is the main difficulty for smaller firms or those operating in less profitable industries, and the lack of immediate outputs from CSR initiatives poses a challenge for firms in prioritizing and assessing their effectiveness.Background: To better integrate CSR management into overall business strategy and decision-making processes, Blockchain technology (BCT) could potentially offer a feasible and optimal alternative to CSR reports. Methodology: This study uses the fixed effects regression by way of the Least Squares Dummy Variable (LSDV) approach in STATA to analyze the direct effect of CSR management on business performance and the moderating effect of BCT adoption on this relationship with a panel data set of 5810 observations collected from the 874 listed companies in 2015 in Taiwan Stock Exchange through 2021.Contribution: This study contributes to the literature by shedding light on the organizational factors that influence BCT adoption.Findings: The findings show that firms with high levels of CSR management have better business performance. Additionally, the adoption of BCT strengthens the positive relationship between CSR management and business performance, but it cannot replace the fundamental principles of CSR. Finally, firm size does not significantly affect BCT adoption, indicating that companies of all sizes have an equal opportunity to adopt BCT, which can help to level the playing field in terms of resources available to different firms.Recommendations for Practitioners: This study suggests that firms managing CSR practices have better business performance, and the adoption of BCTs further enhances this positive relationship. However, BCT adoption does not have the same positive effect on business performance as CSR practices. Additionally, this research can help to inform public policy related to BCT adoption and diffusion. Recommendation for Researchers: By exploring the factors that influence BCT adoption, future researchers can provide insights into the key challenges and opportunities faced by organizations of different sizes and help to develop strategies for promoting the effective adoption of BCT.Impact on Society: Given the limitations of current CSR reporting, the understanding gained from BCT applications can provide companies with an alternative mechanism to foster progress in CSR implementation. Future Research: Firstly, while the fixed-effects model might have dampened the power of explanation because it only captures within-unit variation and ignores between-unit variation, the explanatory power is further limited due to only integrating two independent variables in this model. Because of limited data availability, this study only utilizes CSR_Report and firm_size as independent variables. Future studies can consider more key factors and may lead to different results. Additionally, panel data is collected from Taiwan and, therefore, may not be representative of the broader population. Future researchers integrating the Stock Exchange of different countries are recommended.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-07-09
DOI: https://doi.org/10.28945/5165
Issue No: Vol. 18 (2023)
- Enhancing Consumer Value Co-Creation Through Social Commerce Features in
China’s Retail Industry
Authors: Li Meiyi, Ree Chan Ho, Muslim Amin, Nelvin XeChung Leow
Pages: 407 - 434
Abstract: Aim/Purpose: Based on the stimulus-organism-response (SOR) model, the current study investigated social commerce functions as an innovative retailing technological support by selecting the three most appropriate features for the Chinese online shopping environment with respective value co-creation intentions.Background: Social commerce is the customers’ online shopping touchpoint in the latest retail era, which serves as a corporate technological tool to extend specific customer services. Although social commerce is a relatively novel platform, limited theoretical attention was provided to determine retailers’ approaches in employing relevant functions to improve consumer experience and value co-creation. Methodology: A questionnaire was distributed to Chinese customers, with 408 valid questionnaires being returned and analyzed through Structural Equation Modeling (SEM).Contribution: The current study investigated the new retail concept and value co-creation from the consumer’s perspective by developing a theoretical model encompassing new retail traits and consumer value, which contributed to an alternative theoretical understanding of value creation, marketing, and consumer behaviour in the new retail business model.Findings: The results demonstrated that value co-creation intention was determined by customer experience, hedonic experience, and trust. Simultaneously, the three factors were significantly influenced by interactivity, personalisation, and sociability features. Specifically, customers’ perceptions of the new retail idea and the consumer co-creation value were examined. Resultantly, this study constructed a model bridging new retail characteristics with consumer value.Recommendations for Practitioners: Nonetheless, past new retail management practice studies mainly focused on superficial happiness in the process of human-computer interaction, which engendered a computer system design solely satisfying consumers’ sensory stimulation and experience while neglecting consumers’ hidden value demands. As such, a shift from the subjective perspective to the realisation perspective is required to express and further understand the actual meaning and depth of consumer happiness.Recommendation for Researchers: New retailers could incorporate social characteristics on social commerce platforms to improve the effectiveness of marketing strategies while increasing user trust to generate higher profitability.Impact on Society: The new retail enterprises should prioritise consumers’ acquisition of happiness meaning and deep experience through self-realisation, cognitive improvement, identity identification, and other aspects of consumer experiences and purchase processes. By accurately revealing and matching consumers’ fundamental perspectives, new retailers could continuously satisfy consumer requirements in optimally obtaining happiness.Future Research: Future comparative studies could be conducted on diverse companies within the same industry for comprehensive findings. Moreover, other underlying factors with significant influences, such as social convenience, group cognitive ability, individual family environment, and other external stimuli were not included in the present study examinations.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-07-20
DOI: https://doi.org/10.28945/5167
Issue No: Vol. 18 (2023)
- Medicine Recommender System Based on Semantic and Multi-Criteria Filtering
Authors: Qusai Shambour, Mahran Al-Zyoud, Ahmad Abu-Shareha, Mosleh Abualhaj
Pages: 435 - 457
Abstract: Aim/Purpose: This study aims to devise a personalized solution for online healthcare platforms that can alleviate problems arising from information overload and data sparsity by providing personalized healthcare services to patients. The primary focus of this paper is to develop an effective medicine recommendation approach for recommending suitable medications to patients based on their specific medical conditions.Background: With a growing number of people becoming more conscious about their health, there has been a notable increase in the use of online healthcare platforms and e-services as a means of diagnosis. As the internet continues to evolve, these platforms and e-services are expected to play an even more significant role in the future of healthcare. For instance, WebMD and similar platforms offer valuable tools and information to help manage patients’ health, such as searching for medicines based on their medical conditions. Nonetheless, patients often find it arduous and time-consuming to sort through all the available medications to find the ones that match their specific medical conditions. To address this problem, personalized recommender systems have emerged as a practical solution for mitigating the burden of information overload and data sparsity-related issues that are frequently encountered on online healthcare platforms. Methodology: The study utilized a dataset of MC ratings obtained from WebMD, a popular healthcare website. Patients on this website can rate medications based on three criteria, including medication effectiveness, ease of use, and satisfaction, using a scale of 1 to 5. The WebMD MC rating dataset used in this study contains a total of 32,054 ratings provided by 2,136 patients for 845 different medicines. The proposed HSMCCF approach consists of two primary modules: a semantic filtering module and a multi-criteria filtering module. The semantic filtering module is designed to address the issues of data sparsity and new item problems by utilizing a medicine taxonomy that sorts medicines according to medical conditions and makes use of semantic relationships between them. This module identifies the medicines that are most likely to be relevant to patients based on their current medical conditions. The multi-criteria filtering module, on the other hand, enhances the approach’s ability to capture the complexity of patient preferences by considering multiple criteria and preferences through a unique similarity metric that incorporates both distance and structural similarities. This module ensures that patients receive more accurate and personalized medication recommendations. Moreover, a medicine reputation score is employed to ensure that the approach remains effective even when dealing with limited ratings or new items. Overall, the combination of these modules makes the proposed approach more robust and effective in providing personalized medicine recommendations for patients.Contribution: This study addresses the medicine recommendation problem by proposing a novel approach called Hybrid Semantic-based Multi-Criteria Collaborative Filtering (HSMCCF). This approach effectively recommends medications for patients based on their medical conditions and is specifically designed to overcome issues related to data sparsity and new item recommendations that are commonly encountered on online healthcare platforms. The proposed approach addresses data sparsity and new item issues by incorporating a semantic filtering module and a multi-criteria filtering module. The semantic filtering module sorts medicines based on medical conditions and uses semantic relationships to identify relevant ones. The multi-criteria filtering module accurately captures patient preferences and provides precise recommendations using a novel similarity metric. Additionally, a medicine reputation score is also employed to further expand potential neighbors, improving predictive accuracy and coverage, particularly in sparse datasets or new items with few ratings. With the HSMCCF approach, patients can receive more personalized recommendations that are tailored to their unique medical needs and conditions. By leveraging a combination of semantic-based and multi-criteria filtering techniques, the proposed approach can effectively address the challenges associated with medicine recommendations on online healthcare platforms.Findings: The proposed HSMCCF approach demonstrated superior effectiveness compared to benchmark recommendation methods in multi-criteria rating datasets in terms of enhancing both prediction accuracy and coverage while effectively addressing data sparsity and new item challenges.Recommendations for Practitioners: By applying the proposed medicine recommendation approach, practitioners can develop a medicine recommendation system that can be integrated into online healthcare platforms. Patients can then utilize this system to make better-informed decisions regarding the medications that are most suitable for their specific medical conditions. This personalized approach to medication recommendations can ultimately lead to improved patient satisfaction.Recommendation for Researchers: Integrating patient medicine reviews is a promising way for researchers to elevate the proposed medicine recommendation approach. By leveraging patient reviews, the approach can gain a more comprehensive understanding of how certain medications perform for specific medical conditions. Additionally, exploring the relationship between MC-based ratings using an improved aggregation function can potentially enhance the accuracy of medication predictions. This involves analyzing the relationship between different criteria, such as medication effectiveness, ease of use, and satisfaction of the patients, and determining the optimal weighting for each criterion based on patient feedback. A more holistic approach that incorporates patient reviews and an improved aggregation funct...
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-07-21
DOI: https://doi.org/10.28945/5172
Issue No: Vol. 18 (2023)
- Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity
Systems in the UAE
Authors: Mohammed Rashed Mohamed Al Humaid Alneyadi, Md Kassim Normalini
Pages: 459 - 486
Abstract: Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE.Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies.Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach.Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology.Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations.Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE.Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic.Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-07-25
DOI: https://doi.org/10.28945/5166
Issue No: Vol. 18 (2023)
- Unraveling the Key Factors of Successful ERP Post Implementation in the
Indonesian Construction Context
Authors: Venera Genia, Wahyu Setiawan Wibowo, Muhammad Rana Tirtayasa, Tito Febrian Nugraha, Imairi Eitiveni, Tifanny Nabarian
Pages: 487 - 519
Abstract: Aim/Purpose: This study aims to evaluate the success of ERP post-implementation and the factors that affect the overall success of the ERP system by integrating the Task Technology Fit (TTF) model into the Information System Success Model (ISSM).Background: Not all ERP implementations provide the expected benefits, as post-implementation challenges can include inflexible ERP systems and ongoing costs. Therefore, it is necessary to evaluate the success after ERP implementation, and this research integrates the Task Technology Fit (TTF) model into the Information System Success Model (ISSM).Methodology: For data analysis and the proposed model, the authors used SmartPLS 3 by applying the PLS-SEM test and one-tailed bootstrapping. The researchers distributed questionnaires online to 115 ERP users at a construction company in Indonesia and successfully got responses from 95 ERP users.Contribution: The results obtained will be helpful and essential for future researchers and Information System practitioners – considering the high failure rate in the use of ERP in a company, as well as the inability of organizations and companies to exploit the benefits and potential that ERP can provide fully. Findings: The results show that Perceived Usefulness, User Satisfaction, and Task-Technology Fit positively affect the Organizational Impact of ERP implementation.Recommendations for Practitioners: The findings can help policymakers and CEOs of businesses in Indonesia’s construction sector create better business strategies and use limited resources more effectively and efficiently to provide a considerably higher probability of ERP deployment. The findings of this study were also beneficial for ERP vendors and consultants. The construction of the industry has specific characteristics that ERP vendors should consider. Construction is a highly fragmented sector, with specialized segments demanding specialist technologies. Several projects also influence it. They can use them to identify and establish several alternative strategies to deal with challenges and obstacles that can arise during the installation of ERP in a firm. Vendors and consultants can supply solutions, architecture, or customization support by the standard operating criteria, implement the ERP system and train critical users. The ERP system vendors and consultants can also collaborate with experts from the construction sector to develop customized alternatives for construction companies. That would be the most outstanding solution for implementing ERP in this industry.Recommendation for Researchers: Future researchers can use this combined model to study ERP post-implementation success on organizational impact with ERP systems in other company information systems fields, especially the construction sector. Future integration of different models can be used to improve the proposed model. Integration with models that assess the level of Information System acceptance, such as Technology Acceptance Model 3 (TAM3) or Unified Theory of Acceptance and Use of Technology 2 (UTAUT2), can be used in future research to deepen the exploration of factors that influence ERP post-implementation success in an organization.Impact on Society: This study can guide companies, particularly in the construction sector, to maintain ERP performance, conduct training for new users, and regularly survey user satisfaction to ensure the ERP system’s reliability, security, and performance are maintained and measurable.Future Research: It is increasing the sample size with a larger population at other loci (private and state-owned) that use ERP to see the factors influencing ERP post-implementation success and using mixed methods to produce a better understanding. With varied modes, it is possible to get better results by adding unique factors to the research, and future integration of other models can be used to improve the proposed model.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-08-04
DOI: https://doi.org/10.28945/5177
Issue No: Vol. 18 (2023)
- The Implications of Knowledge-Based HRM Practices on Open Innovations for
SMEs in the Manufacturing Sector
Authors: Chin Wei Chong, Adedapo O Ojo, Mohammad Muein Rasheed Shahin
Pages: 521 - 545
Abstract: Aim/Purpose: The main aim of this study was to investigate the impact of knowledge-based Human Resources Management (HRM) practices on inbound and outbound open innovation in Jordanian small and medium enterprises (SMEs).Background: SMEs in Jordan lack tangible resources. This insufficiency can be remedied by using knowledge as a resource. According to the Knowledge-Based View (KBV) theory, which posits knowledge as the most valuable resource, SMEs can achieve open innovation by implementing knowledge-based HRM practices that enhance the utilization of knowledge and yield competitiveness.Methodology: This study adopted the quantitative method employing descriptive and exploratory approaches. A total of 500 Jordanian manufacturing SMEs were selected from 2,310 manufacturing SMEs registered lists, according to the Jordan Social Security, by using random sampling. The study’s instrument was a questionnaire that was applied to these SMEs. There were 335 responses that were deemed useful for analysis after filtering out the replies with missing values; this corresponded to a response rate of 67%. The paper utilized structural equation modeling and cross-sectional design to test hypotheses in the proposed research model.Contribution: This study advocates the assumption of the role of KBV in improving innovation practices. This study contributes to the existing strategic HRM research by extending the understanding of knowledge-based HRM practices in the context of SMEs. Thus, this study contributes to the understanding of innovation management by demonstrating the role of knowledge-based HRM practices in boosting inbound and outbound OI practices, thereby enhancing innovation as an essential component of firm competitiveness.Findings: The findings revealed the positive impact of four knowledge-based HRM practices on inbound and outbound open innovation in Jordanian manufacturing SMEs. These practices were knowledge-based recruitment and selection, knowledge-based training and development, knowledge-based compensation and reward, as well as knowledge-based performance assessment.Recommendations for Practitioners: This study is expected to help the stakeholders of SMEs to re-shape the traditional HRM practices into knowledge-based practices which improve managerial skills, innovation practices, and the level of the firm’s competitiveness.Recommendation for Researchers: This study serves as a significant contribution to the research field of innovation practices by building a new association between knowledge-based HRM practices and inbound and outbound open innovation.Impact on Society: The study emphasizes the vital role of knowledge-based HRM practices in enhancing the knowledge and social skills of the human capital in SMEs in Jordan, thus improving the country’s social and economic development.Future Research: Future research could build on this study to include service SMEs. It could also employ a longitudinal study over the long run which would allow for a deeper analysis of the relationships of causality, offering a more comprehensive view of the effect of knowledge-based HRM on open innovation. Furthermore, future research could examine the sample of investigation before and after implementing the knowledge-based HRM practices to provide stronger evidence of their influence on inbound and outbound innovation.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-08-04
DOI: https://doi.org/10.28945/5162
Issue No: Vol. 18 (2023)
- Unveiling Roadblocks and Mapping Solutions for Blockchain Adoption by
Governments: A Systematic Literature Review
Authors: Wahyu Setiawan Wibowo, Setiadi Yazid
Pages: 547 - 581
Abstract: Aim/Purpose: Blockchain technology (BCT) has emerged as a potential catalyst for transforming government institutions and services, yet the adoption of blockchain in governments faces various challenges, for which previous studies have yet to provide practical solutions. Background: This study aims to identify and analyse barriers, potential solutions, and their relations in implementing BC for governments through a systematic literature review (SLR). The authors grouped the challenges based on the Technology-Organisation-Environment (TOE) framework while exercising a thematic grouping for the solutions, followed by a comprehensive mapping to unveil the relationship between challenges and solutions.Methodology: This study employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 methodology, combined with the tollgate method, to improve the quality of selected articles. The authors further administer a three-level approach (open coding, axial coding, and selective coding) to analyse the challenges and solutions from the articles. Contribution: The authors argue that this study enriches the existing literature on BC adoption, particularly in the government context, by providing a comprehensive framework to analyse and address the unique challenges and solutions, thus contributing to the development of new theories and models for future research in BC adoption in government settings and fostering deeper exploration in the field.Findings: The authors have unveiled 40 adoption challenges categorised using the TOE framework. The most prevalent technological challenges include security concerns and integration & interoperability, while cultural resistance, lack of support and involvement, and employees’ capability hinder adoption at the organisational level. Notably, the environmental dimension lacks legal and standard frameworks. The study further unveils 28 potential solutions, encompassing legal frameworks, security and privacy measures, collaboration and governance, technological readiness and infrastructure, and strategic planning and adoption. The authors of the study have further mapped the solutions to the identified challenges, revealing that the establishment of legal frameworks stands out as the most comprehensive solution.Recommendations for Practitioners: Our findings provide a big picture regarding BC adoption for governments around the globe. This study charts the problems commonly encountered by government agencies and presents proven solutions in their wake. The authors endeavour practitioners, particularly those in governments, to embrace our findings as the cornerstone of BC/BCT adoption. These insights can aid practitioners in identifying existing or potential obstacles in adopting BC, pinpointing success factors, and formulating strategies tailored to their organisations.Recommendation for Researchers: Researchers could extend this study by making an in-depth analysis of challenges or solutions in specific types of countries, such as developed and developing countries, as the authors believe this approach would yield more insights. Researchers could also test, validate, and verify the mapping in this study to improve the quality of the study further and thus can be a great aid for governments to adopt BC/BCT fully.Impact on Society: This study provides a comprehensive exploration of BC adoption in the government context, offering detailed explanations and valuable insights that hold significant value for government policymakers and decision-makers, serving as a bedrock for successful implementation by addressing roadblocks and emphasising the importance of establishing a supportive culture and structure, engaging stakeholders, and addressing security and privacy concerns, ultimately enhancing the efficiency and effectiveness of BC adoption in government institutions and services.Future Research: Future research should address the limitations identified in this study by expanding the scope of the literature search to include previously inaccessible sources and exploring alternative frameworks to capture dynamic changes and contextual factors in BC adoption. Additionally, rigorous scrutiny, review, and testing are essential to establish the practical and theoretical validity of the identified solutions, while in-depth analyses of country-specific and regional challenges will provide valuable insights into the unique considerations faced by different governments.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-09-04
DOI: https://doi.org/10.28945/5186
Issue No: Vol. 18 (2023)
- How Information Security Management Systems Influence the Healthcare
Professionals’ Security Behavior in a Public Hospital in Indonesia
Authors: Puspita Kencana Sari, Putu Wuri Handayani, Achmad Nizar Hidayanto, Pribadi Wiranda Busro
Pages: 583 - 607
Abstract: Aim/Purpose: This study analyzes health professionals’ information security behavior (ISB) as health information system (HIS) users concerning associated information security controls and risks established in a public hospital. This work measures ISB using a complete measuring scale and explains the relevant influential factors from the perspectives of Protection Motivation Theory (PMT) and General Deterrence Theory (GDT)Background: Internal users are the primary source of security concerns in hospitals, with malware and social engineering becoming common attack vectors in the health industry. This study focuses on HIS user behavior in developing countries with limited information security policies and resources. Methodology: The research was carried out in three stages. First, a semi-structured interview was conducted with three hospital administrators in charge of HIS implementation to investigate information security controls and threats. Second, a survey of 144 HIS users to determine ISB based on hospital security risk. Third, a semi-structured interview was conducted with 11 HIS users to discuss the elements influencing behavior and current information security implementation.Contribution: This study contributes to ISB practices in hospitals. It discusses how HIS managers could build information security programs to enhance health professionals’ behavior by considering PMT and GDT elements.Findings: According to the findings of this study, the hospital has implemented particular information security management system (ISMS) controls based on international standards, but there is still room for improvement. Insiders are the most prevalent information security dangers discovered, with certain working practices requiring HIS users to disclose passwords with others. The top three most common ISBs HIS users practice include appropriately disposing of printouts, validating link sources, and using a password to unlock the device. Meanwhile, the top three least commonly seen ISBs include transferring sensitive information online, leaving a password in an unsupervised area, and revealing sensitive information via social media.Recommendations for Practitioners: Hospital managers should create work practices that align with information security requirements. HIS managers should provide incentives to improve workers’ perceptions of the benefit of robust information security measures.Recommendation for Researchers: This study suggests more research into the components that influence ISB utilizing diverse theoretical foundations such as Regulatory Focus Theory to compare preventive and promotion motivation to enhance ISB.Impact on Society: This study can potentially improve information security in the healthcare industry, which has substantial risks to human life but still lags behind other vital sector implementations.Future Research: Future research could look into the best content and format for an information security education and training program to promote the behaviors of healthcare professionals that need to be improved based on this ISB measurement and other influential factors.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-09-07
DOI: https://doi.org/10.28945/5185
Issue No: Vol. 18 (2023)
- Antecedents of Business Analytics Adoption and Impacts on Banks’
Authors: Ahmad Samed Al-Adwan, Omar Mohammed Horani, Anas RATIB ALSoud, Jacquline Tham, Ali Khatibi, S. M. Ferdous Azam
Pages: 609 - 643
Abstract: Aim/Purpose: This study utilized a comprehensive framework to investigate the adoption of Business Analytics (BA) and its effects on performance in commercial banks in Jordan. The framework integrated the Technological-Organizational-Environmental (TOE) model, the Diffusion of Innovation (
DOI ) theory, and the Resource-Based View (RBV). Background: The recent trend of utilizing data for business operations and decision-making has positively impacted organizations. Business analytics (BA) is a leading technique that generates valuable insights from data. It has gained considerable attention from scholars and practitioners across various industries. However, guidance is lacking for organizations to implement BA effectively specific to their business contexts. This research aims to evaluate factors influencing BA adoption by Jordanian commercial banks and examine how its implementation impacts bank performance. The goal is to provide needed empirical evidence surrounding BA adoption and outcomes in the Jordanian banking sector.Methodology: The study gathered empirical data by conducting an online questionnaire survey with senior and middle managers from 13 commercial banks in Jordan. The participants were purposefully selected, and the questionnaire was designed based on relevant and well-established literature. A total of 307 valid questionnaires were collected and considered for data analysis.Contribution: This study makes a dual contribution to the BA domain. Firstly, it introduces a research model that comprehensively examines the factors that influence the adoption of BA. The proposed model integrates the TOE framework,
DOI theory, and RBV theory. Combining these frameworks allows for a comprehensive examination of BA adoption in the banking industry. By analyzing the technological, organizational, and environmental factors through the TOE framework, understanding the diffusion process through the
DOI theory, and assessing the role of resources and capabilities through the RBV theory, researchers and practitioners can better understand the complex dynamics involved. This integrated approach enables a more nuanced assessment of the factors that shape BA adoption and its subsequent impact on business performance within the banking industry. Secondly, it uncovers the effects of BA adoption on business performance. These noteworthy findings stem from a rigorous analysis of primary data collected from commercial banks in Jordan. By presenting a holistic model and delving into the implications for business performance, this research offers valuable insights to researchers and practitioners alike in the field of BA.Findings: The findings revealed that various technological (data quality, complexity, compatibility, relative advantage), organizational (top management support, organizational readiness), and environmental (external support) factors are crucial in shaping the decision to adopt BA. Furthermore, the study findings demonstrated a positive relationship between BA adoption and performance outcomes in Jordanian commercial banks.Recommendations for Practitioners: The findings suggest that Jordanian commercial banks should enforce data quality practices, provide clear standards, invest in data quality tools and technologies, and conduct regular data audits. Top management support is crucial for fostering a data-driven decision-making culture. Organizational readiness involves having the necessary resources and skilled personnel, as well as promoting continuous learning and improvement. Highlighting the benefits of BA helps overcome resistance to technological innovation and encourages adoption by demonstrating improved decision-making processes and operational efficiency. Furthermore, external support is crucial for banks to adopt Business Analytics (BA). Banks should partner with experienced vendors to gain expertise and incorporate best practices. Vendors also provide training and technical support to overcome technological barriers. Compatibility is essential for optimal performance, requiring managers to modify workflows and IT infrastructure. Complexity, including data, organizational, and technical complexities, is a major obstacle to BA adoption. Banks should take a holistic approach, focusing on people, processes, and technology, and prioritize data quality and governance. Building a skilled team, fostering a data-driven culture, and investing in technology and infrastructure are essential.Recommendation for Researchers: The integration of the TOE framework, the
DOI theory, and the RBV theory can prove to be a powerful approach for comprehensively analyzing the various factors that influence BA adoption within the dynamic banking industry. Furthermore, this combined framework enables us to gain deeper insights into the subsequent impact of BA adoption on overall business performance.Impact on Society: Examining the factors influencing BA adoption in the banking industry and its subsequent impact on business performance can have wide-ranging societal implications. It can promote data-driven decision-making, enhance customer experiences, strengthen fraud detection, foster financial inclusion, contribute to economic growth, and trigger discussions on ethical considerations.Future Research: To further advance future research, there are several avenues to consider. One option is to broaden the scope by including a larger sample size, allowing for a more comprehensive analysis. Another possibility is to investigate the impact of BA adoption on various performance indicators beyond the ones already examined. Additionally, incorporating qualitative research methods would provide a more holistic understanding of the organizational dynamics and challenges associated with the adoption of BA in Jordanian commercial banks.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-09-18
Issue No: Vol. 18 (2023)
- Content-Rating Consistency of Online Product Review and Its Impact on
Helpfulness: A Fine-Grained Level Sentiment Analysis
Authors: Mohammad Alsharo, saif Addeen AlRababah, Mohammed-Issa Riad Jaradat, Anas Husain
Pages: 645 - 666
Abstract: Aim/Purpose: The objective of this research is to investigate the effect of review consistency between textual content and rating on review helpfulness. A measure of review consistency is introduced to determine the degree to which the review sentiment of textual content conforms with the review rating score. A theoretical model grounded in signaling theory is adopted to explore how different variables (review sentiment, review rating, review length, and review rating variance) affect review consistency and the relationship between review consistency and review helpfulness.Background: Online reviews vary in their characteristics and hence their different quality features and degrees of helpfulness. High-quality online reviews offer consumers the ability to make informed purchase decisions and improve trust in e-commerce websites. The helpfulness of online reviews continues to be a focal research issue regardless of the independent or joint effects of different factors. This research posits that the consistency between review content and review rating is an important quality indicator affecting the helpfulness of online reviews. The review consistency of online reviews is another important requirement for maintaining the significance and perceived value of online reviews. Incidentally, this parameter is inadequately discussed in the literature. A possible reason is that review consistency is not a review feature that can be readily monitored on e-commerce websites.Methodology: More than 100,000 product reviews were collected from Amazon.com and preprocessed using natural language processing tools. Then, the quality reviews were identified, and relevant features were extracted for model training. Machine learning and sentiment analysis techniques were implemented, and each review was assigned a consistency score between 0 (not consistent) and 1 (fully consistent). Finally, signaling theory was employed, and the derived data were analyzed to determine the effect of review consistency on review helpfulness, the effect of several factors on review consistency, and their relationship with review helpfulness.Contribution: This research contributes to the literature by introducing a mathematical measure to determine the consistency between the textual content of online reviews and their associated ratings. Furthermore, a theoretical model grounded in signaling theory was developed to investigate the effect on review helpfulness. This work can considerably extend the body of knowledge on the helpfulness of online reviews, with notable implications for research and practice.Findings: Empirical results have shown that review consistency significantly affects the perceived helpfulness of online reviews. The study similarly finds that review rating is an important factor affecting review consistency; it also confirms a moderating effect of review sentiment, review rating, review length, and review rating variance on the relationship between review consistency and review helpfulness. Overall, the findings reveal the following: (1) online reviews with textual content that correctly explains the associated rating tend to be more helpful; (2) reviews with extreme ratings are more likely to be consistent with their textual content; and (3) comparatively, review consistency more strongly affects the helpfulness of reviews with short textual content, positive polarity textual content, and lower rating scores and variance.Recommendations for Practitioners: E-commerce systems should incorporate a review consistency measure to rank consumer reviews and provide customers with quick and accurate access to the most helpful reviews.Impact on Society: Incorporating a score of review consistency for online reviews can help consumers access the best reviews and make better purchase decisions, and e-commerce systems improve their business, ultimately leading to more effective e-commerce.Future Research: Additional research should be conducted to test the impact of review consistency on helpfulness in different datasets, product types, and different moderating variables.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-09-22
DOI: https://doi.org/10.28945/5187
Issue No: Vol. 18 (2023)
- The Segmentation of Mobile Application Users in The Hotel Booking Journey
Authors: Niko Ibrahim, Putu Wuri Handayani, Betty Purwandari, Imairi Eitiveni, Fadhil Dzulfikar
Pages: 667 - 689
Abstract: Aim/Purpose: This study aims to create customer segmentation who use Online Travel Agent (OTA) mobile applications in Indonesia throughout their hotel booking journey.Background: In the context of mobile hotel booking applications, research analyzing the customer experience at each customer journey stage is scarce. However, literature increasingly acknowledges the significance of this stage in comprehending customer behavior and revenue streams.Methodology: This study employs a mixed-method and exploratory approach by doing in-depth interviews with 20 participants and questionnaires from 207 participants. Interview data are analyzed using thematic analysis, while the questionnaires are analyzed using descriptive statistics.Contribution: This study enriches knowledge in understanding customer behavior that considers the usage of mobile apps as a segmentation criterion in the hotel booking journey.Findings: We developed four user personas (no sweat player, spotless seeker, social squad, and bargain hunter) that show customer segmentation based on the purpose, motivation, and actions in each journey stage (inspiration, consideration, reservation, and experience).Recommendations for Practitioners: The resulting customer segmentation enables hospitality firms to improve their current services by adapting to the needs of various segments and avoiding unanticipated customer pain points, such as incomplete information, price changes, no social proof, and limited payment options.Recommendation for Researchers: The quality and robustness of the customer segment produced in this study can be further tested based on the criteria of homogeneity, size, potential benefits, segment stability, segment accessibility, segment compatibility, and segment actionability.Impact on Society: This study has enriched the existing literature by establishing a correlation between user characteristics and how they use smartphones for tourism planning, focusing on hotel booking in mobile applications.Future Research: For future research, each customer segment’s demographic and behavioral factors can be explored further.
Citation: IJIKM, Volume 18 (2023)
PubDate: 2023-09-26
DOI: https://doi.org/10.28945/5190
Issue No: Vol. 18 (2023)
- An Examination of Home Internet and Mobile Device Use in the U.S.
An Examination of Home Internet and Mobile Device Use in the U.S.
Authors: James N. Morgan, Sury Ravindran
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/1935
Issue No: Vol. 9
- Mise en Scène: A Film Scholarship Augmented Reality Mobile
ApplicationMise en Scène: A Film Scholarship Augmented Reality Mobile Application
Authors: Joseph T. Chao, Tanxin Du, Christopher Wagenheim, Theodore Rippey
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/1936
Issue No: Vol. 9
- The Survey of Information Systems in Public Administration in Poland
The Survey of Information Systems in Public Administration in Poland
Authors: Ewa Ziemba, Iwona Obłąk
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/1939
Issue No: Vol. 9
- The Generalized Requirement Approach for Requirement Validation with
Automatically Generated Program CodeThe Generalized Requirement Approach for Requirement Validation with Automatically Generated Program Code
Authors: Aleksandar Bulajic, Radoslav Stojic, Samuel Sambasivam
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/1946
Issue No: Vol. 9
- A Comparison of International Information Security Regulations
A Comparison of International Information Security Regulations
Authors: Joseph Johnson, Susan J. Lincke, Ralf Imhof, Charles Lim
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/1963
Issue No: Vol. 9
- The Impact of Business Intelligence on Healthcare Delivery in the USA
The Impact of Business Intelligence on Healthcare Delivery in the USA
Authors: Noushin Ashrafi, Lori Kelleher, Jean-Pierre Kuilboer
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/1993
Issue No: Vol. 9
- Interaction and Innovation - Reframing Innovation Activities for a Matrix
OrganizationInteraction and Innovation - Reframing Innovation Activities for a Matrix Organization
Authors: Martti Mäkimattila, Minna Saunila, Juho Salminen
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/2023
Issue No: Vol. 9
- Social Capital and Knowledge Transfer in New Service Development: The
Front/Back Office PerspectiveSocial Capital and Knowledge Transfer in New Service Development: The Front/Back Office Perspective
Authors: Jing-Hua Li, Qui-Bo Huang, Li Lin
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/2073
Issue No: Vol. 9
- A Knowledge Integration Methodology for Developing Customized Maintenance
DocumentsA Knowledge Integration Methodology for Developing Customized Maintenance Documents
Authors: Ying Huang, Xingjun Wang, Mickaël Gardoni, Coulibaly Amadou
IJIKM, Volume 9 (2014). Details
IJIKM, Volume 9 (2014)
DOI: https://doi.org/10.28945/2080
Issue No: Vol. 9
- Critical Success Factors for ERP Systems Implementation in Public
AdministrationCritical Success Factors for ERP Systems Implementation in Public Administration
Authors: Ewa Ziemba, Iwona Obłąk
IJIKM, Volume 8 (2013). Details
IJIKM, Volume 8 (2013)
DOI: https://doi.org/10.28945/1785
Issue No: Vol. 8
- Boosting Creativity with Transformational Leadership in Fuzzy Front-end
Innovation ProcessesBoosting Creativity with Transformational Leadership in Fuzzy Front-end Innovation Processes
Authors: Mirva Hyypiä, Satu Parjanen
IJIKM, Volume 8 (2013). Details
IJIKM, Volume 8 (2013)
DOI: https://doi.org/10.28945/1786
Issue No: Vol. 8
- The Influence of User Efficacy and Expectation on Actual System Use
The Influence of User Efficacy and Expectation on Actual System Use
Authors: Olusola I. Akinbobola, Akinniyi A. Adeleke
IJIKM, Volume 8 (2013). Details
IJIKM, Volume 8 (2013)
DOI: https://doi.org/10.28945/1892
Issue No: Vol. 8
- Evaluating and Developing Innovation Capabilities with a Structured Method
Evaluating and Developing Innovation Capabilities with a Structured Method
Authors: Anna-Maija Nisula, Aino Kianto
IJIKM, Volume 8 (2013). Details
IJIKM, Volume 8 (2013)
DOI: https://doi.org/10.28945/1902
Issue No: Vol. 8
- The Effects of Knowledge Sharing and Absorption on Organizational
Innovation Performance – A Dynamic Capabilities PerspectiveThe Effects of Knowledge Sharing and Absorption on Organizational Innovation Performance – A Dynamic Capabilities Perspective
Authors: Fan-Yun Pai, Hung-Fan Chang
IJIKM, Volume 8 (2013). Details
IJIKM, Volume 8 (2013)
DOI: https://doi.org/10.28945/1904
Issue No: Vol. 8
- Environmental Knowledge Management of Finnish Food and Drink Companies in
Eco-Efficiency and Waste ManagementEnvironmental Knowledge Management of Finnish Food and Drink Companies in Eco-Efficiency and Waste Management
Authors: Momir Beljić, Virgilio Panapanaan, Lassi Linnanen, Tuomo Uotila
IJIKM, Volume 8 (2013). Details
IJIKM, Volume 8 (2013)
DOI: https://doi.org/10.28945/1924
Issue No: Vol. 8
- Determinants of Intent to Continue Using Online Learning: A Tale of Two
UniversitiesDeterminants of Intent to Continue Using Online Learning: A Tale of Two Universities
Authors: Tantatape Brahmasrene, Jung-Wan Lee
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1548
Issue No: Vol. 7
- Locating the Weak Points of Innovation Capability before Launching a
Development ProjectLocating the Weak Points of Innovation Capability before Launching a Development Project
Authors: Anne Kallio, Paula Kujansivu, Satu Parjanen
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1563
Issue No: Vol. 7
- Social Networking, Teaching, and Learning: Introduction to Special Section
on Social Networking, Teaching, and Learning (SNTL)Social Networking, Teaching, and Learning: Introduction to Special Section on Social Networking, Teaching, and Learning (SNTL)
Authors: Jelena Jovanovic, Raymond Chiong, Thomas Weise
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1576
Issue No: Vol. 7
- (SNTL #1) Costs and Benefits of Facebook for Undergraduate Students
(SNTL #1) Costs and Benefits of Facebook for Undergraduate Students
Authors: Ruti Gafni , Moran Deri
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1577
Issue No: Vol. 7
- (SNTL #2) Social Networking in Undergraduate Education
(SNTL #2) Social Networking in Undergraduate Education
Authors: Nicole A. Buzzetto-More
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1578
Issue No: Vol. 7
- (SNTL #3) Design and Implementation Challenges to an Interactive Social
Media Based Learning Environment(SNTL #3) Design and Implementation Challenges to an Interactive Social Media Based Learning Environment
Authors: Glen Hordemann, Joseph T. Chao
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1579
Issue No: Vol. 7
- Experiencing Creativity in the Organization: From Individual Creativity to
Collective CreativityExperiencing Creativity in the Organization: From Individual Creativity to Collective Creativity
Authors: Satu Parjanen
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1580
Issue No: Vol. 7
- Critical Success Factors for Implementing Business Intelligence Systems in
Small and Medium Enterprises on the Example of Upper Silesia, PolandCritical Success Factors for Implementing Business Intelligence Systems in Small and Medium Enterprises on the Example of Upper Silesia, Poland
Authors: Celina M. Olszak, Ewa Ziemba
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1584
Issue No: Vol. 7
- Text-Based Collaborative Work and Innovation: Effects of Communication
Media Affordances on Divergent and Convergent Thinking in Group-Based
Problem-SolvingText-Based Collaborative Work and Innovation: Effects of Communication Media Affordances on Divergent and Convergent Thinking in Group-Based Problem-Solving
Authors: Leif Jarle Gressgård
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1713
Issue No: Vol. 7
- Barriers to the Effective Deployment of Information Assets: An Executive
Management PerspectiveBarriers to the Effective Deployment of Information Assets: An Executive Management Perspective
Authors: Nina Evans, James Price
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1721
Issue No: Vol. 7
- Introduction to the Special Section on Game-based Learning: Design and
Applications (GbL)Introduction to the Special Section on Game-based Learning: Design and Applications (GbL)
Authors: Jelena Jovanovic, Raymond Chiong
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1747
Issue No: Vol. 7
- (GbL #1) Life Skills Developed by Those Who Have Played in Video Game
Tournaments(GbL #1) Life Skills Developed by Those Who Have Played in Video Game Tournaments
Authors: M. O. Thirunarayanan, Manuel Vilchez
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1748
Issue No: Vol. 7
- (GbL #2) Constructive Simulation as a Collaborative Learning Tool in
Education and Training of Crisis Staff(GbL #2) Constructive Simulation as a Collaborative Learning Tool in Education and Training of Crisis Staff
Authors: Goran Šimić
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1749
Issue No: Vol. 7
- (GbL #3) Innovative Teaching Using Simulation and Virtual Environments
(GbL #3) Innovative Teaching Using Simulation and Virtual Environments
Authors: Joseph Barjis, Ashish Gupta, Ramesh Sharda, Tatiana Bouzdine-Chameeva, Peggy D. Lee, Alexander Verbraeck
IJIKM, Volume 7 (2012). Details
IJIKM, Volume 7 (2012)
DOI: https://doi.org/10.28945/1750
Issue No: Vol. 7
- Printable Table of Contents: IJIKM, Volume 6, 2011
Printable Table of Contents: IJIKM, Volume 6, 2011
Authors:
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1338
Issue No: Vol. 6
- Socio-Technical Knowledge Management and Epistemological Paradigms:
Theoretical Connections at the Individual and Organisational LevelSocio-Technical Knowledge Management and Epistemological Paradigms: Theoretical Connections at the Individual and Organisational Level
Authors: Matthew Jelavic
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1337
Issue No: Vol. 6
- Relationship between Knowledge Management Process and Creativity among
Faculty Members in the UniversityRelationship between Knowledge Management Process and Creativity among Faculty Members in the University
Authors: Hamid Rahimi, Azizollah ArbabiSarjou , Sayeed Mohsen Allammeh , Razieh Aghababaei
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1360
Issue No: Vol. 6
- Knowledge Management Systems Development: Theory and Practice
Knowledge Management Systems Development: Theory and Practice
Authors: Raafat George Saadé, Fassil Nebebe, Tak Mak
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1361
Issue No: Vol. 6
- Relational Algebra Programming With Microsoft Access Databases
Relational Algebra Programming With Microsoft Access Databases
Authors: Kirby McMaster, Samuel Sambasivam, Nicole Anderson
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1365
Issue No: Vol. 6
- Empowering PowerPoint: Slides and Teaching Effectiveness
Empowering PowerPoint: Slides and Teaching Effectiveness
Authors: Sabra E. Brock, Yogini Joglekar
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1366
Issue No: Vol. 6
- Using eTechnologies for Active Learning
Using eTechnologies for Active Learning
Authors: Jo Coldwell, Annemieke Craig, Annegret Goold
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1367
Issue No: Vol. 6
- Second Time Lucky' A Tale of Two Systems
Second Time Lucky? A Tale of Two Systems
Authors: Hans Lehmann
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1370
Issue No: Vol. 6
- Pair Modeling with DynaLearn – Students’ Attitudes and Actual
EffectsPair Modeling with DynaLearn – Students’ Attitudes and Actual Effects
Authors: Rachel Or-Bach, Bert Bredeweg
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1371
Issue No: Vol. 6
- Web Usage Association Rule Mining System
Web Usage Association Rule Mining System
Authors: Maja Dimitrijevic, Zita Bošnjak
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1372
Issue No: Vol. 6
- A Guide for Novice Researchers on Experimental and Quasi-Experimental
Studies in Information Systems ResearchA Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research
Authors: Yair Levy, Timothy J. Ellis
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1373
Issue No: Vol. 6
- Assessment of Risk of Misinforming: Dynamic Measures
Assessment of Risk of Misinforming: Dynamic Measures
Authors: Dimitar Christozov, Stefanka Chukova, Plamen Mateev
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1374
Issue No: Vol. 6
- Back to Basics of Informing: The INIS Principle
Back to Basics of Informing: The INIS Principle
Authors: Bob Travica
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1375
Issue No: Vol. 6
- The Use of ICT for Economic Development in the Silesian Region in Poland
The Use of ICT for Economic Development in the Silesian Region in Poland
Authors: Celina M. Olszak, Ewa Ziemba
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1392
Issue No: Vol. 6
- Analysis of Explanatory and Predictive Architectures and the Relevance in
Explaining the Adoption of IT in SMEsAnalysis of Explanatory and Predictive Architectures and the Relevance in Explaining the Adoption of IT in SMEs
Authors: Ojiabo Ukoha, Hart Awa, Christen A. Nwuche, Ikechukwu Asiegbu
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1431
Issue No: Vol. 6
- Examining a Flow-Usage Model to Understand MultiMedia-Based Learning
Examining a Flow-Usage Model to Understand MultiMedia-Based Learning
Authors: Raafat George Saadé, Serge Elgaly, Fassil Nebebe
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1495
Issue No: Vol. 6
- A Return on Investment as a Metric for Evaluating Information Systems:
Taxonomy and ApplicationA Return on Investment as a Metric for Evaluating Information Systems: Taxonomy and Application
Authors: Alexei Botchkarev, Peter Andru
IJIKM, Volume 6 (2011). Details
IJIKM, Volume 6 (2011)
DOI: https://doi.org/10.28945/1535
Issue No: Vol. 6
- Printable Table of Contents: IJIKM, Volume 5, 2010
Printable Table of Contents: IJIKM, Volume 5, 2010
Authors:
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/712
Issue No: Vol. 5
- Collective Creativity and Brokerage Functions in Heavily Cross-Disciplined
Innovation ProcessesCollective Creativity and Brokerage Functions in Heavily Cross-Disciplined Innovation Processes
Authors: Satu Parjanen, Vesa Harmaakorpi, Tapani Frantsi
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/713
Issue No: Vol. 5
- The Reference List Formatter: An Object-Oriented Development Project
The Reference List Formatter: An Object-Oriented Development Project
Authors: Kevin R. Parker
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1108
Issue No: Vol. 5
- Using Research Techniques to Teach Management of IT Concepts to
Postgraduate Business StudentsUsing Research Techniques to Teach Management of IT Concepts to Postgraduate Business Students
Authors: Stephen Burgess, G. Michael McGrath
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1120
Issue No: Vol. 5
- Assessment of Quality of Warranty Policy
Assessment of Quality of Warranty Policy
Authors: Dimitar Christozov, Stefanka Chukova, Plamen Mateev
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1121
Issue No: Vol. 5
- The Effect of Static Visual Instruction on Students’ Online
Learning: A Pilot StudyThe Effect of Static Visual Instruction on Students’ Online Learning: A Pilot Study
Authors: Pao-Nan Chou, Hsi-Chi Hsiao
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1124
Issue No: Vol. 5
- Secure Software Engineering: A New Teaching Perspective Based on the
SWEBOKSecure Software Engineering: A New Teaching Perspective Based on the SWEBOK
Authors: Manar Abu Talib, Adel Khelifi, Leon Jololian
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1125
Issue No: Vol. 5
- Simulation Modeling of an Iron Ore Operation to Enable Informed Planning
Simulation Modeling of an Iron Ore Operation to Enable Informed Planning
Authors: J. E. Everett
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1126
Issue No: Vol. 5
- Time Management: Procrastination Tendency in Individual and Collaborative
TasksTime Management: Procrastination Tendency in Individual and Collaborative Tasks
Authors: Ruti Gafni , Nitza Geri
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1127
Issue No: Vol. 5
- Generativity: The New Frontier for Information and Communication
Technology LiteracyGenerativity: The New Frontier for Information and Communication Technology Literacy
Authors: Jorge Pérez, Meg Coffin Murray
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1134
Issue No: Vol. 5
- Clickers in the Laboratory: Student Thoughts and Views
Clickers in the Laboratory: Student Thoughts and Views
Authors: Kevin Johnson, Catherine Lillis
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1133
Issue No: Vol. 5
- Transaction Flow in Card Payment Systems Using Mobile Agents
Transaction Flow in Card Payment Systems Using Mobile Agents
Authors: Olufunke R. Vincent, Olusegun Folorunso, Adio Taofiki Akinwale, Adebayo D. Akinde
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1153
Issue No: Vol. 5
- Factors Determining the Balance between Online and Face-to-Face Teaching:
An Analysis using Actor-Network TheoryFactors Determining the Balance between Online and Face-to-Face Teaching: An Analysis using Actor-Network Theory
Authors: Lily Wong, Arthur Tatnall
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1152
Issue No: Vol. 5
- An Initiative to Address the Gender Imbalance in Tertiary IT Studies
An Initiative to Address the Gender Imbalance in Tertiary IT Studies
Authors: Annemieke Craig, Jo Coldwell
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1154
Issue No: Vol. 5
- Discovering Interesting Association Rules in the Web Log Usage Data
Discovering Interesting Association Rules in the Web Log Usage Data
Authors: Maja Dimitrijevi?, Zita Bošnjak
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1159
Issue No: Vol. 5
- Can We Help Information Systems Students Improve Their Ethical Decision
Making'Can We Help Information Systems Students Improve Their Ethical Decision Making?
Authors: Theda Thomas, Mary Ahyick
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1160
Issue No: Vol. 5
- Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc
Business Information Technology (BIT) at the University of East London
(UEL)Adaptive Innovation and a MOODLE-based VLE to Support a Fully Online MSc Business Information Technology (BIT) at the University of East London (UEL)
Authors: Anastasis Petrou
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1161
Issue No: Vol. 5
- Interest in ICT Studies and Careers: Perspectives of Secondary School
Female Students from Low Socioeconomic BackgroundsInterest in ICT Studies and Careers: Perspectives of Secondary School Female Students from Low Socioeconomic Backgrounds
Authors: Iwona Miliszewska , Ewa Sztendur
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1162
Issue No: Vol. 5
- Designing a Self-Assessment Item Repository: An Authentic Project in
Higher EducationDesigning a Self-Assessment Item Repository: An Authentic Project in Higher Education
Authors: Dorothy Langley, Miki Ronen
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1169
Issue No: Vol. 5
- Development and Testing of a Graphical FORTRAN Learning Tool for Novice
ProgrammersDevelopment and Testing of a Graphical FORTRAN Learning Tool for Novice Programmers
Authors: Anuoluwapo Ajayi, Emmanuel A. Olajubu, D. F. Ninan, S. A. Akinboro, H. Abimbola Soriyan
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1176
Issue No: Vol. 5
- Egocentric Database Operations for Social and Economic Network Analysis
Egocentric Database Operations for Social and Economic Network Analysis
Authors: Adio Taofiki Akinwale, Adekoya Felix Adebayo, S. Adebukola Onashoga
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1177
Issue No: Vol. 5
- Understanding ICT Based Advantages: A Techno Savvy Case Study
Understanding ICT Based Advantages: A Techno Savvy Case Study
Authors: Karyn Rastrick, James Corner
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1187
Issue No: Vol. 5
- The Relationship among Organizational Knowledge Sharing Practices,
Employees' Learning Commitments, Employees' Adaptability, and Employees'
Job Satisfaction: An Empirical InvestigationThe Relationship among Organizational Knowledge Sharing Practices, Employees' Learning Commitments, Employees' Adaptability, and Employees' Job Satisfaction: An Empirical Investigation
Authors: Soud Almahamid, Arthur C. McAdams, Taher Kalaldeh
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1225
Issue No: Vol. 5
- Information Quality and Absorptive Capacity in Service and Product
Innovation ProcessesInformation Quality and Absorptive Capacity in Service and Product Innovation Processes
Authors: Helinä Melkas, Tuomo Uotila, Anne Kallio
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1293
Issue No: Vol. 5
- Pedagogy for Mobile ICT Learning Using Video-Conferencing Technology
Pedagogy for Mobile ICT Learning Using Video-Conferencing Technology
Authors: Dragana Martinovic, Timothy Pugh, Jelena Magliaro
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1307
Issue No: Vol. 5
- User Acceptance of the E-Government Services in Malaysia: Structural
Equation Modelling ApproachUser Acceptance of the E-Government Services in Malaysia: Structural Equation Modelling Approach
Authors: Norazah Mohd Suki, T Ramayah
IJIKM, Volume 5 (2010). Details
IJIKM, Volume 5 (2010)
DOI: https://doi.org/10.28945/1308
Issue No: Vol. 5
- Printable Table of Contents: IJIKM, Volume 4, 2009
Printable Table of Contents: IJIKM, Volume 4, 2009
Authors:
IJIKM, Volume 4 (2009). Details
IJIKM, Volume 4 (2009)
DOI: https://doi.org/10.28945/638
Issue No: Vol. 4
- Discovering a Decision Maker’s Mental Model with Instance-Based
Cognitive Mining:Discovering a Decision Maker’s Mental Model with Instance-Based Cognitive Mining:
Authors: David M. Steiger, Natalie M. Steiger
IJIKM, Volume 4 (2009). Details
IJIKM, Volume 4 (2009)
DOI: https://doi.org/10.28945/61
Issue No: Vol. 4
- Decision Making for Predictive Maintenance in Asset Information Management
Decision Making for Predictive Maintenance in Asset Information Management
Authors: R. B. Faiz, Eran A. Edirisinghe
IJIKM, Volume 4 (2009). Details
IJIKM, Volume 4 (2009)
DOI: https://doi.org/10.28945/696
Issue No: Vol. 4
- Ontology-based Collaborative Inter-organizational Knowledge Management
NetworkOntology-based Collaborative Inter-organizational Knowledge Management Network
Authors: Nelson K. Y. Leung, Seung Hwan Kang, Sim Kim Lau, Joshua Fan
IJIKM, Volume 4 (2009). Details
IJIKM, Volume 4 (2009)
DOI: https://doi.org/10.28945/699
Issue No: Vol. 4
- An Improved SMS User Interface Result Checking System
An Improved SMS User Interface Result Checking System
Authors: Oludele Awodele, Emmanuel Rotimi Adagunodo, Adio Taofiki Akinwale, Sunday Idowu, M. Agbaje
IJIKM, Volume 4 (2009). Details
IJIKM, Volume 4 (2009)
DOI: https://doi.org/10.28945/700
Issue No: Vol. 4
- Printable Table of Contents: IJIKM, Volume 3, 2008
Printable Table of Contents: IJIKM, Volume 3, 2008
Authors:
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/639
Issue No: Vol. 3
- Multi-Agent System for Knowledge-Based Access to Distributed Databases
Multi-Agent System for Knowledge-Based Access to Distributed Databases
Authors: Priti Srinivas Sajja
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/86
Issue No: Vol. 3
- A Guided Approach for Personalized Information Search and Visualization
A Guided Approach for Personalized Information Search and Visualization
Authors: Wei-Bang Chen, Yufeng Li, Seng-Jaw Soong, Dongquan Chen
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/87
Issue No: Vol. 3
- Framework for Quality Metrics in Mobile-Wireless Information Systems
Framework for Quality Metrics in Mobile-Wireless Information Systems
Authors: Ruti Gafni
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/88
Issue No: Vol. 3
- An Integrated ICT Management Framework for Commercial Banking
OrganisationsAn Integrated ICT Management Framework for Commercial Banking Organisations
Authors: Simon Mukenge Tshinu, Gerrit Botha, Marlien Herselman
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/89
Issue No: Vol. 3
- Performance Attributions: A Cross Cultural Study Comparing Singapore,
Japan and US CompaniesPerformance Attributions: A Cross Cultural Study Comparing Singapore, Japan and US Companies
Authors: Hendrik Halim, Irene Keng Howe Chew
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/90
Issue No: Vol. 3
- Improving Security for SCADA Control Systems
Improving Security for SCADA Control Systems
Authors: Mariana Hentea
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/91
Issue No: Vol. 3
- Knowledge Production in Networked Practice-based Innovation Processes –
Interrogative Model as a Methodological ApproachKnowledge Production in Networked Practice-based Innovation Processes – Interrogative Model as a Methodological Approach
Authors: Vesa Harmaakorpi, Arto Mutanen
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/92
Issue No: Vol. 3
- From Tailored Databases to Wikis: Using Emerging Technologies to Work
Together More EfficientlyFrom Tailored Databases to Wikis: Using Emerging Technologies to Work Together More Efficiently
Authors: Amanda Regolini, Frédéric Berger, Emmanuelle Jannès-Ober, Luuk Dorren
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/93
Issue No: Vol. 3
- Designing an ‘Electronic Village’ of Local Interest on
Tourism: The eKoNES FrameworkDesigning an ‘Electronic Village’ of Local Interest on Tourism: The eKoNES Framework
Authors: Demosthenes Akoumianakis
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/94
Issue No: Vol. 3
- Expectancy Theory and Behavioral Intentions to Use Computer Applications
Expectancy Theory and Behavioral Intentions to Use Computer Applications
Authors: Lori Baker-Eveleth, Robert W. Stone
IJIKM, Volume 3 (2008). Details
IJIKM, Volume 3 (2008)
DOI: https://doi.org/10.28945/95
Issue No: Vol. 3
- Printable Table of Contents: IJIKM, Volume 2, 2007
Printable Table of Contents: IJIKM, Volume 2, 2007
Authors:
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/640
Issue No: Vol. 2
- Driving Creativity: Extending Knowledge Management into the Multinational
CorporationDriving Creativity: Extending Knowledge Management into the Multinational Corporation
Authors: James W. Gabberty, Jennifer D. E. Thomas
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/96
Issue No: Vol. 2
- Information Retrieval Systems: A Human Centered Approach
Information Retrieval Systems: A Human Centered Approach
Authors: Panagiotis Petratos
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/97
Issue No: Vol. 2
- Experiences in Building and Using Decision-Support Systems in Postgraduate
University CoursesExperiences in Building and Using Decision-Support Systems in Postgraduate University Courses
Authors: Arthur Tatnall , Stephen Burgess
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/98
Issue No: Vol. 2
- Towards Network Perspective of Intra-Organizational Learning: Bridging the
Gap between Acquisition and Participation PerspectiveTowards Network Perspective of Intra-Organizational Learning: Bridging the Gap between Acquisition and Participation Perspective
Authors: Miha Škerlavaj, Vlado Dimovski
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/99
Issue No: Vol. 2
- The Technology Ownership and Information Acquisition Habits of HBCU
FreshmenThe Technology Ownership and Information Acquisition Habits of HBCU Freshmen
Authors: Nicole A. Buzzetto-More , Retta Guy
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/100
Issue No: Vol. 2
- Criteria for the Evaluation of Business Process Simulation Tools
Criteria for the Evaluation of Business Process Simulation Tools
Authors: Vesna Bosilj-Vuksic, Vlatko Ceric, Vlatka Hlupic
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/101
Issue No: Vol. 2
- Integrated Information Systems - A Challenge for Long-Term Digital
PreservationIntegrated Information Systems - A Challenge for Long-Term Digital Preservation
Authors: Viveca Asproth
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/102
Issue No: Vol. 2
- An Evolutionary Software Project Management Maturity Model for Mauritius
An Evolutionary Software Project Management Maturity Model for Mauritius
Authors: Aneerav Sukhoo, Andries Barnard, Mariki M. Eloff, John A. Van der Poll
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/103
Issue No: Vol. 2
- A Methodology for Increasing Business Process Maturity in Public Sector
A Methodology for Increasing Business Process Maturity in Public Sector
Authors: Mojca Indihar Stemberger, Andrej Kovacic, Jurij Jaklic
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/104
Issue No: Vol. 2
- Approach to Building and Implementing Business Intelligence Systems
Approach to Building and Implementing Business Intelligence Systems
Authors: Celina M. Olszak, Ewa Ziemba
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/105
Issue No: Vol. 2
- A Generic Agent Framework to Support the Various Software Project
Management ProcessesA Generic Agent Framework to Support the Various Software Project Management Processes
Authors: Rita C Nienaber, Andries Barnard
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/106
Issue No: Vol. 2
- An Improved Assessment of Personality Traits in Software Engineering
An Improved Assessment of Personality Traits in Software Engineering
Authors: Adesina S. Sodiya , Olumide Babatope Longe, S. Adebukola Onashoga, Oludele Awodele, L. O. Omotosho
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/107
Issue No: Vol. 2
- Towards a Methodology to Elicit Tacit Domain Knowledge from Users
Towards a Methodology to Elicit Tacit Domain Knowledge from Users
Authors: Wernher R. Friedrich, John A. Van der Poll
IJIKM, Volume 2 (2007). Details
IJIKM, Volume 2 (2007)
DOI: https://doi.org/10.28945/108
Issue No: Vol. 2
- Printable Table of Contents: IJIKM, Volume 1, 2006
Printable Table of Contents: IJIKM, Volume 1, 2006
Authors:
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/641
Issue No: Vol. 1
- Predicting Internet-based Online Community Size and Time to Peak
Membership Using the Bass Model of New Product GrowthPredicting Internet-based Online Community Size and Time to Peak Membership Using the Bass Model of New Product Growth
Authors: David R. Firth, Cameron Lawrence, Shawn F. Clouse
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/109
Issue No: Vol. 1
- A Framework for Designing Nursing Knowledge Management Systems
A Framework for Designing Nursing Knowledge Management Systems
Authors: Tzyh-Lih Hsia, Li-Min Lin, Jen-Her Wu , Hsien-Tang Tsai
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/110
Issue No: Vol. 1
- Do Project Management Tools and Outcomes Differ in Organizations of
Varying Size and Sector'Do Project Management Tools and Outcomes Differ in Organizations of Varying Size and Sector?
Authors: Kimberly Furumo, J. Michael Pearson, Nancy L. Martin
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/111
Issue No: Vol. 1
- Measurement of Supply Chain Integration Benefits
Measurement of Supply Chain Integration Benefits
Authors: Peter Trkman , Ales Groznik
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/112
Issue No: Vol. 1
- Business Intelligence Systems in the Holistic Infrastructure Development
Supporting Decision Making in OrganisationsBusiness Intelligence Systems in the Holistic Infrastructure Development Supporting Decision Making in Organisations
Authors: Celina M. Olszak, Ewa Ziemba
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/113
Issue No: Vol. 1
- Adaptation of a Cluster Discovery Technique to a Decision Support System
Adaptation of a Cluster Discovery Technique to a Decision Support System
Authors: Namdar Mogharreban
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/114
Issue No: Vol. 1
- Towards a Typology of Virtual Communities of Practice
Towards a Typology of Virtual Communities of Practice
Authors: Line Dube, Anne Bourhis, Real Jacob
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/115
Issue No: Vol. 1
- The Underlying Issues in Knowledge Elicitation
The Underlying Issues in Knowledge Elicitation
Authors: Eric C. Okafor, Charles C. Osuagwu
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/116
Issue No: Vol. 1
- Applicability of Process Maps for Simulation Modeling in Business Process
Change ProjectsApplicability of Process Maps for Simulation Modeling in Business Process Change Projects
Authors: Ales Popovic, Mojca Indihar Stemberger, Jurij Jaklic
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/117
Issue No: Vol. 1
- TQM for Information Systems: Are Indian Organizations Ready'
TQM for Information Systems: Are Indian Organizations Ready?
Authors: Jamshed Siddiqui, Zillur Rahman
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/118
Issue No: Vol. 1
- Knowledge Conversion and Transfer: A Mathematical Interpretation
Knowledge Conversion and Transfer: A Mathematical Interpretation
Authors: Firas M. Alkhaldi , Mohammad Olaimat
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/119
Issue No: Vol. 1
- Gender Differences among IT Professionals in Dealing with Change and Skill
Set MaintenanceGender Differences among IT Professionals in Dealing with Change and Skill Set Maintenance
Authors: Brian H. Cameron, Loreen Butcher-Powell
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/120
Issue No: Vol. 1
- An Ethical Ecology of a Corporate Leader: Modeling the Ethical Frame of
Corporate LeadershipAn Ethical Ecology of a Corporate Leader: Modeling the Ethical Frame of Corporate Leadership
Authors: Robert Joseph Skovira
IJIKM, Volume 1 (2006). Details
IJIKM, Volume 1 (2006)
DOI: https://doi.org/10.28945/121
Issue No: Vol. 1