SlideShare a Scribd company logo
1 of 39
Download to read offline
TOP 10 READ/CITED
ARTICLES OF THE MONTH
OCTOBER 2020
INTERNATIONAL JOURNAL OF MANAGING INFORMATION
TECHNOLOGY (IJMIT)
http://airccse.org/journal/ijmit/ijmit.html
ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
DEFINING ICT IN A BOUNDARY LESS WORLD: THE DEVELOPMENT OF A
WORKING HIERARCHY
Colrain M. Zuppo Marion Technical College (MTC)
ABSTRACT
Subsequent to rapid information and communication technology development, the scope of the definition
of Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts
including economic development, education, IT, business and personal usage. A review of academic
literature, trade publications and general information was undertaken to establish a hierarchy of
applications for the term ICT or ICTs.
KEYWORDS
ICT, ICTs, education, economics, digital communication, hierarchy
For More Details: http://airccse.org/journal/ijmit/papers/4312ijmit02.pdf
Volume URL: http://airccse.org/journal/ijmit/vol4.html
REFERENCES
[1] International Telecommunication Union. (2007). Measuring village ICT in sub-Saharan Africa.
Retrieved from http://www.itu.int/ITU-D/ict/statistics/material/Africa_Village_ICT_2007.pdf.
[2] United Nations University. (2010). Greater Access to Cell Phones than Toilets in India. Retrieved
from http://www.inweh.unu.edu/News/2010-04_UNU-INWEH_News-Release_Sanitation.pdf
.
[3] International Telecommunication Union. (n.d.). Who we are. Retrieved,from
http://www.itu.int/en/about/Pages/default.aspx.
[4] World Health Organization. (2011). 2011-last update: Information and communication technologies
for public health emergency management. Retrieved from
http://www.who.int/csr/ict4phem/en/index.html
[5] World Health Organization. (2006). Health aspects of disaster preparedness and response: Report
from a regional meeting of countries of South East Asia, Bangkok, Thailand, 21-23 November 2005.
Prehospital & Disaster Medicine, 21(5), 62-78.
[6] Yang, C., Yang, J., Luo, X., and Gong, P. (2009). Use of mobile phones in an emergency reporting
system for infectious disease surveillance after the Sichuan earthquake in China. Bulletin of the World
Health Organization, 87(8), 619-623.
[7] Organisation for Co-operation and Development (OECD). (2002). Retrieved from
http://www.oecd.org/dataoecd/63/60/1933354.pdf.
[8] Angeleski, M., Mitrevski, P., and Janeska, M. (2009). “Composite index of e-business strategy
readiness of the enterprises in the Republic of Macedonia” in ICT Innovations 2009, Davcev, D., and
Marx Gomex, J., (Eds.), p. 265-275. Springer-Verlag Berlin Heidelberg, Scientific Publishing
Services Pvt. Ltd.
[9] Cohen, D., Garibaldi, P., and Scarpetta, S., (Eds.). (2004). The ICT Revolution: Productivity,
Differences and the Digital Divide. Oxford University Press, University of Oxford.
[10] Educational Testing Service. (2007). Digital transformation: A framework for ICT literacy. A report
of the International ICT Literacy Panel. Retrieved from
http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pd
f.
[11] Jarnieson-Proctor, R., Watson, G., Finger, G., Grimbeek, P., & Burnett, P. C. (2007). Measuring the
use of Information and Communication Technologies (ICTs) in the classroom. Computers in the Schools,
24(1/2), 167-184. doi:10.1300/J025v24n01̱11.
[12] Clark, L., Demont-Heinrich, C., & Webber, S. (2005). Parents, ICTs, and children's prospects for
success: Interviews along the digital “Access Rainbow”. Critical Studies in Media Communication,
22(5), 409-426. doi:10.1080/07393180500342985.
[13] Selwin, N., Gorard, S., & Furlong, J. (2006). Adult learning in the digital age: Information
technology and the learning society. Routledge, Taylor & Francis Group.
[14] Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes in ICT acceptance and use.
International Journal of Human Interaction, 24(7), 628-648. doi: 10.1080/10447310802335482.
[15] Information Technology Infrastructure Library [ITIL]. (n.d.). ITIL glossaries. Retrieved from
http://www.itil-officialsite.com/InternationalActivities/ITILGlossaries_2.aspx.
[16] TechTerms.com. (n.d.). Definition of ICT. Retrieved from http://www.techterms.com/definition/ict.
[17] Innovation Value Institute at National University of Ireland Maynooth. (n.d.). IVI and CEPIS
develop European Framework for ICT Professionalism. Retrieved from http://ivi.nuim.ie/news-
events/ivi-andcepis-develop-european-framework-ict-professionalism
[18] Institute of IT Professionals, New Zealand. (n.d.). ITCP – IT Certified Professional. Retrieved from
http://www.itcp.org.nz/about
[19] Professional Standards Board, Australian Computer Society. (2012.). The ICT professional body of
knowledge. Retrieved from http://www.acs.org.au/__data/assets/pdf_file/0007/7792/The-ICTProfession-
Body-of-Knowledge-July-2012.pdf
[20] Galperin, H., and Mariscal, J. (2007). Digital Poverty: Latin American and Caribbean Perspectives.
International Development Research Centre, Intermediate Technology Publications Ltd.
[21] National Geographic News. (2005). The deadliest tsumani in history? Retrieved from
http://news.nationalgeographic.com/news/2004/12/1227_041226_tsunami.html.
[22] The Telegraph. (2011). Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review. Retrieved
from http://www.telegraph.co.uk/news/worldnews/asia/japan/8953574/Japan-earthquaketsunami-and-Fukushima-
nuclear-disaster-2011-review.html.
AUTHOR
Colrain M. Zuppo earned a PhD in Technology Management from Indiana
State University with a specialization in Human Resource Development and
Industrial Training. Cori’s dissertation research was entitled “Organizations
as consumers of human capital via technology: A policy study of information
and communication technologies”. Cori also holds an M.A.Ed. from The
George Washington University and a B.S. in Conflict Resolution from Ohio
University. Cori is a Professor in the Department of Business and
Information Technology at Marion Technical College (MTC) and served as
part time faculty and doctoral fellow at Bowling Green State University,
conducting research and teaching in the areas of technology management,
academic research and instructional design & delivery.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION
Ehab J.Adwan1
and Ali Al-Soufi2
1&2
Department of Information Systems, University of Bahrain, Kingdom of Bahrain
ABSTRACT
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a
catalyst that would mitigate the deficiencies characterized by this industry. In comparison with other
cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in
correspondence to “Construction Tasks” in the construction industry over the past two decades (1996-
2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3)
discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and
4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a
set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant
for the current review paper. This research is targeting the beginning researchers and practitioners in the
field of ICT in construction.
KEYWORDS
Construction industry, Information, Technology, Ict, Construction Tasks, Article review.
FOR MORE DETAILS: http://aircconline.com/ijmit/V8N4/8416ijmit01.pdf
VOLUME LINK: http://airccse.org/journal/ijmit/vol8.html
REFERENCES
[1] C. Carter, T. Hassan, and M. Merz, “The eLegal project: specifying legal terms of contract in ICT
environment”, International Journal of Information technology in Construction, 6, 136. 2001.
[2] M. Sarshar, U. Isikdag, “A survey of ICT use in the Turkish construction industry”, in Engineering,
Construction and Architectural Management, 2004, 11(4), 238-247.
[3] A.Andrews, J. H. Rankin, and L. M. Waugh, “A framework to identify opportunities for ICT support
when implementing sustainable design standards”. Journal of Information technology in Construction,
11, 2006, 17-33.
[4] Y. Rezgui, A. Zarli, and C. J. Hopfe, “Editorial-Building Information Modeling Applications,
Challenges and Future Directions”, Journal of Information Technology in Construction, 14, 613-616.
2009.
[5] B. Erdogan, C. Abbott, and G. Aouad, “Construction in year 2030: developing an information
technology vision,” in Philosophical Transactions of the Royal Society of London A: Mathematical,
Physical and Engineering Sciences, 368(1924), 3551-3565. 2010.
[6] A. Sextos, “ICT applications for new generation seismic design, construction and assessment of
bridges.” Structural Engineering International, 24(2), 173-183. 2014.
[7] E. O. Ibem and S. Laryea, “Survey of digital technologies in procurement of construction projects”,
Automation in Construction, 46, 11-21. 2014.
[8] M. Martínez-Rojas, N. Marin, and M.A. Vila, “The role of information technologies to address data
handling in construction project management.” Journal of Computing in Civil Engineering, 04015064.
2015.
[9] R.Amor, M. Betts, G. Coetzee, and M. Sexton. “Information technology for construction: recent
International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 19
work and future directions”, 7(16), 245-258. 2002.
[10] Y.S. Ampofo, B. Bizimana, J. Mbuthi, I. Ndayambaje, N. Ogetta, and A.J. Orodho, “Information
Communication Technology Penetration and its Impact on Education: Lessons of Experience from
Selected African Countries of Ghana, Kenya and Rwanda“, Journal of Information Engineering and
Applications, 4 (11), pp.84-95. 2014.
[11] N. Mutesi, “Application of ICT in the Construction Industry in Kampala” in Advances in
Engineering and Technology: Contribution of Scientific Research in Development: Proceedings of the
Second International Conference on Advances in Engineering and Technology, Kampala. Makrere
University.Tanzania. 2009.
[12] B. Bjork, “A framework for discussing information technology applications in construction” in CIB
Working Commission W78 workshop." Information Technology Support for Construction Process Re-
engineering", Cairns, Australia, 1997.
[13] W. El-Ghandour and M. Al-Hussein. “Survey of information technology applications in
construction”, Construction innovation, 4(2), 83-98. 2004.
[14] J.M. Doherty. “A survey of computer use in the New Zealand building and construction industry”.
Electronic Journal of Information technology in Construction, Vol 2, 1-13. 1997.
[15] C. L. Perkinson and I. U. Ahmad. “Computing Technology Usage in Construction Contractor
Organizations.” In Fourth LACCEI International Latin American and Caribbean Conference for
Engineering and Technology (LACCET’2006), Breaking Frontiers and Barriers in Engineering:
Education, Research and Practice, 2006.
[16] H. J. Chien and S. Barthorpe. “The current state of information and communication technology
usage by small and medium Taiwanese construction companies”. Journal of Information Technology in
Construction, 15(5), 75-85. 2010.
[17] M. Jacobsson and H. Linderoth. “The influence of contextual elements, actors’ frames of reference,
and technology on the adoption and use of ICT in construction projects: a Swedish case study”.
Construction Management and Economics, 28(1), 13-23. 2010.
[18] T. M. Hassan and R. McCaffer. “Vision of the large scale engineering construction industry in
Europe”. Automation in construction, 11(4), 421-437. 2002.
[19] V. Peansupap and D. Walker. “Factors affecting ICT diffusion: A case study of three large
Australian construction contractors”. Engineering, Construction and Architectural Management, 12(1),
21-37. 2005.
[20] Oladapo, A. A. “An investigation into the use of ICT in the Nigerian construction industry”. Journal
of Information Technology in Construction, 12(18), 261–277. 2007.
[21] P. T. Lam, F. W. Wong, and K. T. Tse,. “Effectiveness of ICT for construction information
exchange among multidisciplinary project teams”. Journal of Computing in Civil Engineering, 24(4),
365-376. 2009
[22] R. Jardim-Goncalves and A. Grilo. “SOA4BIM: Putting the building and construction industry in
the Single European Information Space”. Automation in Construction, 19(4), 388-397. 2010.
[23] E.K. Zavadskas and A. Kaklauskas. “Advanced information and communication technologies in
construction”. in The 25th International Symposium on Automation and Robotics in Construction
ISARC–2008, 2008, 39–45.
[24] S. Alkalbani, Y. Rezgui, C. Vorakulpipat, and I.E. Wilson. “ICT adoption and diffusion in the
construction industry of a developing economy: The case of the sultanate of Oman.” Architectural
Engineering and Design Management, 9(1), 62-75. 2013.
[25] R. Davies, and C. Harty. “Measurement and exploration of individual beliefs about the
consequences of building information modelling use.” Construction Management and Economics,
31(11), 1110- 1127. 2013.
[26] H. Penttilä. “Describing the changes in architectural information technology to understand design
complexity and free-form architectural expression”. Journal of Information Technology, 19(29), 395-
408. 2006.
[27] P.A. Jensen, P. A. and E.I. Jóhannesson. “Building Information Modelling in Denmark and Iceland.
Engineering”, Construction and Architectural Management, 20(1), 99-110. 2013.
[28] M. Jacobsson and H.C. Linderoth. “User perceptions of ICT impacts in Swedish construction
International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 20
companies:‘it’s fine, just as it is’. Construction management and economics, 30(5), 339-357. 2012.
[29] P. Chaisuparasmikul. “Bidirectional Interoperability Between CAD and Energy Performance
Simulation Through Virtual Model System Framework.” in Proceedings: ACADIA, 2006, 12-15.
[30] G.E. Farin, J. Hoschek, and M.S. Kim. Handbook of computer aided geometric design. Elsevier.
2002.
[31] N. Berente, R. Baxter,and K. Lyytinen. “Dynamics of inter‐organizational knowledge creation and
information technology use across object worlds: the case of an innovative construction project.”
Construction Management and Economics, 28(6), 569-588. 2010.
[32] G. Brewer and T. Gajendran. “Emerging ICT trends in construction project teams: a Delphi survey.”
Journal of Information Technology in Construction, 14, 81-97. 2009.
[33] C. Evia. “Localizing and designing computer-based safety training solutions for Hispanic
construction workers.” Journal of Construction Engineering and Management, 137(6), 452-459. 2010.
[34] Y. Zhu, R. Zhang, and I. Ahmad. “Applying concept similarity to the evaluation of common
understanding in multidisciplinary learning.” Journal of Computing in Civil Engineering, 24(4), 335-
344. 2009.
[35] J. H. Rankin and R. Luther. “The innovation process: adoption of information and communication
technology for the construction industry”. Canadian Journal of Civil Engineering, 33(12), 1538- 1546.
2006.
[36] M. Benza, C. Bersani, E. Garbolino, D. Giglio, S. Olampi, R. Sacile, and E. Trasforini. "A
distributed information system prototype to detect and monitor the Hazardous Material Transport on the
road in the territory of Nice-Imperia-Ventimiglia.” WIT Transactions on The Built Environment, 2007,
94.
[37] C.S. Leem and B.G. Kim. “Taxonomy of ubiquitous computing service for city development.”
Personal and ubiquitous computing, 17(7), 1475-1483. 2013.
[38] Z. Riaz, D.J. Edwards, G. D. Holt, and T. Thorpe. “Data flow analysis of plant and equipment health
and safety management..” Journal of Engineering, Design and Technology, 9(2), 178-203. 2011.
[39] F. Al-Neshawy, J. Piironen, S. Peltola, E. Sistonen, and J. Puttonen. “Network system for assessing
the moisture and thermal behaviour of repaired concrete building facades..”, Journal of Information
technology in Construction, Vol. 16, pg. 601-616. 2011.
[40] Z. Han, T. Froese. “Project Information Management in Mega Oil Sands Projects. ”. Building a
Sustainable Future: pp. 71-80.pp. 71-80. 2009.
[41] A.P. Chassiakos. “The Use of Information and Communication Technologies in Construction.” Civil
Engineering Computations: Tools and Techniques. Saxe-Coburg Publications, Stirlingshire, UK, Chapter
5, pp 79-104, 2007.
[42] Y. Nielsen, and O. Koseoglu. “Wireless networking in tunnelling projects.” Tunnelling and
underground space technology, 22(3), 252-261. 2007.
[43] T. Molony. “The role of mobile phones in Tanzania’s informal construction sector: The case of Dar
es Salaam”. In Urban Forum, 2008. 19-2, pp. 175-186.
[44] N. Suman, D. Ursic, M. Psunder, and D. Veselinovic. “Mobile information and communication
technology and management of business changes in construction companies in Slovenia.” Systemic
Practice and Action Research, 22(5), 397-411. 2009.
[45] S. Bowden, A. Dorr, T. Thorpe, and C. Anumba. “Mobile ICT support for construction process
improvement.”” Automation in construction, 15(5), 664-676. 2006.
[46] B. Graham and K. Thomas. “An investigation into the development of knowledge management
systems within the leading Irish construction companies.. ” In Khosrowshahi, F. (ed.), 21st Annual
ARCOM Conference, 7-9 September 2005, School of Oriental and African Studies. Association of
Researchers in Construction Management, 2005, Vol. 1, 499-508.
[47] L. C. Tang, Y. Zhao, S. Austin, M. Darlington, and S. Culley, S. “Codification vs personalisation: A
study of the information evaluation practice between aerospace and construction industries.”
International Journal of Information Management, 30(4), 315-325. 2010.
[48] P. Zhang and F.F. Ng. “Explaining knowledge-sharing intention in construction teams in Hong
Kong.” Journal of Construction Engineering and Management, 139(3), 280-293. 2013. International
Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 21
[49] P. Inyim, J. Rivera, and Y. Zhu. “Integration of building information modeling and economic and
environmental impact analysis to support sustainable building design.” Journal of Management in
Engineering, 31(1), A4014002. 2014.
[50] T. M. Froese. “The impact of emerging information technology on project management for
construction.” Automation in construction, 19(5), 531-538. 2010.
[51] S. Dehlin, and T. Olofsson. “An evaluation model for ICT investments in construction projects.”
Journal of Information Technology in Construction, 13, 343-361. 2008.
[52] W. Sher, S. Sherratt, A. Williams, and R. N. Gameson. “Heading into new virtual environments:
what skills do design team members need?.” Journal of Information Technology in Construction, 14, 17-
29. 2009.
[53] P. Christiansson, K. Svidt, K.B. Sørensen, and U. Dybro. “User participation in the building
process.” Journal of Information Technology in Construction, 16, 309-334. 2011.
[54] A. Ekholm and M. Molnar. “ICT development strategies for industrialisation of the building
sector.”Journal of Information Technology in Construction, 14(special issue), 429-444. 2009.
AAUUTTHHOORR
Ehab J.Adwan is a Ph.D. candidate. He received his M.Sc. degree in Computer
Science in 2004 from the University of Bahrain (UOB) and received his B.Sc.
degree in Electronics and Physics with a minor in Computer in the year 1996 from
The American University in Cairo (AUC). Since 1996, he is working as an
Academic Research and Teaching Assistant (B) at the Department of information
systems- College of Information Technology at the University of Bahrain. His
mainstream research is focused on Enterprise Architecture, Business Architecture,
Information Systems Architecture, Software Architecture, Software
Engineering and Systems Analysis and Design,. Currently, great research emphasis is carried out on the
ICT in Construction industry through an Enterprise Architecture perspective.
Dr. Ali AlSoufi is an Associate professor of Information Systems at University of
Bahrain. He has earned his PhD in Computer science in 1994 from Nottingham
University, UK. He has worked for Bahrain Telecom Co for 8 years as a Senior
Manager Application Programme where he overlooked number of mega IS
Application projects. Worked at Arab Open University as the head of IT program
and Assistant Director for Business Development during 2007-2010. He is a PT
consultant in Bahrain e-Government Authority (EGA) in Enterprise Architecture.
He is an active member of the Bahrain National ICT Governance Committee. His
specializations is Strategic IT Planning and Governance, IT project management,
Enterprise Architecture and IS in Organization
THE CONTRIBUTION OF ELECTRONIC BANKING TO CUSTOMER SATISFACTION:
A CASE OF GCB BANK LIMITED –KOFORIDUA
Martin Otu Offei and Kwaku Nuamah-Gyambrah Koforidua Polytechnic , Ghana
ABSTRACT
Internet banking has the potential to provide fast and reliable services to customers for which they are
relatively happy. Due to the technological changes taking place all over the world, many institutions,
including the banking sector have taken giant steps to move in tandem with these changes. In this light
most banks, with GCB Bank, Ghana, not being an exception have introduced electronic banking in order
to decongest the banking halls of customers who spend time unending in order to transact business. The
purpose of this research was to assess the Contribution of Electronic Banking to Customer Satisfaction at
GCB Bank-Koforidua, to this end some objectives were set for the study. These were: To assess the
availability of electronic banking facilities at GCB Bank, Koforidua. To assess the knowledge and
patronage of internet banking services by customers, to examine the effectiveness of the usage of
electronic banking facilities, to examine the problem facing an internet banking in GCB Bank,
Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools for data
collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch.
Findings from analysis of data revealed that though there was the existence of internet banking facilities
of the bank, respondents of the study were not fully aware of the existence of such facilities. It was also
found that the use of internet banking was quite expensive and that though the bank was utilizing the
facility, customers were not fully patronizing them. It was concluded that internet banking brings
efficiency in the operations of the bank. Finally, the study recommended that all branches of GCB Bank
adopt internet banking facilities to help in effective banking operations and transactional purposes. To
maximize the operations and potential of the bank management must endeavor to educate the customers
about the existence of internet banking facilities since a few customers were aware of the existence of
such facilities.
KEYWORDS
Internet banking, customer satisfaction, contribution, Ghana, ATM Cards, master cards, visa, debit &
credit cards
FOR MORE DETAILS: http://aircconline.com/ijmit/V8N1/8116ijmit01.pdf
VOLUME LINK: http://airccse.org/journal/ijmit/vol8.html
REFERENCES
[1] Acquah, P.A. (2006). Evaluating the Banking System in Ghana. Accra: Fifth Banking Awards
Ceremony
[2] Agboola, A.A. (2006). Electronic Payment Systems and Tele banking Services in Nigeria journal of
Internet Banking and Commerce, 11.
[3] Akinci, S., Aksoy, S. and Atilgan E. (2004).Adoption of Internet Banking among Sophisticated
Consumer Segments in an Advanced Developing Country. International Journal of Bank Marketing,
Vol. 22 No. 3, pp. 212-232
[4] Akoh, B. (2001). E-Business in the Developing World, Africa and Ethiopia. In Conference on
Information and Communication Technology and Development.
[5] Babin, B. J., Carr, J. C., and Griffin, M. (2010).Business Research Methods. 8th
Edition.SouthWesternCengage Learning.
[6] Bauer, C., &Colgan, J. (2001). Planning for electronic commerce strategy: an explanatory study from
the financial services sector. Logistics Information Management, 14(1/2), 24-32.
[7] Fraenkel, J. R., Wallen, N. E., & Hyun, H. H. (1993). How to design and evaluate research in
education (Vol. 7). New York: McGraw-Hill.
[8] Gurau, C. (2002). E-banking in transition economies: The case of Romania. Journal of Financial
Services Marketing, 6(4), 362-378.
[9] Haque, A. K. M., Ismail, A. Z., &Daraz, A. H. (2009). Issues of e-banking transaction: an
empirical investigation on Malaysian customers perception. Journal of applied Sciences, 9(10), 1870-
1879.
[10] Hughes, T. (2001). Market Orientation and the Response of UK Financial Services Companies to
Changes in Market Condition as a Result of E-Commerce.International Journal of bank marketing, 19
(6), 222 – 231.
[11] Jayawardhena, C., & Foley (2000). Changes In The Banking Sector – The Case of Internet Banking
in the UK, Internet Research: Electronic Networking Applications and Policy, Vol. 10, No. 1, pp. 19-30.
[12] Li, F. (2001). The Internet and the Deconstruction of the Integrated Banking Model, British Journal
of Management, Vol. 12, pp. 307-22.
[13] Mols, N. P. (1999) The Internet and the Banks’ Strategic Distribution Channel Decisions,
International Journal of Bank Marketing, 17 (6), pp.245-300.
[14] Moutinho, L., &Meidan, A. (1989). Bank Customers’ Perceptions, Innovations and New
Technology, International Journal of Bank Marketing, Volume 7 No. 2, pp. 22-27.
[15] Polatoglu, V. N. andEkin, S. (2001).An Empirical Investigation of the Turkish Consumers’
Acceptance of Internet Banking Services. International Journal of Bank Marketing, 19(4), 156-165.
[16] Robinson, G. (2000). Bank to the future. Internet Magazine.
[17] Rogers, E. (2003).Diffusion of Innovations, 5th edn Free Press. New York.
[18] Rotchanakitumnuai, S., &Speece, M (2003). Barriers to Internet Banking Adoption: a
qualitative study among corporate customers in Thailand. International Journal of Bank Marketing,
vol. 21, no.6/7, pp. 321-23.
[19] Sathye, M. (1999). Adoption of Internet Banking by Australian Consumers: An empirical
investigation, International Journal of Bank Marketing, Vol. 17 No. 7, pp. 324-34.
[20] Shittu, O. L. O. R. U. N. S. E. G. U. N., & FULFILMENT, I. P. (2010). The Impact Of Electronic
Banking In Nigeria Banking System (Critical Appraisal Of Unity Bank (PLC). LadokeAkintola
University of Technology, Ogbomoso.
[21] Steven, A. (2002). Information systems: The Foundation of E-Business. New Jersey: Anderson, 11-
36.
[22] Thornton, J., & White, L., .(2001) Customer Orientations and Usage of Financial Distribution
Channels, International Journal of Bank Marketing, Volume 15 No. 3, pp. 168-185.
[23] Turban, E., Lee, J., King, D., Chung, M., (2000) Electronic Commerce: A Managerial Perspective,
Prentice Hall International, Inc:New Jersey.
[24] Twumasi, P. A. (2001). Social Research in Rural Communities, 2nd Ed. Accra: Ghana Universities
Press.
[25] Wisdom, K (2012).The Impact of Electronic Banking on Service Delivery to Customers of Ghana
Commercial Bank Limited. A Study of Ghana Commercial Bank Ltd. Ho Polytechnic Branch.
[26] Yasuharu, U. (2003).The Effects of Information System Investment in Banking Industry
A NEW CONCEPT OF R&D IN NEO OPEN INNOVATION -
TRANSFORMATION OF R&D TRIGGERED BY AMAZON
Yuji Tou1
, Chihiro Watanabe 2, 3
, Kuniko Moriya 2, 4
, Victor Vurpillat5
, Pekka Neittaanmäki2
,
1
Tokyo Institute of Technology, Japan
2
University of Jyväskylä, Finland,
3
International Institute for Applied Systems Analysis (IIASA), Austria,
4
Research and Statistics Department, Bank of Japan, Japan and
5
Global Connexus Inc., USA
ABSTRACT
Amazon was the world’s top R&D firm in 2017. Its R&D investment was double that of 2015, quintuple
that of 2012, and tenfold that of 2011. It deploys a unique R&D model as conducting “routine or periodic
alternations” and “significant improvement” simultaneously. Since traditionally the former is classified
as non-R&D, Amazon’s rapid and notable increase has raised the question of a new R&D definition in
the digital economy. By means of an empirical analysis of the Amazon’s R&D model, this paper
attempted to provide a convincing answer to this question. Amazon has invested considerable resources
in extremely innovative business areas, which has developed its assimilation capacity. In parallel with
such forefront innovation, Amazon is endeavoring to absorb soft innovation resources from external
markets and assimilate them into its business model. This then transforms “routine or periodic
alternations” into “significant improvement”, leading to the company becoming the world’s top R&D
firm. Such an endeavor has triggered a new concept of R&D in neo open innovation and revealed the
significance of a transformation of the R&D concept in the digital economy.
KEYWORDS
R&D, neo open innovation, Amazon, transformation, technology and content
For More Details: http://aircconline.com/ijmit/V11N1/11119ijmit02.pdf
Abstract URL: http://aircconline.com/abstract/ijmit/v11n1/11119ijmit02.html
Volume URL: http://airccse.org/journal/ijmit/vol11.html
REFERENCES
[1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018. Neo Open Innovation in the Digital
Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information
Technology 10 (4), 53-75.
[2] Bloomberg, 2017. 2017 Global Innovation 1000 Study. Bloomberg, New York.
[3] Fox, J., 2018. Amazon, the Biggest R&D Spender, Does Not Believe in R&D. Bloomberg Opinion,
13 April 2018. https://www.bloomberg.com/view/articles/2018-04-12/amazon-doesn-t-believe-in
research-and-development-spending (retrieved 22.09.2018)
[4] Gershgorn, D., 2018. Amazon’s R&D Spending is Poised to Top the GDP of Iceland. Quarts, 28
December 2018.
[5] World Bank, 2018. National Accounts Data. World Bank, Washington, D.C.
[6] Watanabe, C., Tou, Y. & Neittaanmäki, P., 2018b. A New Paradox of the Digital Economy:
Structural Sources of the Limitation of GDP Statistics, Technology in Society 55, 9-33.
[7] Watanabe, C., Naveed, K., Tou, Y. & Neittaanmäki, P., 2018c. Measuring GDP in the Digital
Economy: Increasing Dependence on Uncaptured GDP. Technological Forecasting and Social Change
137, 226-240.
[8] Watanabe, C., Naveed, K., Neittaanmäki, P., 2015. Dependency on Un-captured GDP as a Source of
Resilience beyond Economic Value in Countries with Advanced ICT Infrastructure: Similarities and
Disparities between Finland and Singapore. Technology in Society 42, 104–122.
[9] Watanabe, C., Naveed, K., Neittaanmäki, P., Tou, Y., 2016. Operationalization of Un-captured GDP:
The Innovation Stream under New Global Mega-trends. Technology in Society 45, 58–77.
[10] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random
House LLC, New York.
[11] Naveed, K., Watanabe, C. & Neittaanmäki, P., 2018. The Transformative Direction of Innovation
toward an IoT-based Society: Increasing Dependency on Uncaptured GDP in Global ICT Firms.
Technology in Society 53, 23-46.
[12] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B,
Ed. The Global Internet Economy. MIT Press, Massachusetts.
[13] Knott, A.M., 2017. How Innovation Really Works: Using the Trillion-Dollar R&D fix to Drive
Growth. McGraw Hill, New York.
[14] Green, T., 2018. How Much does Amazon Spend on R&D? Less than You Think. The Motley Fool,
13 June 2018. https://www.fool.com/investing/2018/06/13/how-much-does-amazon-spend-on-rd-less
than-you-thi.aspx (retrieved 10.01.2019).
[15] Amazon, 2018a. Amazon Com. Inc. Annual Report 2017. Amazon.Com, Inc., Seattle.
http://www.annualreports.com/Company/amazoncom-inc (retrieved 06.01.2019).
[16] Amazon, 2018b. Amazon Leadership Principles. Amazon.Com, Inc., Seattle.
https://www.amazon.jobs/en/principles (retrieved 20.11.2018).
[17] Apple, 2018. Apple Inc. Annual Report 2017. Apple Inc., Cupertino.
https://investor.apple.com/investor-relations/financial-information/(retrieved 06.01.2019).
[18] Financial Accounting Standards Board (FASB) Accounting Standards Codification (ASC), 2018.
Generally Accepted Accounting Principles (GAAP) for Business. FASB, ASC, Washington, D.C.
[19] National Science Foundation (NSF), 2018. Definitions of R&D: An Annotated Compilation of
Official Sources. NSF, Alexandria, Virginia, USA. https://www.nsf.gov/statistics/randdef/#chp3.
(retrieved 10.01.2019).
[20] Watanabe, C., Naveed, N. & Neittaanmäki, P., 2018a. Digital Solution Transform the Forest-based
Bioeconomy into a Digital Platform Industry: A Suggestion for a Disruptive Business Model in the
Digital Economy. Technology in Society 54, 168-188.
[21] Jenkins, J., 2011. How Amazon. Com Migrated to AWS. 2011 AWS Tour Australia, Closing
Keynote. https://www.slideshare.net/AmazonWebServices/2011-aws-tour-australia-closing-keynote-how
amazoncom-migrated-to-aws-by-jon-jenkins (retrieved 10.01.2019).
[22] Yahoo! Finance, 2018. Amazon.com, Inc. (AMZN), Historical Data.
https://finance.yahoo.com/quote/AMZN/history (retrieved 10.01.2019).
[23] Yahoo! Finance, 2018. Apple Inc. (AAPL), Historical Data.
https://finance.yahoo.com/quote/AAPL/history (retrieved 10.01.2019).
[24] Colin, N., 2016. 11 Notes on Amazon. The Family Papers #010. 18 Jan. 2016.
https://salon.thefamily.co/11-notes-on-amazon-part-1-cf49d610f195 (retrieved 06.01.2019).
[25] O’Reilly, T., 2003. The Open Source Paradigm Shift. O’Reilly & Associates, Inc., Sebastopol.
https://www.oreilly.com/tim/archives/ParadigmShift.pdf (retrieved 10.01.2019).
[26] Watanabe, C., Takayama, M., Nagamatsu, A., Tagami, T. and Griffy-Brown, C., 2002. Technology
Spillover as a Complement for High Level R&D Intensity in the Pharmaceutical Industry. Technovation
22 (4), 245-258.
[27] Rivet, D.J., 2017. Amazon’s Superior Innovation: A Study of Amazon’s Corporate Structure, CEO,
and Reasons behind Why It has become the Most Innovative Company in Today’s Market. University of
New Hampshire Honors Theses and Capstone 343, University of New Hampshire, Durham.
https://scholars.unh.edu/honors/343 (retrieved 10.01.2019
AUTHORS
Yuji Tou graduated from Tokyo Institute of Technology, Japan, and is currently specially appointed
associate professor at Tokyo Institute of Technology, Japan
Chihiro Watanabe graduated from the University of Tokyo, Japan, and is currently Professor Emeritus
at the Tokyo Institute of Technology, a research professor at the University of Jyväskylä, Finland, and a
research scholar at the International Institute for Applied Systems Analysis (IIASA).
Kuniko Moriya graduated from Aoyama Gakuin University, Japan, and is currently is currently Director
of the Bank of Japan.
Victor V. Vurpillat graduated from Calfornia State Polytechnic University, USA, and is currently
Chairman of the Board and Director of Research, Global Connexus Inc., USA
Pekka Neittaanmäki graduated from the University of Jyväskylä with a degree in Mathematics. He is
currently Professor of the Faculty of Information Technology, University of Jyväskylä, Finland.
A SOLUTION TO THE DILEMMA BETWEEN R&D EXPANSION AND
THE PRODUCTIVITY DECLINE: LESSONS FROM THE R&D MODELS
IN AMAZON AND FINLAND
Yuji Tou1
, Chihiro Watanabe 2,3
, Kuniko Moriya4,2
, Pekka Neittaanmäki2
,
1
Tokyo Institute of Technology, Japan,
2
University of Jyväskylä, Finland,
3
International Institute for Applied Systems Analysis (IIASA), Austria and
4
Research and Statistics Department, Bank of Japan, Japan
ABSTRACT
As a consequence of the two-faced nature of information and communication technology (ICT), a
majority of ICT leaders have been confronting the critical problem of a dilemma between R&D
expansion and productivity decline in the digital economy. However, Amazon has been able to
accomplish a skyrocketing increase in R&D and market capitalization. Finland has also accomplished
balanced advancement not only of welfare but also economic resurgence. This paper attempted to
elucidate the miracle of two ICT leaders. By means of a comparative empirical analysis of respective
development trajectories, the sources of their success were analyzed thereby the comparative advantage
and disadvantage of each respective trajectories supportive to find a practical solution to the critical
problem of a dilemma were identified. The sources of both successes can be attributed to harnessing the
vigor of soft innovation resources from the marketplace. However, contrary to Amazon’s complementary
use, Finland has depended on substitutionary use. While this approach contributes to easy resurgence, it
casts a shadow to the innovative growth in the future. An insightful suggestion regarding balanced
sustainable growth by cross learning was thus provided.
KEYWORDS
Digital economy, soft innovation resources, Amazon, Finland, dilemma between R&D and productivity
For More Details: http://aircconline.com/ijmit/V11N2/11219ijmit02.pdf
Abstract URL: http://aircconline.com/abstract/ijmit/v11n2/11219ijmit02.html
http://airccse.org/journal/ijmit/vol11.html
REFERENCES
[1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018b. Neo Open Innovation in the Digital
Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information
Technology 10 (4), 53-75.
[2] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2019b. Harnessing Soft Innovation
Resources Leads to Neo Open Innovation. Technology in Society, in print.
[3] B loomberg, 2017. 2017 Global Innovation 1000 Study. Blo omberg, New York.
[4] Fox, J., 2018. Amazon, the Biggest R&D Spender, Does Not Believe in R&D. Bloomberg Opinion,
13 April 2018. https://www.bloomberg.com/view/articles/2018-04-12/amazon-doesn-t-believe-in-
research-anddevelopment-spending (retrieved 22.09.2018).
[5] Statista, 2019. Top Internet Companies: Global Market Value 2018. Statista, Hamburg.
https://www.statista.com/statistics/277483/market-value-of-the-largest-internet-companiesworldwide/
(retrieved 10.01.2019).
[6] Macrotrends, 2019. Apple Market Cap 2006-2018 – AAPL, Chicago.
https://www.macrotrends.net/stocks/charts/AAPL/apple/market-cap (retrieved 08.02.2019).
[7] Macrotrends, 2019. Amazon Market Cap 2006-2018 – AMZN, Chicago.
https://www.macrotrends.net/stocks/charts/AMZN/amazon/market-cap (retrieved 08.02.2019).
[8] Tou, Y., Watanabe, C., Moriya, K., Vurpillat, V., & Neittaanmäki, P., 2019a. A New Concept of
R&D in Neo Open Innovation: Transformation of R&D Triggered by Amazon. International Journal of
Managing Information Technology 11 (1) in print.
[9] Tou, Y., Watanabe, C., Ilmola, L., Moriya, K. and Neittaanmäki, P., 2018a. Hybrid Role of Soft
Innovation Resources: Finland’s Notable Resurgence in the Digital Economy. International Journal of
Managing Information Technology 10 (4), 1-22.
[10] International Monetary Fund (IMF), 2018. World Economic Outlook Database 2018. IMF,
Washington, D.C.
https://www.imf.org/external/datamapper/NGDP_RPCH@WEO/OEMDC/ADVEC/WEOWORLD
(retrieved 06.02.2019).
[11] United Nations, 2018. World Happiness Report 2018. United Nations, New York.
http://worldhappiness.report/ed/2018/ (retrieved 10.01.2019)
[12] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B,
Ed. The Global Internet Economy. MIT Press, Massachusetts.
[13] R i tala, P., Golnam, A. & Wegmann, A., 2014. Coopetition based Business Models: The Case of
Amazon.com. Industrial Marketing Management 43, 236 249.
[14] K nott, A.M., 2017. How Innovation Really Works: Using the Trillion Dollar R&D fix to Drive
Growth. McGraw Hill , New
[15] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random
House LLC, New York.
[16] Khan, L.L., 2017. Amazon’s Antitrust Pradox. The Yale Law Journal 126, 710-805.
[17] OECD, 2017. OECD Review of Innovation Policy: Finland Assessment and Recommendation.
OECD, Paris.
[18] Watanabe, C., Kondo, R., Ouchi, N., Wei, H. and Griffy-Brown, C., 2004. Institutional Elasticity as
a Significant Driver of IT Functionality Development. Technological Forecasting and Social Change 71
(7), 723-750.
[19] Schelling, T.C., 1998. Social mechanisms and social dynamics, in Hedstrom, P. and Swedberg, R.
eds., Social Mechanisms: An Analytical Approach to Social Theory. Cambridge Univ. Press, Cambridge,
32-43.
[20] International Monetary Fund (IMF), 2017. World Economic Outlook Database 2017. IMF,
Washington, D.C.
[21] World Economic Forum (WEF), 2016. The Global Information Technology Report 2016. WEF,
Geneva.
[22] EU, 2017. Economics of Industrial Research and Innovation, EU, Brussels. [23] Watanabe, C., Tou,
Y. and Neittaanmäki, P., 2018a. A New Paradox of the Digital Economy: Structural Sources of the
Limitation of GDP Statistics. Technology in Society 55, 9-23.
[24] Watanabe, C., Naveed, K., Tou, Y. and Neittaanmäki, P., 2018b. Measuring GDP in the Digital
Economy: Increasing Dependence on Uncaptured GDP. Technological Forecasting and Social Change
137, 226-240.
[25] Watanabe, C., Lei, S. and Ouchi, N., 2009. Fusing Indigenous Technology Development and Market
Learning for Greater Functionality Development: An Empirical Analysis of the Growth Trajectory of
Canon Printers. Technovation 29 (2), 265-283.
[26] Watanabe, C., Takayama, M., Nagamatsu, A., Tagami, T. and Griffy-Brown, C., 2002. Technology
Spillover as a Complement for High Level R&D Intensity in the Pharmaceutical Industry. Technovation
22 (4), 245-258.
[27] Watanabe, C., Naveed, K. and Zhao, W., 2015a. New Paradigm of ICT Productivity: Increasing
Role of Un-captured GDP and Growing Anger of Consumers. Technology in Society 41, 21–44
[28] Watanabe, C., Naveed, K. and Neittaanmäki, P., 2015b. Dependency on Un-captured GDP as a
Source of Resilience beyond Economic Value in Countries with Advanced ICT Infrastructure:
Similarities and Disparities between Finland and Singapore. Technology in Society 42, 104–122
.
[29] Watanabe, C., Naveed, K., Neittaanmäki, P. and Tou, Y., 2016. Operationalization of Un-captured
GDP: The Innovation Stream under New Global Mega-trends. Technology in Society 45, 58–77.
[30] Statistics Finland, (2018) “National Accounts of Finland,” Statistics Finland, Helsinki.
[31] University of Toronto, 2013. Amazon Business Model Case Study. APS1012 Management of
Innovation – Final Team Projects, Spring 2013. University of Toronto, Faculty of Applied Science and
Engineering, Toronto.
http://www.amgimanagement.com/founder/ProjectSummaries/APS1012_2013_spring_03_Amazon%
20business%20model%20case%20study.pdf (retrieved 10.01.2019).
[32] Bezos, J.P., 2013. 2013 Letter to Shareholders. Amazon.com, Inc., Seattle.
[33] Rivet, D.J., 2017. Amazon’s Superior Innovation: A Study of Amazon’s Corporate Structure, CEO,
and Reasons behind Why It has become the Most Innovative Company in Today’s Market. University of
New Hampshire Honors Theses and Capstone 343, University of New Hampshire, Durham.
https://scholars.unh.edu/honors/343 (retrieved 10.01.2019).
[34] Malczewski, B., 2011. Amazon in Overdrive: Is there More to the Overdrive – Amazon Deal than
Just the Kindle? Journal of Electronic Resources Librarianship, 23 (4), 404-408.
[35] Izogo, E.E. & Ozo, J.U., 2015. Critical Evaluation of How Well Placed Amazon is to Sustain its
Historical Online Retailing. British Journal of Marketing Studies 3 (6), 31-42.
[36] Levinson,M., 2007. Amazon’s IT Leader Leaving Huge Customer Service Infrastructure as Legacy.
CIO, 17 Oct. 2007. https://www.cio.com/article/2437865/infrastructure/amazon-com-s-it-leader-leaving-
huge-customerservice-infrastructure-as-legacy.html (retrieved 10.01.2019).
[37] Robischon, N., 2017. Why Amazon is the World’s Most Innovative Company of 2017? Fast
Company Magazine, 2 May 2017. https://www.fastcompany.com/3067455/why-amazon-is-the-worlds-
most-innovative-company-of2017 (retrieved 10.01.2019).
UPPING THE ANTE: USING RFID AS A COMPETITIVE WEAPON TO
FIGHT SHOPLIFTING AND IMPROVE BUSINESS INTELLIGENCE
David C. Wyld1
and Michael C. Budden2
1
Department of Management, Southeastern Louisiana University, Hammond, LA USA
2
Department of Marketing & Supply Chain Management, Southeastern Louisiana
University, Hammond, LA USA
ABSTRACT
This paper explores how RFID (radio frequency identification) technology can be employed to fight the
ever-growing shoplifting problem, estimated to cost the world’s retailers almost $100 billion annually.
The paper provides an overview of RFID technology. We then analyze how RFID is beginning to see
utilization in-store not just for security, but as a vehicle to improve inventory management and business
intelligence as well. This paper demonstrates that RFID is poised to usher in a whole new direction in the
fight against retail shrinkage, and we discuss what this visibility will mean for their companies, their
employees, and their customers.
KEYWORDS
Shoplifting, Retail Security, Loss Prevention, RFID (radio frequency identification) technology,
Organized Retail Crime, Business Intelligence
For More Details: http://airccse.org/journal/ijmit/1011s1.pdf
http://airccse.org/journal/ijmit/vol1.html
REFERENCES
[1] S. Howell and N. Proudlove, “A statistical investigation of inventory shrinkage in a large retail
chain,” International Review of Retail, Distribution & Consumer Research, Vol. 17, No. 2, pp. 101-120,
April 2007.
[2] R. Hollinger and L. Langton, National Retail Security Survey 2005. Gainesville, FL: University of
Florida, June 2006.
[3] E. Woyke, “Attention, shoplifters: With $30 billion in theft, there's a revolution in surveillance
systems,” Business Week, September 11, 2006. [Online]. Available:
http://www.businessweek.com/magazine/content/06_37/b4000401.htm [Accessed: June 2, 2008].
[4] M. Budden, J. Yeargain and J. Miller Jr., “Strategies for dealing with shoplifting: A managerial and
legal perspective,” American Business Review, Vol. 9, No. 1, pp. 28-41, January 1991.
[5] Jack L. Hayes International, Press release: Shoplifter and dishonest employee theft on the rise, April
6, 2008. [Online]. Available: http://www.hayesinternational.com/thft_srvys.html [Accessed: August 1,
2008].
[6] S. Dickenson, “Taking stock of shrinkage,” Home Accents Today, February 1, 2008. [Online].
Available: http://www.homeaccentstoday.com/article/CA6535521.html. [Accessed: May 15, 2008].
[7] Checkpoint Systems (2008). Press release: Loss prevention spending tied to retail shrink levels,
June 30, 2008. [Online]. Available:
http://www.checkpointsystems.com/default.aspx?page=news&idnews=284 [Accessed: July 28, 2008].
[8] B. Babin and L. Babin, “Effects of Moral Cognitions and Consumer Emotions on Shoplifting
Intentions,” Psychology & Marketing, Vol. 13, No. 8, pp. 785-802, December 1996.
[9] M. Tonglet, “Consumer misbehaviour: An exploratory study of shoplifting,” Journal of Consumer
Behaviour, Vol. 11, No. 4, pp. 336-354, November 2002.
[10] Shoplifters Alternative, “Survey reveals important information about shoplifters,” New Jersey Small
Business Development Centers, October 2001. [Online]. Available:
http://www.njsbdc.com/retail/shoplifting.php [Accessed: August 19, 2008].
[11] R.C. Hollinger, “Workplace dishonesty,” Loss Prevention, Vol. 16, No. 6, pp. 16-18, June 2007.
[12] Reuters, “Retailers face organized shoplifters, e-fencing,” CNBC.com, June 4, 2008. [Online].
Available: http://www.cnbc.com/id/24960983 [Accessed: September 1, 2008].
[13] J. Groover, “Organized crime: Retailers combat growing number of professional shoplifters,”
Shopping Centers Today, October 2006. [Online]. Available:
http://www.icsc.org/srch/sct/sct1006/index.php [Accessed: September 15, 2008].
[14] National Retail Federation, 2008 Organized Retail Crime Survey, June 2008. [Online]. Available:
http://www.nrf.com/modules.php?name=News&op=viewlive&sp_id=522 [Accessed:
July 3, 2008].
[15] J. Colapinto, “Stop, thief!: The high-tech approach to catching shoplifters,” The New Yorker,
September 1, 2008. [Online]. Available:
http://www.newyorker.com/reporting/2008/09/01/080901fa_fact_colapinto [Accessed: October
2, 2008].
[16] S.D. Scalet, “Shoplifting and organized retail crime: Mall rats,” CSO: Chief Security Officer,
February 1, 2007. [Online]. Available: http://www.csoonline.com/article/print/221140. [Accessed: April
29, 2008].
[17] A. Loten, “Retailers face threat from organized shoplifting rings: A growing number of thieves are
stealing large quantities of merchandise from warehouses and reselling online,” Inc., June 5, 2007.
[Online]. Available: http://www.inc.com/news/articles/200706/crime.html [Accessed: July 28, 2008].
[18] E. Walker, “Drug store thefts a billion-dollar business,” The Miami Herald, August 28, 2008.
[Online]. Available: http://www.miamiherald.com/news/front-page/story/661823.html
[Accessed: September 20, 2008].
[19] C. Weselby, “Merchants, law enforcement fight organized shoplifting rings,” Silicon Valley/San
Jose Business Journal, July 11, 2009. [Online]. Available:
http://sanjose.bizjournals.com/sanjose/stories/2008/07/14/story7.html [Accessed: March 10,
2009].
[20] S.J. Dubner, “Is a wave of scuppie shoplifting upon us?” The New York Times, January 15, 2009.
[Online]. Available: http://freakonomics.blogs.nytimes.com/2009/01/15/is-a-wave-of-scuppieshoplifting
upon-us/ [Accessed: June 23, 2009].
[21] S. Epps, “Shoplifting on rise in SW Florida as economic woes linger,” Naples News, June 21, 2008.
[Online]. Available: http://www.naplesnews.com/news/2008/Jun/21/shoplifting-rise-swflorida-economic
woes-linger/ [Accessed: September 5, 2008].
[22] K. Roche, “Shoplifting a matter of opportunity,” Waltham Daily News Tribune, May 25, 2008.
[Online]. Available: http://www.dailynewstribune.com/news/x1192324366/Shoplifting-a-matterof
opportunity [Accessed: January 30, 2009].
[23] M.R. Doyle, “The state of the loss prevention industry: 2007 update,” Security Info Watch, October
18, 2007. [Online]. Available: http://www.securityinfowatch.com/article/printer.jsp?id=12817 [Accessed:
August 3, 2008].
[24] S. Kapner, “Retailers want to stop growing so fast: After years of build, build, build, America's
biggest stores are deciding that it makes sense to slow growth in a slow economy,” Fortune, December 6,
2007. [Online]. Available:
http://money.cnn.com/2007/12/06/magazines/fortune/kapner_expansion.fortune/index.htm [Accessed:
June 4, 2008].
[25] J. Goodchild, “Report: Shoplifting surges in down economy,” InfoWorld, June 17, 2009. [Online].
Available: http://www.infoworld.com/t/physical-security/report-shoplifting-surges-indown-economy-963
[Accessed: September 13, 2009].
[26] C. Dugas, “More consumers, workers shoplift as economy slows,” USA Today, June 18, 2008.
[Online]. Available: http://www.usatoday.com/money/industries/retail/2008-06-18- shoplifting_N.htm
[Accessed: September 30, 2008].
[27] Preference Research, “Research report - Loss prevention spending tied to retail shrink levels,” MSN
Money Central, June 30, 2008. [Online]. Available:
http://news.moneycentral.msn.com/ticker/article.aspx?Feed=BW&Date=20080630&ID=884142
9&Symbol=US:CKP [Accessed: July 17, 2008].
[28] D.C. Wyld, “The implant solution: Why RFID is the answer in the highly unique orthopaedic supply
chain, providing ROI for suppliers and assurance for patients and their surgeons,” ID World, Issue 15,
pp. 12-15, June 2008.
[29] D.C. Wyld, “Playing a deadly game of match: How new efforts to use RFID in blood banking and
transfusion can save patient lives and safeguard the blood supply chain,” Global Identification, Issue 37,
pp. 24-26, March 2008.
[30] D.C. Wyld, “Radio frequency identification: Advanced intelligence for table games in casinos,”
Cornell Hospitality Quarterly, Vol. 49, No. 2, pp. 134-144, June 2008.
[31] D.C. Wyld, “RFID 101: The next big thing for management,” The Engineering Management
Review, Vol. 35, No. 2, pp. 3-19, May 2007.
[32] R. Wessel, “To future-proof its Future Store, Metro Group opted for EPCglobal standards: The
retailer claims that its Future Store's butcher shop uses one of the world's first full-blown EPCIS software
stacks,” RFID Journal, September 26, 2008. [Online]. Available:
http://www.rfidjournal.com/article/articleprint/4346/-1/1/ [Accessed: December 15, 2008].
[33] D.C. Wyld, RFID: The right frequency for government - A research report from The IBM Center for
the Business of Government, September 2005. [Online]. Available:
http://www.businessofgovernment.org/main/publications/grant_reports/details/index.asp?gid=23 2
[Accessed: October 3, 2005].
[34] J. Collins, “Bookstore RFID-enables its operations: One of Holland's largest booksellers has
integrated RFID into the operations of its brand-new store,” RFID Journal, April 18, 2006. [Online].
Available: http://www.rfidjournal.com/article/articleview/2273/ [Accessed: November 20, 2006].
[35] M.C. O’Connor, “Wegmans eyeing RFID for prescription management: The supermarket operator is
planning to test whether placing RFID tags on customers' prescription orders will make locating and
ringing up the orders faster and more accurate,” RFID Journal, January 10, 2008. [Online]. Available:
http://www.rfidjournal.com/article/articleview/3844/ [Accessed: May 15, 2008].
[36] C. Swedberg, “Best Buy eager to use RFID to eliminate checkout lines: The greatest obstacle to
deployment, according to Best Buy CIO Bob Willett, is the current cost of tags and readers,” RFID
Journal, June 20, 2007. [Online]. Available: http://www.rfidjournal.com/article/articleview/3422/1/1/
[Accessed: July 29, 2007].
[37] C. Swedberg, “Canadian grocery pilot finds ROI in RFID: By implementing RFID, retailers and
suppliers should markedly reduce out-of-stocks and improve promotional execution, according to a
seven-month project involving Loblaw and four of its suppliers’, RFID Journal, June 20, 2007. Retrieved
May 25, 2008, from http://www.rfidjournal.com/article/articleview/3428/1/1/.[Accessed: May 26, 2009].
[38] M.C. O’Connor, “Retailers see RFID's potential to fight shrinkage,” RFID Journal, August 15, 2008.
[Online]. Available: http://www.rfidjournal.com/article/articleprint/4265/-1/1/ [Accessed: September 18,
2008].
[39] C. Swedberg, “Raflatac releases RFID tags with built-In EAS,” RFID Journal, December 17, 2007.
[Online]. Available: http://www.rfidjournal.com/article/articleprint/3818/-1/1/ [Accessed: June 19, 2008].
40] M.C. O’Connor, “Outdoor clothing and equipment retailer tests RFID-EAS tags,” RFID Journal,
August 12, 2008. [Online]. Available: http://www.rfidjournal.com/article/view/4256/1/1/ [Accessed:
September 18, 2008].
[41] J. Patton and B.C. Hardgrave,” RFID as Electronic Article Surveillance (EAS): Feasibility
Assessment – August 2008, Information Technology Research Institute, Sam M. Walton College of
Business, University of Arkansas. Working Paper ITRI-WP117-0808. [Online]. Available:
http://itri.uark.edu/94.asp?article=666 [Accessed: April 20, 2009].
[42] M.R. Doyle, “The state of the loss prevention industry: 2009 update,” Security Info Watch,
September 11, 2009. [Online]. Available: http://www.securityinfowatch.com/Retail/the-stateloss
prevention-industry-2009-update [Accessed: October 18, 2009].
AUTHORS
David C. Wyld currently serves as the Robert Maurin Professor of
Management at Southeastern Louisiana University in Hammond, Louisiana.
He is the Director of the College of Business’ Strategic e-Commerce/e-
Government Initiative, the Founding Editor of the Journal of Strategic e-
Commerce, and a frequent contributor to both academic journals and trade
publications. He has established himself as one of the leading academic
experts on emerging applications of technology in both the public and
private sector. He has been an active consultant, a qualified expert witness,
and an invited speaker on the strategic management of technology to both
trade and academic audience
Dr. Michael Craig Budden is the Mayfield Professor of Marketing at
Southeastern Louisiana University. He has 20 years experience as an
academic administrator, including service as a dean of business for 14
years. Budden is the author of more than 150 publications, including
books on shoplifting laws and trade secrets laws. Budden's publications
have received national commendations from the Institute of Internal
Auditors, the National Association of Accountants and the Clute Institute.
He has served as a consultant to banks, health care organizations,
marketing research firms, and professional associations. He received a
Ph.D. in Marketing from the University of Arkansas.
AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE
Sitalakshmi Venkatraman
School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia,
ABSTRACT
With the recent service enhancements over the Internet, organisations are confronted with a
growing magnitude of security intrusions and attacks. Current intrusion detection strategies
have not been effective in the long term, as new and obfuscated security attacks keep
emerging evading the surveillance mechanisms. With information technology (IT) playing a
pivotal role in today’s organizational operations and value creation, security regulatory
bodies have identified this situation not solely as a technology issue, rather due to the
weakness of an organisation's risk management practices and IT governance. Hence, recent
attention has embarked on formulating proactive IT security governance for organisational
sustenance. This paper proposes an autonomic framework for IT security governance that
postulates a selflearning adaptive mechanism for an effective intrusion detection and risk
management. Such a framework would facilitate autonomic ways of integrating existing
context-dependent knowledge with new observed behaviour patterns gathered from network
as well as host for detecting unknown security attacks effectively using mobile agents. In
addition, this paper provides a roadmap for autonomic IT security governance by applying
the proposed framework The roadmap employs a continuous improvement feedback loop. for
achieving the targeted quality of service (QoS) in an organisation.
KEYWORDS
IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile
Agents
For More Details: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf
Volume Link: http://airccse.org/journal/ijmit/vol9.html
REFERENCES
[1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep.
[2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21,
p. 81.
[3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016.
[4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015.
[5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep.,
2016.
[6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016.
[7] Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of
Collaborative Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33.
[8] Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using Machine Learning for
Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy.
IEEE Computer Society, pp. 305–316.
[9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method
Based on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no.
1, p. 1.
[10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High
Confidence Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and
Pattern Recognition.
[11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs,
1(2), 1-5.
[12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App
Framework for Static and Dynamic App Analysis,” in Recent Advances in Computational
Intelligence in Defense and Security. Springer, pp. 519–552.
[13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,”
Microprocessors, vol. 32. no.2, pp. 68-72.
[14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in
Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147.
[15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In
Large-Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.
[16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier
Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475–
484.
[17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology
governance practices adoption through an institutional perspective: The perception of brazilian and
american CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455.
[18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J.
Inf. Syst., vol. 23, no. 2, pp. 223–239.
[19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and
IT Governance: An Evaluation and Call to Research Information Technology Governance and Service
Management: Frameworks and Adaptations" IGI Global. pp. 202-220.
[20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward
an integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128–
147.
[21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE
Network, vol. 29, no. 6, pp. 83–87.
[22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC.
[23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with
Investment in Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S.
De Haes (Eds.), Business Strategy and Applications in Enterprise IT Governance (pp. 37-55).
Hershey, Pennsylvania, USA: IGI Global.
[24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology",
Cham: Springer International Publishing.
[25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and
Control Foundation, 2003.
[26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt
towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the
47th
Hawaii International Conference on System Sciences (HICSS), 2014.
[27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology
on total factor productivity: A look at externalities and innovations". International Journal of Production
Economics, 158, 290-299.
[28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC
38500:2015, 2nd Edition, ISO:Switzerland.
[29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for
Economic Co-operation and Development (OECD),
[30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA.
[31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36,
no. 1, pp. 41-50.
[32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM
Systems Journal. vol. 42, no. 1, pp. 5-18.
[33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self-
healing systems in a cross-product IT environment", Proceedings of the International Conference on
Autonomic Computing), 312-313.
[34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic
computing". Computer, vol. 43, pp. 35-41.
[35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System
for Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23,
no. 12, pp. 2288-2304.
[36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative
Ubiquitous Systems”, International Journal of Autonomic Computing (IJAC) InderScience
Publishers Mai pp 263 - 279.
[37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via
Context- Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp.
1040-1058.
[38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper
Saddle River: Prentice Hall.
[39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using
Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements &
Networking. IEEE.
[40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The
2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4-
6 December, Singapore, pp. 517-520
[41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A
strategic alignment perspective". Information & Management, vol. 52, pp. 348-358.
[42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti-
Attacks in Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
AUTHORS
Sita Venkatraman is currently the Information Technology Lecturer and Discipline Leader
for Business Information Systems at the School of Engineering, Construction
& Design, Melbourne Polytechnic, Australia. She earned her PhD in
Computer Science, with a doctoral thesis titled “Efficient Parallel
Algorithms for Pattern Recognition”, from National Institute of Industrial
Engineering in 1993. In the past 25 years, Sita's work experience involves
both industry and academics - developing turnkey projects for IT industry
and teaching a variety of IT courses for tertiary institutions, in India, Singapore, New
Zealand, and more recently in Australia since 2007. Her recent research areas are
predominantly in Business Intelligence, Data Mining, Cloud Computing and Information
Security. Sita has published eight book chapters and more than 100 research papers in
internationally well-known refereed journals and conferences. She also serves as Member of
Register of Experts at Australia's Tertiary Education Quality and Standards Agency
(TEQSA).
THE IMPACT OF KNOWLEDGE MANAGEMENT ON THE FUNCTION OF EMPLOYEE
PERFORMANCE APPRAISALS IN INDUSTRIAL COMPANIES- CASE STUDYS
H. Obaidat and M. A. Otair Amman Arab University, Jordan
ABSTRACT
The study aimed at identifying the impact of knowledge management on the function of
employee performance appraisals (it is one of the most important functions of human
resources management) in Jordanian industrial public shareholding companies, relying on the
descriptive analytical approach. A questionnaire has been developed and distributed on
individuals of the study sample consisting of managers of departments and sections of human
resources in each company. The number of questionnaire retrieved and valid for statistical
analysis (294) representing (86.5%) of the distributed questionnaires. In order to analyze the
study sample, reliance was placed on descriptive statistics, represented in the arithmetic
means and standard deviations, in addition to the multiple linear regression analysis in
hypothesis testing. The study reached a number of findings, most importantly, the presence of
statistically significant impact at the level of (α=0.05) for the knowledge management
including its dimensions (knowledge generation, knowledge storage, knowledge sharing,
knowledge application) on the function of employee performance appraisals in Jordanian
industrial public shareholding companies. The study has recommended that the Jordanian
industrial public shareholding companies should follow an efficient evaluation system
capable of identifying the employees’ weaknesses.
KEYWORDS
Human resources management, Knowledge Management, Employee Performance Appraisals,
Industrial Companies
For More Details: http://aircconline.com/ijmit/V10N4/10418ijmit03.pdf
Volume Link : http://airccse.org/journal/ijmit/vol10.html
REFERENCES
[1] Aishoush, R. (2009). “Knowledge Management and Strategy in Business Organizations”. Unpublished
PhD dissertation, Mohammed Khaydar University, Biskra, Algeria.
[2] Al-Deeb E. (2010). Knowledge Management, Cairo, Egypt: The Arab Open Academy.
[3] Al-kbaisi, S. (2011). Knowledge Management, Cairo-Egypt, Arab Organization for
Administrative Development.
[4] Al-Mudallal, A. (2012). “The application of knowledge management in Palestinian governmental
institutions and their impact on the level of performance”. Unpublished M.Sc. Thesis, Islamic University,
Palestine.
[5] Al-Salem, M. and Saleh, A. (2003). Human Resource Management Strategic Approach.
Amman Jordan, World of Modern Books for Publishing and Distribution.
[6] Altaweel, A. and Rasheed, H. (2005). “The Impact of Information Technology on Knowledge
Management Processes”. Future Research Journal. Iraq, Issue 10.
[7] Al-Yaseri, A. and Hussien, D. (2012). “The Impact of Knowledge Management and Organizational
Learning Processes on Strategic Performance An exploratory study of the views of a sample of administrative
leaders at the universities of the Middle Euphrates”. Iraq, Qadisiyah Journal of Administrative and
Economic Sciences, Vol (14), Issue (1).
[8] Al-zyadat, M. (2008). “Contemporary Trends in Knowledge Management”, 1st Edition,
AmmanJordan, Dar Al Safa for Publishing and Distribution.
[9] Bukowitz, W. and Williams, R. (2000), The Knowledge Management Fieldbook, London:
Prentice Hall
[10] Darwazeh, S. (2008). “The Relationship between Knowledge Management Requirements and Processes
and their Impact on the Performance Excellence of Organizations”. Unpublished PhD Thesis. Jordan,
Middle East University.
[11] Grover, V., and Davenport, T. (2001). General Perspectives on Knowledge Management.
Journal of Management Information System, vol. 18, No. (1), pp. 5-21.
[12] Hmoud, K. (2010). Knowledge Organization, 1st Edition, Amman-Jordan, Al-Ahliyyah for
Publishing & Distribution.
[13] Nickols, F. (2000). "Knowledge in Knowledge Management." Knowledge Management
Yearbook, Butterworth-Heinemann: Boston.
[14] Rollett, H. (2003), Knowledge management processes and technologies, Kluwer, Norwell.
[15] Sakeenah, M. and Abu Sin, A. (2013). “Analysis of the reality of human resources strategy and its
impact on performance in Sudanese telecommunications companies: Case Study of Sudan Telecom Company
Limited”. Journal of Economic Sciences, Vol. 14, Issue 1.
[16] Sekaran, U. (2003) “Research Methods for Business: A Skill-Building Approach”. 4th Edition, John
Wiley & Sons, New York.
[17] Uriarte, A. (2008). Introduction to Knowledge Management, Jakarta, Indonesia: Asean
Foundation.
[18] Wiig, K. (1993). Knowledge management foundations: thinking about thinking. How
people and organizations create, represent and use knowledge. Arlington, TX: Schema Press.
[19] Wilkesmann, U., Wilkesmann, M., and Virgillito, A. (2007). Requirements for Knowledge
Transfer in Hospitals How Can Knowledge Transfer be Supported in Hospitals?. Discussion
papers des.
[20] Zweilef, M. (2001). Human Resource Management, Amman-Jordan, Dar AlFiker for
printing, publishing and distribution
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY
POLICY IN BANGLADESH - HYPE OR REALITY?
AKM Bahalul Haque
Depart of Electrical and Computer Engineering North South University, Dhaka, Bangladesh
ABSTRACT
Cyber security is one of the burning issues in modern world. Increased IT infrastructure has
given rise to enormous chances of security breach. Bangladesh being a relatively new
member of cyber security arena has its own demand and appeal. Digitalization is happening
in Bangladesh for last few years at an appreciable rate. People are being connected to the
worldwide web community with their smart devices. These devices have their own
vulnerability issues as well as the data shared over the internet has a very good chances of
getting breached. Common vulnerability issues like infecting the device with malware,
Trojan, virus are on the rise. Moreover, a lack of proper cyber security policy and strategy
might make the existing situation at the vulnerable edge of tipping point. Hence the
upcoming new infrastructures will be at a greater risk if the issues are not dealt with at an
early age. In this paper common vulnerability issues including their recent attacks on cyber
space of Bangladesh, cyber security strategy and need for data privacy policy is discussed
and analysed briefly.
KEYWORDS
CyberSecurity, Cyberdefence, Security Policy, Vulnerability, Cyber Threat, SecurityStrategy
For More Details: http://aircconline.com/ijmit/V11N1/11119ijmit03.pdf
Volume Link : http://airccse.org/journal/ijmit/vol11.html
REFERENCES
[1] “Internet Subscribers in Bangladesh December, 2018. | BTRC.” [Online]. Available:
http://www.btrc.gov.bd/content/internet-subscribers-bangladesh-december-2018.[Accessed: 25-
Nov2018].
[2] C. Team, “Common Vulnerabilities in Cyber Space of Bangladesh,” BGD e-GOV CIRT |
Bangladesh e-Government Computer Incident Response Team.
[3] “Cyber warfare: Our Achilles’ heel?,” Dhaka Tribune, 17-Dec-2017. [Online]. Available:
https://www.dhakatribune.com/opinion/op-ed/2017/12/17/cyber-warfare-achilles-heel/. [Accessed: 23-
Nov-2019].
[4] B. Dickson, “What is blockchain?,” TechTalks, 07-Sep-2016. [Online]. Available:
https://bdtechtalks.com/2016/09/07/what-is-blockchain/. [Accessed: 3-Jan-2019].
[5] B. Dickson, “How blockchain can improve cybersecurity,” TechTalks, 11-Jan-2017. [Online].
Available: https://bdtechtalks.com/2017/01/11/how-blockchain-can-improve-cybersecurity/. [Accessed:
3-Dec-2019].
[6] “How blockchain can help fight cyber attacks | TechCrunch.” [Online]. Available:
https://techcrunch.com/2016/12/05/how-blockchain-can-help-fight-cyberattacks/. [Accessed: 3-Jan
2019].
[7] “What is Blockchain Technology? A Step-by-Step Guide For Beginners.” [Online]. Available:
https://blockgeeks.com/guides/what-is-blockchain-technology/. [Accessed: 23-Jan-2019].
[8] “National Cyber Security Strategy”, ICT Division, Govt. of People’s Republic of Bangladesh.
Available: http://www.dpp.gov.bd/upload_file/gazettes/10041_41196.pdf . [Accessed: 2-Jan-2019]
[9] “Personal Data,” General Data Protection Regulation (GDPR).
[10] “GDPR Personal Data and Sensitive Personal Data.” [Online]. Available:
https://www.burgessalmon.com:443/news-and-insight/legal-updates/gdpr-personal-data-and-sensitive-
personal-data/.[Accessed: 10-Jan-2019].
[11] “Digital Security Act” Act No 46 of the Year 2018, Govt. of People republic of Bangladesh.
Available: https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018-
Englishversion.pdf . [Accessed: 20-Dec-2019].
[12] “Official Secrets Act, 1923 (Act No. XIX of 1923).” [Online]. Available:
http://bdlaws.minlaw.gov.bd/pdf_part.php?id=132. [Accessed: 23-Nov-2019].
[13] “General Data Protection Regulation (GDPR) – Final text neatly arranged,” General Data
Protection Regulation (GDPR). [Online]. Available: https://gdpr-info.eu/. [Accessed: 20-Dec-2019].
[14] “(Haque, A K M Bahalul. (2019).Big-Brother-In-1984-The-Modern-Era-Surveillance. International
Journal of Scientific & Technology Research. 8. 186-190.
[15] “BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team |.”
[Online].Available: https://www.cirt.gov.bd /. [Accessed: 05-Feb-2019].
AUTHORS
AKM Bahalul Haque is currently working a Lecturer of Department of ECE, North South
University, Bashundhara, and Dhaka 1229. He has achieved is M.Sc. In
Information Technology from Fachhochschule Kiel, Germany, 2018. He
achieved his Bachelor of Science (Engineering) in Computer Science and
telecommunication engineering in 2014. Has published two of his papers
in International Journal. He specializes in Cyber Security, Cloud
Computing, Data Privacy and protection. He has one-year experience as
Security Engineer and one-year experience as Vulnerability Detection
Consultant in Cyber Security Division.
CO-EVOLUTION BETWEEN CCC-DRIVEN CASH FLOW
MANAGEMENT AND TRANSFORMATION OF R&D – AMAZON’S
ENDEAVOR
Yuji Tou1
, Chihiro Watanabe 2,3
, Pekka Neittaanmäki2
, 1
Tokyo Institute of Technology, Japan,
2
University of Jyväskylä, Finland and 3
International Institute for Applied Systems Analysis
(IIASA), Austria
ABSTRACT
Amazon became the world R&D leader in 2017 by rapidly increasing R&D investment. The
company’s extremely large amount of R&D funds is the result of an ample free cash flow
generated by sophisticated cash conversion cycle (CCC) management. Increased R&D induced
business advancement and lean cost structure construction leading to further increase in cash
flow which has stimulated interaction between vendors, customers, and Amazon via the Amazon
marketplace. Activated interaction accelerated CCC advancement, a subsequent free cash flow
increase, and user-driven innovation, thus accelerated the transformation of routine and periodic
alteration activities into significant improvement simultaneously. All of these components
function together as a consolidated sophisticated machine.
In light of the increasing concern to R&D resources development without the dilemma of a
productivity decline that most digital economies are now confronting, this paper demonstrated
the above hypothetical view.
An intensive empirical analysis focusing on the development trajectory of Amazon’s techno-
financing system over a period from 1997 to 2018 was conducted.
An insightful suggestion to neo open innovation that fuses financing management and R&D
management was thus provided
KEYWORDS
R&D, Transformation, Cash flow management, Cash conversion cycle, Amazon
FULL TEXT: http://aircconline.com/ijmit/V11N3/11319ijmit01.pdf
ABSTRACT URL: http://aircconline.com/abstract/ijmit/v11n3/11319ijmit01.html
REFERENCES
[1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018. Neo Open Innovation in the Digital
Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information
Technology 10 (4), 53-75.
[2] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2019b. Harnessing Soft Innovation
Resources Leads to Neo Open Innovation. Technology in Society, in print.
[3] Tou, Y., Watanabe, C., Moriya, K., Vurpillat, V., & Neittaanmäki, P., 2019a. A New Concept of
R&D in Neo Open Innovation: Transformation of R&D Triggered by Amazon. International Journal of
Managing Information Technology 11 (1) 17-35.
[4] Tou, Y., Watanabe, C., Moriya, K., Naveed, N., Vurpillat, V., & Neittaanmäki, P., 2019c. The
Transformation of R&D into Neo Open Innovation: A New Concept of R&D Endeavor Triggered by
Amazon. Technology in Society 47, in print.
[5] Price, R., 2013. Cash Flow at Amazon.Com. Accounting Education 28 (2), 353-374.
[6] Fox, J., 2014. At Amazon, It’s All About Cash Flow. Finance & Accounting, 20 Oct. 2014.
https://hbr.org/resources/images/article_assets/2014/10/inadifferentleague.png (retrieved 26.06.2019).
[7] Naruge, M., 2018. Amazon, The World Top Strategy. Diamond Co., Tokyo.
[8] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B,
Ed. The Global Internet Economy. MIT Press, Massachusetts.
[9] Knott, A.M., 2017. How Innovation Really Works: Using the Trillion-Dollar R&D fix to Drive
Growth. McGraw Hill, New York.
[10] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random
House LLC, New York.
[11] Watanabe, C. & Tou, Y., 2019. Transformative Direction of R&D: Lessons from Amazon’s
Endeavor. Technovation, in print.
[12] Amazon, 2018. Amazon.Com. Inc. Annual Report 2017. Amazon.Com, Inc., Seattle.
http://www.annualreports.com/Company/amazoncom-inc (retrieved 06.01.2019).
[13] Amazon, 2019a. Amazon.Com. Inc. Annual Report 2018. Amazon.Com, Inc., Seattle.
https://ir.aboutamazon.com/static-files/0f9e36b1-7e1e-4b52-be17-145dc9d8b5ec(retrieved 02.07.2019).
[14] Bloomberg, 2018. 2018 Global Innovation 1000 Study. Bloomberg, New York.
[15] Bezos, J.P., 2005. 2004 Letter to Shareholders. Amazon.com, Inc., Seattle.
[16] Amazon, 2019b. Amazon.com, Inc,, Income Statement. Amazon.Com. Inc., Seattle.
https://fairlyvalued.com/company/AMZN (retrieved 02.07.2019).
[17] Panigrahi, A.K., 2013. Cash Conversion Cycle and Firms’ Profitability. International Journal of
Current Research 6, 1484-1488.
[18] Zakari, M. and Saidu, S., 2016. The Impact of Cash Conversion Cycle on Firm Profittability:
Evidence from Nigerian Listed Telecommunication Companies. Journal of Finance and Accounting 4
(6), 342-350.
[19] Zeidan, R. and Shapir, O.M., 2017. Cash Conversion Cycle and Value-enhancing Operations:
Theory and Evidence for a Free Lunch. Journal of Corporate Finance 45, 203-219.
[20] Uenlue, M., 2018. Amazon Business Model: Three Customer Value Propositions. Innovation
Tactics, 22 August 2018. https://www.innovationtactics.com/amazon-business-model-part-2/(retrieved
10.06.2019).
[21] Watanabe, C. and Tou, Y., 2003. An Empirical Analysis on the R&D Investment Inducing System
in Japanese-style Management. Research Policy and Technology Management 16 (3/4), 184- 202.
[22] Bloch, C., 2005. R&D Investment and Internal Finance: The Cash Flow Effect. Economics of
Innovation and New Technology, 14 (3), 213-223.
[23] Hong, A., Bhattacharyya, D. and Geis, G.T., 2013. The Role of M&A in Market Convergence:
Amazon, Apple, Google and Microsoft. Global Economy and Finance Journal 6 (1), 53
Top 10 ICT Articles in Construction Management

More Related Content

What's hot

University and industry interactions for a smarter planet 20110830 v4
University and industry interactions for a smarter planet 20110830 v4University and industry interactions for a smarter planet 20110830 v4
University and industry interactions for a smarter planet 20110830 v4ISSIP
 
Industry 4.0 trg 2014
Industry 4.0 trg 2014Industry 4.0 trg 2014
Industry 4.0 trg 2014Jayesh Pai
 
Trends in datamining in 2020
Trends in datamining in 2020Trends in datamining in 2020
Trends in datamining in 2020IJDKP
 
Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technologydannyijwest
 
The european proceedings of social and behavioural scien
The european proceedings of social and behavioural scienThe european proceedings of social and behavioural scien
The european proceedings of social and behavioural scienrock73
 
Asia Rising Industrial dynamism barometer - Engineering Services
Asia Rising Industrial dynamism barometer - Engineering ServicesAsia Rising Industrial dynamism barometer - Engineering Services
Asia Rising Industrial dynamism barometer - Engineering ServicesThe Economist Media Businesses
 
Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3ISSIP
 
Service science intro 20110606 v1
Service science intro 20110606 v1Service science intro 20110606 v1
Service science intro 20110606 v1ISSIP
 
City ecosystems 20110711 v1
City ecosystems 20110711 v1City ecosystems 20110711 v1
City ecosystems 20110711 v1ISSIP
 
Open Source as IT and Business Strategy
Open Source as IT and Business StrategyOpen Source as IT and Business Strategy
Open Source as IT and Business StrategyKarim Baïna
 
20210325 jim spohrer sir rel future_ai v10 copy
20210325 jim spohrer sir rel future_ai v10 copy20210325 jim spohrer sir rel future_ai v10 copy
20210325 jim spohrer sir rel future_ai v10 copyISSIP
 
Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...
Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...
Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...BEYOND4.0
 
Spohrer and Maglio Yorktown 20061020 v2
Spohrer and Maglio Yorktown 20061020 v2Spohrer and Maglio Yorktown 20061020 v2
Spohrer and Maglio Yorktown 20061020 v2ISSIP
 
Introduction to 4th Industrial Revolution
Introduction to 4th Industrial RevolutionIntroduction to 4th Industrial Revolution
Introduction to 4th Industrial RevolutionRedwan Ferdous
 
Holistic service engineering 20110915 v1
Holistic service engineering 20110915 v1Holistic service engineering 20110915 v1
Holistic service engineering 20110915 v1ISSIP
 
Cisco service innovation 20110418 v2
Cisco service innovation 20110418 v2Cisco service innovation 20110418 v2
Cisco service innovation 20110418 v2ISSIP
 
Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020
Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020
Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020BEYOND4.0
 
Making the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureMaking the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureinnovationoecd
 
Srii spohrer education panel 20110331 v3
Srii spohrer education panel 20110331 v3Srii spohrer education panel 20110331 v3
Srii spohrer education panel 20110331 v3ISSIP
 

What's hot (20)

University and industry interactions for a smarter planet 20110830 v4
University and industry interactions for a smarter planet 20110830 v4University and industry interactions for a smarter planet 20110830 v4
University and industry interactions for a smarter planet 20110830 v4
 
Industry 4.0 trg 2014
Industry 4.0 trg 2014Industry 4.0 trg 2014
Industry 4.0 trg 2014
 
Trends in datamining in 2020
Trends in datamining in 2020Trends in datamining in 2020
Trends in datamining in 2020
 
Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technology
 
The european proceedings of social and behavioural scien
The european proceedings of social and behavioural scienThe european proceedings of social and behavioural scien
The european proceedings of social and behavioural scien
 
Asia Rising Industrial dynamism barometer - Engineering Services
Asia Rising Industrial dynamism barometer - Engineering ServicesAsia Rising Industrial dynamism barometer - Engineering Services
Asia Rising Industrial dynamism barometer - Engineering Services
 
Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3Ijcss taiwan 20110526 v3
Ijcss taiwan 20110526 v3
 
Service science intro 20110606 v1
Service science intro 20110606 v1Service science intro 20110606 v1
Service science intro 20110606 v1
 
City ecosystems 20110711 v1
City ecosystems 20110711 v1City ecosystems 20110711 v1
City ecosystems 20110711 v1
 
Open Source as IT and Business Strategy
Open Source as IT and Business StrategyOpen Source as IT and Business Strategy
Open Source as IT and Business Strategy
 
20210325 jim spohrer sir rel future_ai v10 copy
20210325 jim spohrer sir rel future_ai v10 copy20210325 jim spohrer sir rel future_ai v10 copy
20210325 jim spohrer sir rel future_ai v10 copy
 
Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...
Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...
Inapp cirillo fanti_mina_ricci_digital_technologies_and_firm_performance_indu...
 
20320140503042 2
20320140503042 220320140503042 2
20320140503042 2
 
Spohrer and Maglio Yorktown 20061020 v2
Spohrer and Maglio Yorktown 20061020 v2Spohrer and Maglio Yorktown 20061020 v2
Spohrer and Maglio Yorktown 20061020 v2
 
Introduction to 4th Industrial Revolution
Introduction to 4th Industrial RevolutionIntroduction to 4th Industrial Revolution
Introduction to 4th Industrial Revolution
 
Holistic service engineering 20110915 v1
Holistic service engineering 20110915 v1Holistic service engineering 20110915 v1
Holistic service engineering 20110915 v1
 
Cisco service innovation 20110418 v2
Cisco service innovation 20110418 v2Cisco service innovation 20110418 v2
Cisco service innovation 20110418 v2
 
Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020
Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020
Wp inapp cirillo_fanti_mina_ricci_digitizing_firms_wp_53_2020
 
Making the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secureMaking the next production revolution inclusive open and secure
Making the next production revolution inclusive open and secure
 
Srii spohrer education panel 20110331 v3
Srii spohrer education panel 20110331 v3Srii spohrer education panel 20110331 v3
Srii spohrer education panel 20110331 v3
 

Similar to Top 10 ICT Articles in Construction Management

Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...IJMIT JOURNAL
 
Top 10 Cited Articles - International Journal of Managing Information Technol...
Top 10 Cited Articles - International Journal of Managing Information Technol...Top 10 Cited Articles - International Journal of Managing Information Technol...
Top 10 Cited Articles - International Journal of Managing Information Technol...IJMIT JOURNAL
 
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONA REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
 
Top Read Articles in May 2020 - International Journal of Managing Information...
Top Read Articles in May 2020 - International Journal of Managing Information...Top Read Articles in May 2020 - International Journal of Managing Information...
Top Read Articles in May 2020 - International Journal of Managing Information...IJMIT JOURNAL
 
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHYDEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHYIJMIT JOURNAL
 
Insight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice ChallengesInsight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice Challengesijtsrd
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendIJERA Editor
 
Mechanical Engineers in Corporate world
Mechanical Engineers in Corporate worldMechanical Engineers in Corporate world
Mechanical Engineers in Corporate worldvivatechijri
 
December 2022: Top 10 Read Articles in Web & Semantic Technology
December 2022: Top 10  Read Articles in Web & Semantic TechnologyDecember 2022: Top 10  Read Articles in Web & Semantic Technology
December 2022: Top 10 Read Articles in Web & Semantic Technologydannyijwest
 
Applications of IoT in Manufacturing
Applications of IoT in ManufacturingApplications of IoT in Manufacturing
Applications of IoT in Manufacturingijtsrd
 
New research articles 2020 august issue- international journal of computer ...
New research articles   2020 august issue- international journal of computer ...New research articles   2020 august issue- international journal of computer ...
New research articles 2020 august issue- international journal of computer ...AIRCC Publishing Corporation
 
Journal of Architectural Environment & Structural Engineering Research | Vol....
Journal of Architectural Environment & Structural Engineering Research | Vol....Journal of Architectural Environment & Structural Engineering Research | Vol....
Journal of Architectural Environment & Structural Engineering Research | Vol....Bilingual Publishing Group
 
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...Victor van R
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
 
A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...
A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...
A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...Renee Lewis
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technologyKHakash
 
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...IJMIT JOURNAL
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challengesbaddi youssef
 
A Brief Study on IoT Applications
A Brief Study on IoT ApplicationsA Brief Study on IoT Applications
A Brief Study on IoT Applicationsijtsrd
 

Similar to Top 10 ICT Articles in Construction Management (20)

Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...Top downloaded papers - International Journal of Managing Information Technol...
Top downloaded papers - International Journal of Managing Information Technol...
 
Top 10 Cited Articles - International Journal of Managing Information Technol...
Top 10 Cited Articles - International Journal of Managing Information Technol...Top 10 Cited Articles - International Journal of Managing Information Technol...
Top 10 Cited Articles - International Journal of Managing Information Technol...
 
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONA REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION
 
Top Read Articles in May 2020 - International Journal of Managing Information...
Top Read Articles in May 2020 - International Journal of Managing Information...Top Read Articles in May 2020 - International Journal of Managing Information...
Top Read Articles in May 2020 - International Journal of Managing Information...
 
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHYDEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY
 
Insight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice ChallengesInsight into IoT Applications and Common Practice Challenges
Insight into IoT Applications and Common Practice Challenges
 
Future Internet: Challenge And Research Trend
Future Internet: Challenge And Research TrendFuture Internet: Challenge And Research Trend
Future Internet: Challenge And Research Trend
 
Mechanical Engineers in Corporate world
Mechanical Engineers in Corporate worldMechanical Engineers in Corporate world
Mechanical Engineers in Corporate world
 
ICT L1 .pptx
ICT L1  .pptxICT L1  .pptx
ICT L1 .pptx
 
December 2022: Top 10 Read Articles in Web & Semantic Technology
December 2022: Top 10  Read Articles in Web & Semantic TechnologyDecember 2022: Top 10  Read Articles in Web & Semantic Technology
December 2022: Top 10 Read Articles in Web & Semantic Technology
 
Applications of IoT in Manufacturing
Applications of IoT in ManufacturingApplications of IoT in Manufacturing
Applications of IoT in Manufacturing
 
New research articles 2020 august issue- international journal of computer ...
New research articles   2020 august issue- international journal of computer ...New research articles   2020 august issue- international journal of computer ...
New research articles 2020 august issue- international journal of computer ...
 
Journal of Architectural Environment & Structural Engineering Research | Vol....
Journal of Architectural Environment & Structural Engineering Research | Vol....Journal of Architectural Environment & Structural Engineering Research | Vol....
Journal of Architectural Environment & Structural Engineering Research | Vol....
 
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...
A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...
A SURVEY ON THE USE AND IMPACT OF INFORMATION TECHNOLOGY IN QUANTITY SURVEYIN...
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
 
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
MOST VIEWED ARTICLE (CURRENT ISSUE) IN ACADEMIA - INTERNATIONAL JOURNAL OF MA...
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
A Brief Study on IoT Applications
A Brief Study on IoT ApplicationsA Brief Study on IoT Applications
A Brief Study on IoT Applications
 

More from IJMIT JOURNAL

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
 

More from IJMIT JOURNAL (20)

MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
15223ijmit02.pdf
15223ijmit02.pdf15223ijmit02.pdf
15223ijmit02.pdf
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
 
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODEFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD
 
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedInternational Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
International Journal of Managing Information Technology (IJMIT) ** WJCI Indexed
 
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)
 
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUETRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE
 
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...
 
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGBUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERING
 
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONNETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...
 
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMDEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEM
 
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 

Top 10 ICT Articles in Construction Management

  • 1. TOP 10 READ/CITED ARTICLES OF THE MONTH OCTOBER 2020 INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT) http://airccse.org/journal/ijmit/ijmit.html ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
  • 2. DEFINING ICT IN A BOUNDARY LESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY Colrain M. Zuppo Marion Technical College (MTC) ABSTRACT Subsequent to rapid information and communication technology development, the scope of the definition of Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts including economic development, education, IT, business and personal usage. A review of academic literature, trade publications and general information was undertaken to establish a hierarchy of applications for the term ICT or ICTs. KEYWORDS ICT, ICTs, education, economics, digital communication, hierarchy For More Details: http://airccse.org/journal/ijmit/papers/4312ijmit02.pdf Volume URL: http://airccse.org/journal/ijmit/vol4.html
  • 3. REFERENCES [1] International Telecommunication Union. (2007). Measuring village ICT in sub-Saharan Africa. Retrieved from http://www.itu.int/ITU-D/ict/statistics/material/Africa_Village_ICT_2007.pdf. [2] United Nations University. (2010). Greater Access to Cell Phones than Toilets in India. Retrieved from http://www.inweh.unu.edu/News/2010-04_UNU-INWEH_News-Release_Sanitation.pdf . [3] International Telecommunication Union. (n.d.). Who we are. Retrieved,from http://www.itu.int/en/about/Pages/default.aspx. [4] World Health Organization. (2011). 2011-last update: Information and communication technologies for public health emergency management. Retrieved from http://www.who.int/csr/ict4phem/en/index.html [5] World Health Organization. (2006). Health aspects of disaster preparedness and response: Report from a regional meeting of countries of South East Asia, Bangkok, Thailand, 21-23 November 2005. Prehospital & Disaster Medicine, 21(5), 62-78. [6] Yang, C., Yang, J., Luo, X., and Gong, P. (2009). Use of mobile phones in an emergency reporting system for infectious disease surveillance after the Sichuan earthquake in China. Bulletin of the World Health Organization, 87(8), 619-623. [7] Organisation for Co-operation and Development (OECD). (2002). Retrieved from http://www.oecd.org/dataoecd/63/60/1933354.pdf. [8] Angeleski, M., Mitrevski, P., and Janeska, M. (2009). “Composite index of e-business strategy readiness of the enterprises in the Republic of Macedonia” in ICT Innovations 2009, Davcev, D., and Marx Gomex, J., (Eds.), p. 265-275. Springer-Verlag Berlin Heidelberg, Scientific Publishing Services Pvt. Ltd. [9] Cohen, D., Garibaldi, P., and Scarpetta, S., (Eds.). (2004). The ICT Revolution: Productivity, Differences and the Digital Divide. Oxford University Press, University of Oxford. [10] Educational Testing Service. (2007). Digital transformation: A framework for ICT literacy. A report of the International ICT Literacy Panel. Retrieved from http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pd f. [11] Jarnieson-Proctor, R., Watson, G., Finger, G., Grimbeek, P., & Burnett, P. C. (2007). Measuring the use of Information and Communication Technologies (ICTs) in the classroom. Computers in the Schools, 24(1/2), 167-184. doi:10.1300/J025v24n01̱11. [12] Clark, L., Demont-Heinrich, C., & Webber, S. (2005). Parents, ICTs, and children's prospects for success: Interviews along the digital “Access Rainbow”. Critical Studies in Media Communication, 22(5), 409-426. doi:10.1080/07393180500342985. [13] Selwin, N., Gorard, S., & Furlong, J. (2006). Adult learning in the digital age: Information technology and the learning society. Routledge, Taylor & Francis Group. [14] Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes in ICT acceptance and use. International Journal of Human Interaction, 24(7), 628-648. doi: 10.1080/10447310802335482. [15] Information Technology Infrastructure Library [ITIL]. (n.d.). ITIL glossaries. Retrieved from http://www.itil-officialsite.com/InternationalActivities/ITILGlossaries_2.aspx. [16] TechTerms.com. (n.d.). Definition of ICT. Retrieved from http://www.techterms.com/definition/ict.
  • 4. [17] Innovation Value Institute at National University of Ireland Maynooth. (n.d.). IVI and CEPIS develop European Framework for ICT Professionalism. Retrieved from http://ivi.nuim.ie/news- events/ivi-andcepis-develop-european-framework-ict-professionalism [18] Institute of IT Professionals, New Zealand. (n.d.). ITCP – IT Certified Professional. Retrieved from http://www.itcp.org.nz/about [19] Professional Standards Board, Australian Computer Society. (2012.). The ICT professional body of knowledge. Retrieved from http://www.acs.org.au/__data/assets/pdf_file/0007/7792/The-ICTProfession- Body-of-Knowledge-July-2012.pdf [20] Galperin, H., and Mariscal, J. (2007). Digital Poverty: Latin American and Caribbean Perspectives. International Development Research Centre, Intermediate Technology Publications Ltd. [21] National Geographic News. (2005). The deadliest tsumani in history? Retrieved from http://news.nationalgeographic.com/news/2004/12/1227_041226_tsunami.html. [22] The Telegraph. (2011). Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review. Retrieved from http://www.telegraph.co.uk/news/worldnews/asia/japan/8953574/Japan-earthquaketsunami-and-Fukushima- nuclear-disaster-2011-review.html. AUTHOR Colrain M. Zuppo earned a PhD in Technology Management from Indiana State University with a specialization in Human Resource Development and Industrial Training. Cori’s dissertation research was entitled “Organizations as consumers of human capital via technology: A policy study of information and communication technologies”. Cori also holds an M.A.Ed. from The George Washington University and a B.S. in Conflict Resolution from Ohio University. Cori is a Professor in the Department of Business and Information Technology at Marion Technical College (MTC) and served as part time faculty and doctoral fellow at Bowling Green State University, conducting research and teaching in the areas of technology management, academic research and instructional design & delivery.
  • 5. A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION Ehab J.Adwan1 and Ali Al-Soufi2 1&2 Department of Information Systems, University of Bahrain, Kingdom of Bahrain ABSTRACT A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would mitigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction. KEYWORDS Construction industry, Information, Technology, Ict, Construction Tasks, Article review. FOR MORE DETAILS: http://aircconline.com/ijmit/V8N4/8416ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol8.html
  • 6. REFERENCES [1] C. Carter, T. Hassan, and M. Merz, “The eLegal project: specifying legal terms of contract in ICT environment”, International Journal of Information technology in Construction, 6, 136. 2001. [2] M. Sarshar, U. Isikdag, “A survey of ICT use in the Turkish construction industry”, in Engineering, Construction and Architectural Management, 2004, 11(4), 238-247. [3] A.Andrews, J. H. Rankin, and L. M. Waugh, “A framework to identify opportunities for ICT support when implementing sustainable design standards”. Journal of Information technology in Construction, 11, 2006, 17-33. [4] Y. Rezgui, A. Zarli, and C. J. Hopfe, “Editorial-Building Information Modeling Applications, Challenges and Future Directions”, Journal of Information Technology in Construction, 14, 613-616. 2009. [5] B. Erdogan, C. Abbott, and G. Aouad, “Construction in year 2030: developing an information technology vision,” in Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 368(1924), 3551-3565. 2010. [6] A. Sextos, “ICT applications for new generation seismic design, construction and assessment of bridges.” Structural Engineering International, 24(2), 173-183. 2014. [7] E. O. Ibem and S. Laryea, “Survey of digital technologies in procurement of construction projects”, Automation in Construction, 46, 11-21. 2014. [8] M. Martínez-Rojas, N. Marin, and M.A. Vila, “The role of information technologies to address data handling in construction project management.” Journal of Computing in Civil Engineering, 04015064. 2015. [9] R.Amor, M. Betts, G. Coetzee, and M. Sexton. “Information technology for construction: recent International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 19 work and future directions”, 7(16), 245-258. 2002. [10] Y.S. Ampofo, B. Bizimana, J. Mbuthi, I. Ndayambaje, N. Ogetta, and A.J. Orodho, “Information Communication Technology Penetration and its Impact on Education: Lessons of Experience from Selected African Countries of Ghana, Kenya and Rwanda“, Journal of Information Engineering and Applications, 4 (11), pp.84-95. 2014. [11] N. Mutesi, “Application of ICT in the Construction Industry in Kampala” in Advances in Engineering and Technology: Contribution of Scientific Research in Development: Proceedings of the Second International Conference on Advances in Engineering and Technology, Kampala. Makrere University.Tanzania. 2009. [12] B. Bjork, “A framework for discussing information technology applications in construction” in CIB Working Commission W78 workshop." Information Technology Support for Construction Process Re- engineering", Cairns, Australia, 1997. [13] W. El-Ghandour and M. Al-Hussein. “Survey of information technology applications in construction”, Construction innovation, 4(2), 83-98. 2004. [14] J.M. Doherty. “A survey of computer use in the New Zealand building and construction industry”. Electronic Journal of Information technology in Construction, Vol 2, 1-13. 1997. [15] C. L. Perkinson and I. U. Ahmad. “Computing Technology Usage in Construction Contractor Organizations.” In Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET’2006), Breaking Frontiers and Barriers in Engineering: Education, Research and Practice, 2006. [16] H. J. Chien and S. Barthorpe. “The current state of information and communication technology usage by small and medium Taiwanese construction companies”. Journal of Information Technology in Construction, 15(5), 75-85. 2010.
  • 7. [17] M. Jacobsson and H. Linderoth. “The influence of contextual elements, actors’ frames of reference, and technology on the adoption and use of ICT in construction projects: a Swedish case study”. Construction Management and Economics, 28(1), 13-23. 2010. [18] T. M. Hassan and R. McCaffer. “Vision of the large scale engineering construction industry in Europe”. Automation in construction, 11(4), 421-437. 2002. [19] V. Peansupap and D. Walker. “Factors affecting ICT diffusion: A case study of three large Australian construction contractors”. Engineering, Construction and Architectural Management, 12(1), 21-37. 2005. [20] Oladapo, A. A. “An investigation into the use of ICT in the Nigerian construction industry”. Journal of Information Technology in Construction, 12(18), 261–277. 2007. [21] P. T. Lam, F. W. Wong, and K. T. Tse,. “Effectiveness of ICT for construction information exchange among multidisciplinary project teams”. Journal of Computing in Civil Engineering, 24(4), 365-376. 2009 [22] R. Jardim-Goncalves and A. Grilo. “SOA4BIM: Putting the building and construction industry in the Single European Information Space”. Automation in Construction, 19(4), 388-397. 2010. [23] E.K. Zavadskas and A. Kaklauskas. “Advanced information and communication technologies in construction”. in The 25th International Symposium on Automation and Robotics in Construction ISARC–2008, 2008, 39–45. [24] S. Alkalbani, Y. Rezgui, C. Vorakulpipat, and I.E. Wilson. “ICT adoption and diffusion in the construction industry of a developing economy: The case of the sultanate of Oman.” Architectural Engineering and Design Management, 9(1), 62-75. 2013. [25] R. Davies, and C. Harty. “Measurement and exploration of individual beliefs about the consequences of building information modelling use.” Construction Management and Economics, 31(11), 1110- 1127. 2013. [26] H. Penttilä. “Describing the changes in architectural information technology to understand design complexity and free-form architectural expression”. Journal of Information Technology, 19(29), 395- 408. 2006. [27] P.A. Jensen, P. A. and E.I. Jóhannesson. “Building Information Modelling in Denmark and Iceland. Engineering”, Construction and Architectural Management, 20(1), 99-110. 2013. [28] M. Jacobsson and H.C. Linderoth. “User perceptions of ICT impacts in Swedish construction International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 20 companies:‘it’s fine, just as it is’. Construction management and economics, 30(5), 339-357. 2012. [29] P. Chaisuparasmikul. “Bidirectional Interoperability Between CAD and Energy Performance Simulation Through Virtual Model System Framework.” in Proceedings: ACADIA, 2006, 12-15. [30] G.E. Farin, J. Hoschek, and M.S. Kim. Handbook of computer aided geometric design. Elsevier. 2002. [31] N. Berente, R. Baxter,and K. Lyytinen. “Dynamics of inter‐organizational knowledge creation and information technology use across object worlds: the case of an innovative construction project.” Construction Management and Economics, 28(6), 569-588. 2010. [32] G. Brewer and T. Gajendran. “Emerging ICT trends in construction project teams: a Delphi survey.” Journal of Information Technology in Construction, 14, 81-97. 2009. [33] C. Evia. “Localizing and designing computer-based safety training solutions for Hispanic construction workers.” Journal of Construction Engineering and Management, 137(6), 452-459. 2010.
  • 8. [34] Y. Zhu, R. Zhang, and I. Ahmad. “Applying concept similarity to the evaluation of common understanding in multidisciplinary learning.” Journal of Computing in Civil Engineering, 24(4), 335- 344. 2009. [35] J. H. Rankin and R. Luther. “The innovation process: adoption of information and communication technology for the construction industry”. Canadian Journal of Civil Engineering, 33(12), 1538- 1546. 2006. [36] M. Benza, C. Bersani, E. Garbolino, D. Giglio, S. Olampi, R. Sacile, and E. Trasforini. "A distributed information system prototype to detect and monitor the Hazardous Material Transport on the road in the territory of Nice-Imperia-Ventimiglia.” WIT Transactions on The Built Environment, 2007, 94. [37] C.S. Leem and B.G. Kim. “Taxonomy of ubiquitous computing service for city development.” Personal and ubiquitous computing, 17(7), 1475-1483. 2013. [38] Z. Riaz, D.J. Edwards, G. D. Holt, and T. Thorpe. “Data flow analysis of plant and equipment health and safety management..” Journal of Engineering, Design and Technology, 9(2), 178-203. 2011. [39] F. Al-Neshawy, J. Piironen, S. Peltola, E. Sistonen, and J. Puttonen. “Network system for assessing the moisture and thermal behaviour of repaired concrete building facades..”, Journal of Information technology in Construction, Vol. 16, pg. 601-616. 2011. [40] Z. Han, T. Froese. “Project Information Management in Mega Oil Sands Projects. ”. Building a Sustainable Future: pp. 71-80.pp. 71-80. 2009. [41] A.P. Chassiakos. “The Use of Information and Communication Technologies in Construction.” Civil Engineering Computations: Tools and Techniques. Saxe-Coburg Publications, Stirlingshire, UK, Chapter 5, pp 79-104, 2007. [42] Y. Nielsen, and O. Koseoglu. “Wireless networking in tunnelling projects.” Tunnelling and underground space technology, 22(3), 252-261. 2007. [43] T. Molony. “The role of mobile phones in Tanzania’s informal construction sector: The case of Dar es Salaam”. In Urban Forum, 2008. 19-2, pp. 175-186. [44] N. Suman, D. Ursic, M. Psunder, and D. Veselinovic. “Mobile information and communication technology and management of business changes in construction companies in Slovenia.” Systemic Practice and Action Research, 22(5), 397-411. 2009. [45] S. Bowden, A. Dorr, T. Thorpe, and C. Anumba. “Mobile ICT support for construction process improvement.”” Automation in construction, 15(5), 664-676. 2006. [46] B. Graham and K. Thomas. “An investigation into the development of knowledge management systems within the leading Irish construction companies.. ” In Khosrowshahi, F. (ed.), 21st Annual ARCOM Conference, 7-9 September 2005, School of Oriental and African Studies. Association of Researchers in Construction Management, 2005, Vol. 1, 499-508. [47] L. C. Tang, Y. Zhao, S. Austin, M. Darlington, and S. Culley, S. “Codification vs personalisation: A study of the information evaluation practice between aerospace and construction industries.” International Journal of Information Management, 30(4), 315-325. 2010. [48] P. Zhang and F.F. Ng. “Explaining knowledge-sharing intention in construction teams in Hong Kong.” Journal of Construction Engineering and Management, 139(3), 280-293. 2013. International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 21
  • 9. [49] P. Inyim, J. Rivera, and Y. Zhu. “Integration of building information modeling and economic and environmental impact analysis to support sustainable building design.” Journal of Management in Engineering, 31(1), A4014002. 2014. [50] T. M. Froese. “The impact of emerging information technology on project management for construction.” Automation in construction, 19(5), 531-538. 2010. [51] S. Dehlin, and T. Olofsson. “An evaluation model for ICT investments in construction projects.” Journal of Information Technology in Construction, 13, 343-361. 2008. [52] W. Sher, S. Sherratt, A. Williams, and R. N. Gameson. “Heading into new virtual environments: what skills do design team members need?.” Journal of Information Technology in Construction, 14, 17- 29. 2009. [53] P. Christiansson, K. Svidt, K.B. Sørensen, and U. Dybro. “User participation in the building process.” Journal of Information Technology in Construction, 16, 309-334. 2011. [54] A. Ekholm and M. Molnar. “ICT development strategies for industrialisation of the building sector.”Journal of Information Technology in Construction, 14(special issue), 429-444. 2009. AAUUTTHHOORR Ehab J.Adwan is a Ph.D. candidate. He received his M.Sc. degree in Computer Science in 2004 from the University of Bahrain (UOB) and received his B.Sc. degree in Electronics and Physics with a minor in Computer in the year 1996 from The American University in Cairo (AUC). Since 1996, he is working as an Academic Research and Teaching Assistant (B) at the Department of information systems- College of Information Technology at the University of Bahrain. His mainstream research is focused on Enterprise Architecture, Business Architecture, Information Systems Architecture, Software Architecture, Software Engineering and Systems Analysis and Design,. Currently, great research emphasis is carried out on the ICT in Construction industry through an Enterprise Architecture perspective. Dr. Ali AlSoufi is an Associate professor of Information Systems at University of Bahrain. He has earned his PhD in Computer science in 1994 from Nottingham University, UK. He has worked for Bahrain Telecom Co for 8 years as a Senior Manager Application Programme where he overlooked number of mega IS Application projects. Worked at Arab Open University as the head of IT program and Assistant Director for Business Development during 2007-2010. He is a PT consultant in Bahrain e-Government Authority (EGA) in Enterprise Architecture. He is an active member of the Bahrain National ICT Governance Committee. His specializations is Strategic IT Planning and Governance, IT project management, Enterprise Architecture and IS in Organization
  • 10. THE CONTRIBUTION OF ELECTRONIC BANKING TO CUSTOMER SATISFACTION: A CASE OF GCB BANK LIMITED –KOFORIDUA Martin Otu Offei and Kwaku Nuamah-Gyambrah Koforidua Polytechnic , Ghana ABSTRACT Internet banking has the potential to provide fast and reliable services to customers for which they are relatively happy. Due to the technological changes taking place all over the world, many institutions, including the banking sector have taken giant steps to move in tandem with these changes. In this light most banks, with GCB Bank, Ghana, not being an exception have introduced electronic banking in order to decongest the banking halls of customers who spend time unending in order to transact business. The purpose of this research was to assess the Contribution of Electronic Banking to Customer Satisfaction at GCB Bank-Koforidua, to this end some objectives were set for the study. These were: To assess the availability of electronic banking facilities at GCB Bank, Koforidua. To assess the knowledge and patronage of internet banking services by customers, to examine the effectiveness of the usage of electronic banking facilities, to examine the problem facing an internet banking in GCB Bank, Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools for data collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch. Findings from analysis of data revealed that though there was the existence of internet banking facilities of the bank, respondents of the study were not fully aware of the existence of such facilities. It was also found that the use of internet banking was quite expensive and that though the bank was utilizing the facility, customers were not fully patronizing them. It was concluded that internet banking brings efficiency in the operations of the bank. Finally, the study recommended that all branches of GCB Bank adopt internet banking facilities to help in effective banking operations and transactional purposes. To maximize the operations and potential of the bank management must endeavor to educate the customers about the existence of internet banking facilities since a few customers were aware of the existence of such facilities. KEYWORDS Internet banking, customer satisfaction, contribution, Ghana, ATM Cards, master cards, visa, debit & credit cards FOR MORE DETAILS: http://aircconline.com/ijmit/V8N1/8116ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol8.html
  • 11. REFERENCES [1] Acquah, P.A. (2006). Evaluating the Banking System in Ghana. Accra: Fifth Banking Awards Ceremony [2] Agboola, A.A. (2006). Electronic Payment Systems and Tele banking Services in Nigeria journal of Internet Banking and Commerce, 11. [3] Akinci, S., Aksoy, S. and Atilgan E. (2004).Adoption of Internet Banking among Sophisticated Consumer Segments in an Advanced Developing Country. International Journal of Bank Marketing, Vol. 22 No. 3, pp. 212-232 [4] Akoh, B. (2001). E-Business in the Developing World, Africa and Ethiopia. In Conference on Information and Communication Technology and Development. [5] Babin, B. J., Carr, J. C., and Griffin, M. (2010).Business Research Methods. 8th Edition.SouthWesternCengage Learning. [6] Bauer, C., &Colgan, J. (2001). Planning for electronic commerce strategy: an explanatory study from the financial services sector. Logistics Information Management, 14(1/2), 24-32. [7] Fraenkel, J. R., Wallen, N. E., & Hyun, H. H. (1993). How to design and evaluate research in education (Vol. 7). New York: McGraw-Hill. [8] Gurau, C. (2002). E-banking in transition economies: The case of Romania. Journal of Financial Services Marketing, 6(4), 362-378. [9] Haque, A. K. M., Ismail, A. Z., &Daraz, A. H. (2009). Issues of e-banking transaction: an empirical investigation on Malaysian customers perception. Journal of applied Sciences, 9(10), 1870- 1879. [10] Hughes, T. (2001). Market Orientation and the Response of UK Financial Services Companies to Changes in Market Condition as a Result of E-Commerce.International Journal of bank marketing, 19 (6), 222 – 231. [11] Jayawardhena, C., & Foley (2000). Changes In The Banking Sector – The Case of Internet Banking in the UK, Internet Research: Electronic Networking Applications and Policy, Vol. 10, No. 1, pp. 19-30. [12] Li, F. (2001). The Internet and the Deconstruction of the Integrated Banking Model, British Journal of Management, Vol. 12, pp. 307-22. [13] Mols, N. P. (1999) The Internet and the Banks’ Strategic Distribution Channel Decisions, International Journal of Bank Marketing, 17 (6), pp.245-300. [14] Moutinho, L., &Meidan, A. (1989). Bank Customers’ Perceptions, Innovations and New Technology, International Journal of Bank Marketing, Volume 7 No. 2, pp. 22-27. [15] Polatoglu, V. N. andEkin, S. (2001).An Empirical Investigation of the Turkish Consumers’ Acceptance of Internet Banking Services. International Journal of Bank Marketing, 19(4), 156-165. [16] Robinson, G. (2000). Bank to the future. Internet Magazine. [17] Rogers, E. (2003).Diffusion of Innovations, 5th edn Free Press. New York. [18] Rotchanakitumnuai, S., &Speece, M (2003). Barriers to Internet Banking Adoption: a qualitative study among corporate customers in Thailand. International Journal of Bank Marketing, vol. 21, no.6/7, pp. 321-23. [19] Sathye, M. (1999). Adoption of Internet Banking by Australian Consumers: An empirical
  • 12. investigation, International Journal of Bank Marketing, Vol. 17 No. 7, pp. 324-34. [20] Shittu, O. L. O. R. U. N. S. E. G. U. N., & FULFILMENT, I. P. (2010). The Impact Of Electronic Banking In Nigeria Banking System (Critical Appraisal Of Unity Bank (PLC). LadokeAkintola University of Technology, Ogbomoso. [21] Steven, A. (2002). Information systems: The Foundation of E-Business. New Jersey: Anderson, 11- 36. [22] Thornton, J., & White, L., .(2001) Customer Orientations and Usage of Financial Distribution Channels, International Journal of Bank Marketing, Volume 15 No. 3, pp. 168-185. [23] Turban, E., Lee, J., King, D., Chung, M., (2000) Electronic Commerce: A Managerial Perspective, Prentice Hall International, Inc:New Jersey. [24] Twumasi, P. A. (2001). Social Research in Rural Communities, 2nd Ed. Accra: Ghana Universities Press. [25] Wisdom, K (2012).The Impact of Electronic Banking on Service Delivery to Customers of Ghana Commercial Bank Limited. A Study of Ghana Commercial Bank Ltd. Ho Polytechnic Branch. [26] Yasuharu, U. (2003).The Effects of Information System Investment in Banking Industry
  • 13. A NEW CONCEPT OF R&D IN NEO OPEN INNOVATION - TRANSFORMATION OF R&D TRIGGERED BY AMAZON Yuji Tou1 , Chihiro Watanabe 2, 3 , Kuniko Moriya 2, 4 , Victor Vurpillat5 , Pekka Neittaanmäki2 , 1 Tokyo Institute of Technology, Japan 2 University of Jyväskylä, Finland, 3 International Institute for Applied Systems Analysis (IIASA), Austria, 4 Research and Statistics Department, Bank of Japan, Japan and 5 Global Connexus Inc., USA ABSTRACT Amazon was the world’s top R&D firm in 2017. Its R&D investment was double that of 2015, quintuple that of 2012, and tenfold that of 2011. It deploys a unique R&D model as conducting “routine or periodic alternations” and “significant improvement” simultaneously. Since traditionally the former is classified as non-R&D, Amazon’s rapid and notable increase has raised the question of a new R&D definition in the digital economy. By means of an empirical analysis of the Amazon’s R&D model, this paper attempted to provide a convincing answer to this question. Amazon has invested considerable resources in extremely innovative business areas, which has developed its assimilation capacity. In parallel with such forefront innovation, Amazon is endeavoring to absorb soft innovation resources from external markets and assimilate them into its business model. This then transforms “routine or periodic alternations” into “significant improvement”, leading to the company becoming the world’s top R&D firm. Such an endeavor has triggered a new concept of R&D in neo open innovation and revealed the significance of a transformation of the R&D concept in the digital economy. KEYWORDS R&D, neo open innovation, Amazon, transformation, technology and content For More Details: http://aircconline.com/ijmit/V11N1/11119ijmit02.pdf Abstract URL: http://aircconline.com/abstract/ijmit/v11n1/11119ijmit02.html Volume URL: http://airccse.org/journal/ijmit/vol11.html
  • 14. REFERENCES [1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018. Neo Open Innovation in the Digital Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information Technology 10 (4), 53-75. [2] Bloomberg, 2017. 2017 Global Innovation 1000 Study. Bloomberg, New York. [3] Fox, J., 2018. Amazon, the Biggest R&D Spender, Does Not Believe in R&D. Bloomberg Opinion, 13 April 2018. https://www.bloomberg.com/view/articles/2018-04-12/amazon-doesn-t-believe-in research-and-development-spending (retrieved 22.09.2018) [4] Gershgorn, D., 2018. Amazon’s R&D Spending is Poised to Top the GDP of Iceland. Quarts, 28 December 2018. [5] World Bank, 2018. National Accounts Data. World Bank, Washington, D.C. [6] Watanabe, C., Tou, Y. & Neittaanmäki, P., 2018b. A New Paradox of the Digital Economy: Structural Sources of the Limitation of GDP Statistics, Technology in Society 55, 9-33. [7] Watanabe, C., Naveed, K., Tou, Y. & Neittaanmäki, P., 2018c. Measuring GDP in the Digital Economy: Increasing Dependence on Uncaptured GDP. Technological Forecasting and Social Change 137, 226-240. [8] Watanabe, C., Naveed, K., Neittaanmäki, P., 2015. Dependency on Un-captured GDP as a Source of Resilience beyond Economic Value in Countries with Advanced ICT Infrastructure: Similarities and Disparities between Finland and Singapore. Technology in Society 42, 104–122. [9] Watanabe, C., Naveed, K., Neittaanmäki, P., Tou, Y., 2016. Operationalization of Un-captured GDP: The Innovation Stream under New Global Mega-trends. Technology in Society 45, 58–77. [10] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random House LLC, New York. [11] Naveed, K., Watanabe, C. & Neittaanmäki, P., 2018. The Transformative Direction of Innovation toward an IoT-based Society: Increasing Dependency on Uncaptured GDP in Global ICT Firms. Technology in Society 53, 23-46. [12] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B, Ed. The Global Internet Economy. MIT Press, Massachusetts. [13] Knott, A.M., 2017. How Innovation Really Works: Using the Trillion-Dollar R&D fix to Drive Growth. McGraw Hill, New York. [14] Green, T., 2018. How Much does Amazon Spend on R&D? Less than You Think. The Motley Fool, 13 June 2018. https://www.fool.com/investing/2018/06/13/how-much-does-amazon-spend-on-rd-less than-you-thi.aspx (retrieved 10.01.2019). [15] Amazon, 2018a. Amazon Com. Inc. Annual Report 2017. Amazon.Com, Inc., Seattle. http://www.annualreports.com/Company/amazoncom-inc (retrieved 06.01.2019). [16] Amazon, 2018b. Amazon Leadership Principles. Amazon.Com, Inc., Seattle. https://www.amazon.jobs/en/principles (retrieved 20.11.2018). [17] Apple, 2018. Apple Inc. Annual Report 2017. Apple Inc., Cupertino. https://investor.apple.com/investor-relations/financial-information/(retrieved 06.01.2019). [18] Financial Accounting Standards Board (FASB) Accounting Standards Codification (ASC), 2018. Generally Accepted Accounting Principles (GAAP) for Business. FASB, ASC, Washington, D.C.
  • 15. [19] National Science Foundation (NSF), 2018. Definitions of R&D: An Annotated Compilation of Official Sources. NSF, Alexandria, Virginia, USA. https://www.nsf.gov/statistics/randdef/#chp3. (retrieved 10.01.2019). [20] Watanabe, C., Naveed, N. & Neittaanmäki, P., 2018a. Digital Solution Transform the Forest-based Bioeconomy into a Digital Platform Industry: A Suggestion for a Disruptive Business Model in the Digital Economy. Technology in Society 54, 168-188. [21] Jenkins, J., 2011. How Amazon. Com Migrated to AWS. 2011 AWS Tour Australia, Closing Keynote. https://www.slideshare.net/AmazonWebServices/2011-aws-tour-australia-closing-keynote-how amazoncom-migrated-to-aws-by-jon-jenkins (retrieved 10.01.2019). [22] Yahoo! Finance, 2018. Amazon.com, Inc. (AMZN), Historical Data. https://finance.yahoo.com/quote/AMZN/history (retrieved 10.01.2019). [23] Yahoo! Finance, 2018. Apple Inc. (AAPL), Historical Data. https://finance.yahoo.com/quote/AAPL/history (retrieved 10.01.2019). [24] Colin, N., 2016. 11 Notes on Amazon. The Family Papers #010. 18 Jan. 2016. https://salon.thefamily.co/11-notes-on-amazon-part-1-cf49d610f195 (retrieved 06.01.2019). [25] O’Reilly, T., 2003. The Open Source Paradigm Shift. O’Reilly & Associates, Inc., Sebastopol. https://www.oreilly.com/tim/archives/ParadigmShift.pdf (retrieved 10.01.2019). [26] Watanabe, C., Takayama, M., Nagamatsu, A., Tagami, T. and Griffy-Brown, C., 2002. Technology Spillover as a Complement for High Level R&D Intensity in the Pharmaceutical Industry. Technovation 22 (4), 245-258. [27] Rivet, D.J., 2017. Amazon’s Superior Innovation: A Study of Amazon’s Corporate Structure, CEO, and Reasons behind Why It has become the Most Innovative Company in Today’s Market. University of New Hampshire Honors Theses and Capstone 343, University of New Hampshire, Durham. https://scholars.unh.edu/honors/343 (retrieved 10.01.2019 AUTHORS Yuji Tou graduated from Tokyo Institute of Technology, Japan, and is currently specially appointed associate professor at Tokyo Institute of Technology, Japan Chihiro Watanabe graduated from the University of Tokyo, Japan, and is currently Professor Emeritus at the Tokyo Institute of Technology, a research professor at the University of Jyväskylä, Finland, and a research scholar at the International Institute for Applied Systems Analysis (IIASA). Kuniko Moriya graduated from Aoyama Gakuin University, Japan, and is currently is currently Director of the Bank of Japan. Victor V. Vurpillat graduated from Calfornia State Polytechnic University, USA, and is currently Chairman of the Board and Director of Research, Global Connexus Inc., USA Pekka Neittaanmäki graduated from the University of Jyväskylä with a degree in Mathematics. He is currently Professor of the Faculty of Information Technology, University of Jyväskylä, Finland.
  • 16. A SOLUTION TO THE DILEMMA BETWEEN R&D EXPANSION AND THE PRODUCTIVITY DECLINE: LESSONS FROM THE R&D MODELS IN AMAZON AND FINLAND Yuji Tou1 , Chihiro Watanabe 2,3 , Kuniko Moriya4,2 , Pekka Neittaanmäki2 , 1 Tokyo Institute of Technology, Japan, 2 University of Jyväskylä, Finland, 3 International Institute for Applied Systems Analysis (IIASA), Austria and 4 Research and Statistics Department, Bank of Japan, Japan ABSTRACT As a consequence of the two-faced nature of information and communication technology (ICT), a majority of ICT leaders have been confronting the critical problem of a dilemma between R&D expansion and productivity decline in the digital economy. However, Amazon has been able to accomplish a skyrocketing increase in R&D and market capitalization. Finland has also accomplished balanced advancement not only of welfare but also economic resurgence. This paper attempted to elucidate the miracle of two ICT leaders. By means of a comparative empirical analysis of respective development trajectories, the sources of their success were analyzed thereby the comparative advantage and disadvantage of each respective trajectories supportive to find a practical solution to the critical problem of a dilemma were identified. The sources of both successes can be attributed to harnessing the vigor of soft innovation resources from the marketplace. However, contrary to Amazon’s complementary use, Finland has depended on substitutionary use. While this approach contributes to easy resurgence, it casts a shadow to the innovative growth in the future. An insightful suggestion regarding balanced sustainable growth by cross learning was thus provided. KEYWORDS Digital economy, soft innovation resources, Amazon, Finland, dilemma between R&D and productivity For More Details: http://aircconline.com/ijmit/V11N2/11219ijmit02.pdf Abstract URL: http://aircconline.com/abstract/ijmit/v11n2/11219ijmit02.html http://airccse.org/journal/ijmit/vol11.html
  • 17. REFERENCES [1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018b. Neo Open Innovation in the Digital Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information Technology 10 (4), 53-75. [2] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2019b. Harnessing Soft Innovation Resources Leads to Neo Open Innovation. Technology in Society, in print. [3] B loomberg, 2017. 2017 Global Innovation 1000 Study. Blo omberg, New York. [4] Fox, J., 2018. Amazon, the Biggest R&D Spender, Does Not Believe in R&D. Bloomberg Opinion, 13 April 2018. https://www.bloomberg.com/view/articles/2018-04-12/amazon-doesn-t-believe-in- research-anddevelopment-spending (retrieved 22.09.2018). [5] Statista, 2019. Top Internet Companies: Global Market Value 2018. Statista, Hamburg. https://www.statista.com/statistics/277483/market-value-of-the-largest-internet-companiesworldwide/ (retrieved 10.01.2019). [6] Macrotrends, 2019. Apple Market Cap 2006-2018 – AAPL, Chicago. https://www.macrotrends.net/stocks/charts/AAPL/apple/market-cap (retrieved 08.02.2019). [7] Macrotrends, 2019. Amazon Market Cap 2006-2018 – AMZN, Chicago. https://www.macrotrends.net/stocks/charts/AMZN/amazon/market-cap (retrieved 08.02.2019). [8] Tou, Y., Watanabe, C., Moriya, K., Vurpillat, V., & Neittaanmäki, P., 2019a. A New Concept of R&D in Neo Open Innovation: Transformation of R&D Triggered by Amazon. International Journal of Managing Information Technology 11 (1) in print. [9] Tou, Y., Watanabe, C., Ilmola, L., Moriya, K. and Neittaanmäki, P., 2018a. Hybrid Role of Soft Innovation Resources: Finland’s Notable Resurgence in the Digital Economy. International Journal of Managing Information Technology 10 (4), 1-22. [10] International Monetary Fund (IMF), 2018. World Economic Outlook Database 2018. IMF, Washington, D.C. https://www.imf.org/external/datamapper/NGDP_RPCH@WEO/OEMDC/ADVEC/WEOWORLD (retrieved 06.02.2019). [11] United Nations, 2018. World Happiness Report 2018. United Nations, New York. http://worldhappiness.report/ed/2018/ (retrieved 10.01.2019) [12] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B, Ed. The Global Internet Economy. MIT Press, Massachusetts. [13] R i tala, P., Golnam, A. & Wegmann, A., 2014. Coopetition based Business Models: The Case of Amazon.com. Industrial Marketing Management 43, 236 249. [14] K nott, A.M., 2017. How Innovation Really Works: Using the Trillion Dollar R&D fix to Drive Growth. McGraw Hill , New [15] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random House LLC, New York. [16] Khan, L.L., 2017. Amazon’s Antitrust Pradox. The Yale Law Journal 126, 710-805. [17] OECD, 2017. OECD Review of Innovation Policy: Finland Assessment and Recommendation. OECD, Paris.
  • 18. [18] Watanabe, C., Kondo, R., Ouchi, N., Wei, H. and Griffy-Brown, C., 2004. Institutional Elasticity as a Significant Driver of IT Functionality Development. Technological Forecasting and Social Change 71 (7), 723-750. [19] Schelling, T.C., 1998. Social mechanisms and social dynamics, in Hedstrom, P. and Swedberg, R. eds., Social Mechanisms: An Analytical Approach to Social Theory. Cambridge Univ. Press, Cambridge, 32-43. [20] International Monetary Fund (IMF), 2017. World Economic Outlook Database 2017. IMF, Washington, D.C. [21] World Economic Forum (WEF), 2016. The Global Information Technology Report 2016. WEF, Geneva. [22] EU, 2017. Economics of Industrial Research and Innovation, EU, Brussels. [23] Watanabe, C., Tou, Y. and Neittaanmäki, P., 2018a. A New Paradox of the Digital Economy: Structural Sources of the Limitation of GDP Statistics. Technology in Society 55, 9-23. [24] Watanabe, C., Naveed, K., Tou, Y. and Neittaanmäki, P., 2018b. Measuring GDP in the Digital Economy: Increasing Dependence on Uncaptured GDP. Technological Forecasting and Social Change 137, 226-240. [25] Watanabe, C., Lei, S. and Ouchi, N., 2009. Fusing Indigenous Technology Development and Market Learning for Greater Functionality Development: An Empirical Analysis of the Growth Trajectory of Canon Printers. Technovation 29 (2), 265-283. [26] Watanabe, C., Takayama, M., Nagamatsu, A., Tagami, T. and Griffy-Brown, C., 2002. Technology Spillover as a Complement for High Level R&D Intensity in the Pharmaceutical Industry. Technovation 22 (4), 245-258. [27] Watanabe, C., Naveed, K. and Zhao, W., 2015a. New Paradigm of ICT Productivity: Increasing Role of Un-captured GDP and Growing Anger of Consumers. Technology in Society 41, 21–44 [28] Watanabe, C., Naveed, K. and Neittaanmäki, P., 2015b. Dependency on Un-captured GDP as a Source of Resilience beyond Economic Value in Countries with Advanced ICT Infrastructure: Similarities and Disparities between Finland and Singapore. Technology in Society 42, 104–122 . [29] Watanabe, C., Naveed, K., Neittaanmäki, P. and Tou, Y., 2016. Operationalization of Un-captured GDP: The Innovation Stream under New Global Mega-trends. Technology in Society 45, 58–77. [30] Statistics Finland, (2018) “National Accounts of Finland,” Statistics Finland, Helsinki. [31] University of Toronto, 2013. Amazon Business Model Case Study. APS1012 Management of Innovation – Final Team Projects, Spring 2013. University of Toronto, Faculty of Applied Science and Engineering, Toronto. http://www.amgimanagement.com/founder/ProjectSummaries/APS1012_2013_spring_03_Amazon% 20business%20model%20case%20study.pdf (retrieved 10.01.2019). [32] Bezos, J.P., 2013. 2013 Letter to Shareholders. Amazon.com, Inc., Seattle. [33] Rivet, D.J., 2017. Amazon’s Superior Innovation: A Study of Amazon’s Corporate Structure, CEO, and Reasons behind Why It has become the Most Innovative Company in Today’s Market. University of New Hampshire Honors Theses and Capstone 343, University of New Hampshire, Durham. https://scholars.unh.edu/honors/343 (retrieved 10.01.2019). [34] Malczewski, B., 2011. Amazon in Overdrive: Is there More to the Overdrive – Amazon Deal than Just the Kindle? Journal of Electronic Resources Librarianship, 23 (4), 404-408. [35] Izogo, E.E. & Ozo, J.U., 2015. Critical Evaluation of How Well Placed Amazon is to Sustain its Historical Online Retailing. British Journal of Marketing Studies 3 (6), 31-42.
  • 19. [36] Levinson,M., 2007. Amazon’s IT Leader Leaving Huge Customer Service Infrastructure as Legacy. CIO, 17 Oct. 2007. https://www.cio.com/article/2437865/infrastructure/amazon-com-s-it-leader-leaving- huge-customerservice-infrastructure-as-legacy.html (retrieved 10.01.2019). [37] Robischon, N., 2017. Why Amazon is the World’s Most Innovative Company of 2017? Fast Company Magazine, 2 May 2017. https://www.fastcompany.com/3067455/why-amazon-is-the-worlds- most-innovative-company-of2017 (retrieved 10.01.2019).
  • 20. UPPING THE ANTE: USING RFID AS A COMPETITIVE WEAPON TO FIGHT SHOPLIFTING AND IMPROVE BUSINESS INTELLIGENCE David C. Wyld1 and Michael C. Budden2 1 Department of Management, Southeastern Louisiana University, Hammond, LA USA 2 Department of Marketing & Supply Chain Management, Southeastern Louisiana University, Hammond, LA USA ABSTRACT This paper explores how RFID (radio frequency identification) technology can be employed to fight the ever-growing shoplifting problem, estimated to cost the world’s retailers almost $100 billion annually. The paper provides an overview of RFID technology. We then analyze how RFID is beginning to see utilization in-store not just for security, but as a vehicle to improve inventory management and business intelligence as well. This paper demonstrates that RFID is poised to usher in a whole new direction in the fight against retail shrinkage, and we discuss what this visibility will mean for their companies, their employees, and their customers. KEYWORDS Shoplifting, Retail Security, Loss Prevention, RFID (radio frequency identification) technology, Organized Retail Crime, Business Intelligence For More Details: http://airccse.org/journal/ijmit/1011s1.pdf http://airccse.org/journal/ijmit/vol1.html
  • 21. REFERENCES [1] S. Howell and N. Proudlove, “A statistical investigation of inventory shrinkage in a large retail chain,” International Review of Retail, Distribution & Consumer Research, Vol. 17, No. 2, pp. 101-120, April 2007. [2] R. Hollinger and L. Langton, National Retail Security Survey 2005. Gainesville, FL: University of Florida, June 2006. [3] E. Woyke, “Attention, shoplifters: With $30 billion in theft, there's a revolution in surveillance systems,” Business Week, September 11, 2006. [Online]. Available: http://www.businessweek.com/magazine/content/06_37/b4000401.htm [Accessed: June 2, 2008]. [4] M. Budden, J. Yeargain and J. Miller Jr., “Strategies for dealing with shoplifting: A managerial and legal perspective,” American Business Review, Vol. 9, No. 1, pp. 28-41, January 1991. [5] Jack L. Hayes International, Press release: Shoplifter and dishonest employee theft on the rise, April 6, 2008. [Online]. Available: http://www.hayesinternational.com/thft_srvys.html [Accessed: August 1, 2008]. [6] S. Dickenson, “Taking stock of shrinkage,” Home Accents Today, February 1, 2008. [Online]. Available: http://www.homeaccentstoday.com/article/CA6535521.html. [Accessed: May 15, 2008]. [7] Checkpoint Systems (2008). Press release: Loss prevention spending tied to retail shrink levels, June 30, 2008. [Online]. Available: http://www.checkpointsystems.com/default.aspx?page=news&idnews=284 [Accessed: July 28, 2008]. [8] B. Babin and L. Babin, “Effects of Moral Cognitions and Consumer Emotions on Shoplifting Intentions,” Psychology & Marketing, Vol. 13, No. 8, pp. 785-802, December 1996. [9] M. Tonglet, “Consumer misbehaviour: An exploratory study of shoplifting,” Journal of Consumer Behaviour, Vol. 11, No. 4, pp. 336-354, November 2002. [10] Shoplifters Alternative, “Survey reveals important information about shoplifters,” New Jersey Small Business Development Centers, October 2001. [Online]. Available: http://www.njsbdc.com/retail/shoplifting.php [Accessed: August 19, 2008]. [11] R.C. Hollinger, “Workplace dishonesty,” Loss Prevention, Vol. 16, No. 6, pp. 16-18, June 2007. [12] Reuters, “Retailers face organized shoplifters, e-fencing,” CNBC.com, June 4, 2008. [Online]. Available: http://www.cnbc.com/id/24960983 [Accessed: September 1, 2008]. [13] J. Groover, “Organized crime: Retailers combat growing number of professional shoplifters,” Shopping Centers Today, October 2006. [Online]. Available: http://www.icsc.org/srch/sct/sct1006/index.php [Accessed: September 15, 2008]. [14] National Retail Federation, 2008 Organized Retail Crime Survey, June 2008. [Online]. Available: http://www.nrf.com/modules.php?name=News&op=viewlive&sp_id=522 [Accessed: July 3, 2008]. [15] J. Colapinto, “Stop, thief!: The high-tech approach to catching shoplifters,” The New Yorker, September 1, 2008. [Online]. Available: http://www.newyorker.com/reporting/2008/09/01/080901fa_fact_colapinto [Accessed: October 2, 2008].
  • 22. [16] S.D. Scalet, “Shoplifting and organized retail crime: Mall rats,” CSO: Chief Security Officer, February 1, 2007. [Online]. Available: http://www.csoonline.com/article/print/221140. [Accessed: April 29, 2008]. [17] A. Loten, “Retailers face threat from organized shoplifting rings: A growing number of thieves are stealing large quantities of merchandise from warehouses and reselling online,” Inc., June 5, 2007. [Online]. Available: http://www.inc.com/news/articles/200706/crime.html [Accessed: July 28, 2008]. [18] E. Walker, “Drug store thefts a billion-dollar business,” The Miami Herald, August 28, 2008. [Online]. Available: http://www.miamiherald.com/news/front-page/story/661823.html [Accessed: September 20, 2008]. [19] C. Weselby, “Merchants, law enforcement fight organized shoplifting rings,” Silicon Valley/San Jose Business Journal, July 11, 2009. [Online]. Available: http://sanjose.bizjournals.com/sanjose/stories/2008/07/14/story7.html [Accessed: March 10, 2009]. [20] S.J. Dubner, “Is a wave of scuppie shoplifting upon us?” The New York Times, January 15, 2009. [Online]. Available: http://freakonomics.blogs.nytimes.com/2009/01/15/is-a-wave-of-scuppieshoplifting upon-us/ [Accessed: June 23, 2009]. [21] S. Epps, “Shoplifting on rise in SW Florida as economic woes linger,” Naples News, June 21, 2008. [Online]. Available: http://www.naplesnews.com/news/2008/Jun/21/shoplifting-rise-swflorida-economic woes-linger/ [Accessed: September 5, 2008]. [22] K. Roche, “Shoplifting a matter of opportunity,” Waltham Daily News Tribune, May 25, 2008. [Online]. Available: http://www.dailynewstribune.com/news/x1192324366/Shoplifting-a-matterof opportunity [Accessed: January 30, 2009]. [23] M.R. Doyle, “The state of the loss prevention industry: 2007 update,” Security Info Watch, October 18, 2007. [Online]. Available: http://www.securityinfowatch.com/article/printer.jsp?id=12817 [Accessed: August 3, 2008]. [24] S. Kapner, “Retailers want to stop growing so fast: After years of build, build, build, America's biggest stores are deciding that it makes sense to slow growth in a slow economy,” Fortune, December 6, 2007. [Online]. Available: http://money.cnn.com/2007/12/06/magazines/fortune/kapner_expansion.fortune/index.htm [Accessed: June 4, 2008]. [25] J. Goodchild, “Report: Shoplifting surges in down economy,” InfoWorld, June 17, 2009. [Online]. Available: http://www.infoworld.com/t/physical-security/report-shoplifting-surges-indown-economy-963 [Accessed: September 13, 2009]. [26] C. Dugas, “More consumers, workers shoplift as economy slows,” USA Today, June 18, 2008. [Online]. Available: http://www.usatoday.com/money/industries/retail/2008-06-18- shoplifting_N.htm [Accessed: September 30, 2008]. [27] Preference Research, “Research report - Loss prevention spending tied to retail shrink levels,” MSN Money Central, June 30, 2008. [Online]. Available: http://news.moneycentral.msn.com/ticker/article.aspx?Feed=BW&Date=20080630&ID=884142 9&Symbol=US:CKP [Accessed: July 17, 2008]. [28] D.C. Wyld, “The implant solution: Why RFID is the answer in the highly unique orthopaedic supply chain, providing ROI for suppliers and assurance for patients and their surgeons,” ID World, Issue 15, pp. 12-15, June 2008. [29] D.C. Wyld, “Playing a deadly game of match: How new efforts to use RFID in blood banking and transfusion can save patient lives and safeguard the blood supply chain,” Global Identification, Issue 37, pp. 24-26, March 2008.
  • 23. [30] D.C. Wyld, “Radio frequency identification: Advanced intelligence for table games in casinos,” Cornell Hospitality Quarterly, Vol. 49, No. 2, pp. 134-144, June 2008. [31] D.C. Wyld, “RFID 101: The next big thing for management,” The Engineering Management Review, Vol. 35, No. 2, pp. 3-19, May 2007. [32] R. Wessel, “To future-proof its Future Store, Metro Group opted for EPCglobal standards: The retailer claims that its Future Store's butcher shop uses one of the world's first full-blown EPCIS software stacks,” RFID Journal, September 26, 2008. [Online]. Available: http://www.rfidjournal.com/article/articleprint/4346/-1/1/ [Accessed: December 15, 2008]. [33] D.C. Wyld, RFID: The right frequency for government - A research report from The IBM Center for the Business of Government, September 2005. [Online]. Available: http://www.businessofgovernment.org/main/publications/grant_reports/details/index.asp?gid=23 2 [Accessed: October 3, 2005]. [34] J. Collins, “Bookstore RFID-enables its operations: One of Holland's largest booksellers has integrated RFID into the operations of its brand-new store,” RFID Journal, April 18, 2006. [Online]. Available: http://www.rfidjournal.com/article/articleview/2273/ [Accessed: November 20, 2006]. [35] M.C. O’Connor, “Wegmans eyeing RFID for prescription management: The supermarket operator is planning to test whether placing RFID tags on customers' prescription orders will make locating and ringing up the orders faster and more accurate,” RFID Journal, January 10, 2008. [Online]. Available: http://www.rfidjournal.com/article/articleview/3844/ [Accessed: May 15, 2008]. [36] C. Swedberg, “Best Buy eager to use RFID to eliminate checkout lines: The greatest obstacle to deployment, according to Best Buy CIO Bob Willett, is the current cost of tags and readers,” RFID Journal, June 20, 2007. [Online]. Available: http://www.rfidjournal.com/article/articleview/3422/1/1/ [Accessed: July 29, 2007]. [37] C. Swedberg, “Canadian grocery pilot finds ROI in RFID: By implementing RFID, retailers and suppliers should markedly reduce out-of-stocks and improve promotional execution, according to a seven-month project involving Loblaw and four of its suppliers’, RFID Journal, June 20, 2007. Retrieved May 25, 2008, from http://www.rfidjournal.com/article/articleview/3428/1/1/.[Accessed: May 26, 2009]. [38] M.C. O’Connor, “Retailers see RFID's potential to fight shrinkage,” RFID Journal, August 15, 2008. [Online]. Available: http://www.rfidjournal.com/article/articleprint/4265/-1/1/ [Accessed: September 18, 2008]. [39] C. Swedberg, “Raflatac releases RFID tags with built-In EAS,” RFID Journal, December 17, 2007. [Online]. Available: http://www.rfidjournal.com/article/articleprint/3818/-1/1/ [Accessed: June 19, 2008]. 40] M.C. O’Connor, “Outdoor clothing and equipment retailer tests RFID-EAS tags,” RFID Journal, August 12, 2008. [Online]. Available: http://www.rfidjournal.com/article/view/4256/1/1/ [Accessed: September 18, 2008]. [41] J. Patton and B.C. Hardgrave,” RFID as Electronic Article Surveillance (EAS): Feasibility Assessment – August 2008, Information Technology Research Institute, Sam M. Walton College of Business, University of Arkansas. Working Paper ITRI-WP117-0808. [Online]. Available: http://itri.uark.edu/94.asp?article=666 [Accessed: April 20, 2009]. [42] M.R. Doyle, “The state of the loss prevention industry: 2009 update,” Security Info Watch, September 11, 2009. [Online]. Available: http://www.securityinfowatch.com/Retail/the-stateloss prevention-industry-2009-update [Accessed: October 18, 2009].
  • 24. AUTHORS David C. Wyld currently serves as the Robert Maurin Professor of Management at Southeastern Louisiana University in Hammond, Louisiana. He is the Director of the College of Business’ Strategic e-Commerce/e- Government Initiative, the Founding Editor of the Journal of Strategic e- Commerce, and a frequent contributor to both academic journals and trade publications. He has established himself as one of the leading academic experts on emerging applications of technology in both the public and private sector. He has been an active consultant, a qualified expert witness, and an invited speaker on the strategic management of technology to both trade and academic audience Dr. Michael Craig Budden is the Mayfield Professor of Marketing at Southeastern Louisiana University. He has 20 years experience as an academic administrator, including service as a dean of business for 14 years. Budden is the author of more than 150 publications, including books on shoplifting laws and trade secrets laws. Budden's publications have received national commendations from the Institute of Internal Auditors, the National Association of Accountants and the Clute Institute. He has served as a consultant to banks, health care organizations, marketing research firms, and professional associations. He received a Ph.D. in Marketing from the University of Arkansas.
  • 25. AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE Sitalakshmi Venkatraman School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia, ABSTRACT With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizational operations and value creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a selflearning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation. KEYWORDS IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents For More Details: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf Volume Link: http://airccse.org/journal/ijmit/vol9.html
  • 26. REFERENCES [1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep. [2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81. [3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016. [4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015. [5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016. [6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7] Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316. [9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1. [10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition. [11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs, 1(2), 1-5. [12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and Security. Springer, pp. 519–552. [13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol. 32. no.2, pp. 68-72. [14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147. [15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large-Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.
  • 27. [16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484. [17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology governance practices adoption through an institutional perspective: The perception of brazilian and american CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455. [18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf. Syst., vol. 23, no. 2, pp. 223–239. [19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and IT Governance: An Evaluation and Call to Research Information Technology Governance and Service Management: Frameworks and Adaptations" IGI Global. pp. 202-220. [20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147. [21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE Network, vol. 29, no. 6, pp. 83–87. [22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC. [23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with Investment in Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S. De Haes (Eds.), Business Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global. [24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology", Cham: Springer International Publishing. [25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and Control Foundation, 2003. [26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the 47th Hawaii International Conference on System Sciences (HICSS), 2014. [27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology on total factor productivity: A look at externalities and innovations". International Journal of Production Economics, 158, 290-299. [28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC 38500:2015, 2nd Edition, ISO:Switzerland. [29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co-operation and Development (OECD), [30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA.
  • 28. [31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1, pp. 41-50. [32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM Systems Journal. vol. 42, no. 1, pp. 5-18. [33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic self- healing systems in a cross-product IT environment", Proceedings of the International Conference on Autonomic Computing), 312-313. [34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing". Computer, vol. 43, pp. 35-41. [35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp. 2288-2304. [36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 - 279. [37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via Context- Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058. [38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle River: Prentice Hall. [39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements & Networking. IEEE. [40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 4- 6 December, Singapore, pp. 517-520 [41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A strategic alignment perspective". Information & Management, vol. 52, pp. 348-358. [42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and Anti- Attacks in Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
  • 29. AUTHORS Sita Venkatraman is currently the Information Technology Lecturer and Discipline Leader for Business Information Systems at the School of Engineering, Construction & Design, Melbourne Polytechnic, Australia. She earned her PhD in Computer Science, with a doctoral thesis titled “Efficient Parallel Algorithms for Pattern Recognition”, from National Institute of Industrial Engineering in 1993. In the past 25 years, Sita's work experience involves both industry and academics - developing turnkey projects for IT industry and teaching a variety of IT courses for tertiary institutions, in India, Singapore, New Zealand, and more recently in Australia since 2007. Her recent research areas are predominantly in Business Intelligence, Data Mining, Cloud Computing and Information Security. Sita has published eight book chapters and more than 100 research papers in internationally well-known refereed journals and conferences. She also serves as Member of Register of Experts at Australia's Tertiary Education Quality and Standards Agency (TEQSA).
  • 30. THE IMPACT OF KNOWLEDGE MANAGEMENT ON THE FUNCTION OF EMPLOYEE PERFORMANCE APPRAISALS IN INDUSTRIAL COMPANIES- CASE STUDYS H. Obaidat and M. A. Otair Amman Arab University, Jordan ABSTRACT The study aimed at identifying the impact of knowledge management on the function of employee performance appraisals (it is one of the most important functions of human resources management) in Jordanian industrial public shareholding companies, relying on the descriptive analytical approach. A questionnaire has been developed and distributed on individuals of the study sample consisting of managers of departments and sections of human resources in each company. The number of questionnaire retrieved and valid for statistical analysis (294) representing (86.5%) of the distributed questionnaires. In order to analyze the study sample, reliance was placed on descriptive statistics, represented in the arithmetic means and standard deviations, in addition to the multiple linear regression analysis in hypothesis testing. The study reached a number of findings, most importantly, the presence of statistically significant impact at the level of (α=0.05) for the knowledge management including its dimensions (knowledge generation, knowledge storage, knowledge sharing, knowledge application) on the function of employee performance appraisals in Jordanian industrial public shareholding companies. The study has recommended that the Jordanian industrial public shareholding companies should follow an efficient evaluation system capable of identifying the employees’ weaknesses. KEYWORDS Human resources management, Knowledge Management, Employee Performance Appraisals, Industrial Companies For More Details: http://aircconline.com/ijmit/V10N4/10418ijmit03.pdf Volume Link : http://airccse.org/journal/ijmit/vol10.html
  • 31. REFERENCES [1] Aishoush, R. (2009). “Knowledge Management and Strategy in Business Organizations”. Unpublished PhD dissertation, Mohammed Khaydar University, Biskra, Algeria. [2] Al-Deeb E. (2010). Knowledge Management, Cairo, Egypt: The Arab Open Academy. [3] Al-kbaisi, S. (2011). Knowledge Management, Cairo-Egypt, Arab Organization for Administrative Development. [4] Al-Mudallal, A. (2012). “The application of knowledge management in Palestinian governmental institutions and their impact on the level of performance”. Unpublished M.Sc. Thesis, Islamic University, Palestine. [5] Al-Salem, M. and Saleh, A. (2003). Human Resource Management Strategic Approach. Amman Jordan, World of Modern Books for Publishing and Distribution. [6] Altaweel, A. and Rasheed, H. (2005). “The Impact of Information Technology on Knowledge Management Processes”. Future Research Journal. Iraq, Issue 10. [7] Al-Yaseri, A. and Hussien, D. (2012). “The Impact of Knowledge Management and Organizational Learning Processes on Strategic Performance An exploratory study of the views of a sample of administrative leaders at the universities of the Middle Euphrates”. Iraq, Qadisiyah Journal of Administrative and Economic Sciences, Vol (14), Issue (1). [8] Al-zyadat, M. (2008). “Contemporary Trends in Knowledge Management”, 1st Edition, AmmanJordan, Dar Al Safa for Publishing and Distribution. [9] Bukowitz, W. and Williams, R. (2000), The Knowledge Management Fieldbook, London: Prentice Hall [10] Darwazeh, S. (2008). “The Relationship between Knowledge Management Requirements and Processes and their Impact on the Performance Excellence of Organizations”. Unpublished PhD Thesis. Jordan, Middle East University. [11] Grover, V., and Davenport, T. (2001). General Perspectives on Knowledge Management. Journal of Management Information System, vol. 18, No. (1), pp. 5-21. [12] Hmoud, K. (2010). Knowledge Organization, 1st Edition, Amman-Jordan, Al-Ahliyyah for Publishing & Distribution. [13] Nickols, F. (2000). "Knowledge in Knowledge Management." Knowledge Management Yearbook, Butterworth-Heinemann: Boston. [14] Rollett, H. (2003), Knowledge management processes and technologies, Kluwer, Norwell.
  • 32. [15] Sakeenah, M. and Abu Sin, A. (2013). “Analysis of the reality of human resources strategy and its impact on performance in Sudanese telecommunications companies: Case Study of Sudan Telecom Company Limited”. Journal of Economic Sciences, Vol. 14, Issue 1. [16] Sekaran, U. (2003) “Research Methods for Business: A Skill-Building Approach”. 4th Edition, John Wiley & Sons, New York. [17] Uriarte, A. (2008). Introduction to Knowledge Management, Jakarta, Indonesia: Asean Foundation. [18] Wiig, K. (1993). Knowledge management foundations: thinking about thinking. How people and organizations create, represent and use knowledge. Arlington, TX: Schema Press. [19] Wilkesmann, U., Wilkesmann, M., and Virgillito, A. (2007). Requirements for Knowledge Transfer in Hospitals How Can Knowledge Transfer be Supported in Hospitals?. Discussion papers des. [20] Zweilef, M. (2001). Human Resource Management, Amman-Jordan, Dar AlFiker for printing, publishing and distribution
  • 33. NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANGLADESH - HYPE OR REALITY? AKM Bahalul Haque Depart of Electrical and Computer Engineering North South University, Dhaka, Bangladesh ABSTRACT Cyber security is one of the burning issues in modern world. Increased IT infrastructure has given rise to enormous chances of security breach. Bangladesh being a relatively new member of cyber security arena has its own demand and appeal. Digitalization is happening in Bangladesh for last few years at an appreciable rate. People are being connected to the worldwide web community with their smart devices. These devices have their own vulnerability issues as well as the data shared over the internet has a very good chances of getting breached. Common vulnerability issues like infecting the device with malware, Trojan, virus are on the rise. Moreover, a lack of proper cyber security policy and strategy might make the existing situation at the vulnerable edge of tipping point. Hence the upcoming new infrastructures will be at a greater risk if the issues are not dealt with at an early age. In this paper common vulnerability issues including their recent attacks on cyber space of Bangladesh, cyber security strategy and need for data privacy policy is discussed and analysed briefly. KEYWORDS CyberSecurity, Cyberdefence, Security Policy, Vulnerability, Cyber Threat, SecurityStrategy For More Details: http://aircconline.com/ijmit/V11N1/11119ijmit03.pdf Volume Link : http://airccse.org/journal/ijmit/vol11.html
  • 34. REFERENCES [1] “Internet Subscribers in Bangladesh December, 2018. | BTRC.” [Online]. Available: http://www.btrc.gov.bd/content/internet-subscribers-bangladesh-december-2018.[Accessed: 25- Nov2018]. [2] C. Team, “Common Vulnerabilities in Cyber Space of Bangladesh,” BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team. [3] “Cyber warfare: Our Achilles’ heel?,” Dhaka Tribune, 17-Dec-2017. [Online]. Available: https://www.dhakatribune.com/opinion/op-ed/2017/12/17/cyber-warfare-achilles-heel/. [Accessed: 23- Nov-2019]. [4] B. Dickson, “What is blockchain?,” TechTalks, 07-Sep-2016. [Online]. Available: https://bdtechtalks.com/2016/09/07/what-is-blockchain/. [Accessed: 3-Jan-2019]. [5] B. Dickson, “How blockchain can improve cybersecurity,” TechTalks, 11-Jan-2017. [Online]. Available: https://bdtechtalks.com/2017/01/11/how-blockchain-can-improve-cybersecurity/. [Accessed: 3-Dec-2019]. [6] “How blockchain can help fight cyber attacks | TechCrunch.” [Online]. Available: https://techcrunch.com/2016/12/05/how-blockchain-can-help-fight-cyberattacks/. [Accessed: 3-Jan 2019]. [7] “What is Blockchain Technology? A Step-by-Step Guide For Beginners.” [Online]. Available: https://blockgeeks.com/guides/what-is-blockchain-technology/. [Accessed: 23-Jan-2019]. [8] “National Cyber Security Strategy”, ICT Division, Govt. of People’s Republic of Bangladesh. Available: http://www.dpp.gov.bd/upload_file/gazettes/10041_41196.pdf . [Accessed: 2-Jan-2019] [9] “Personal Data,” General Data Protection Regulation (GDPR). [10] “GDPR Personal Data and Sensitive Personal Data.” [Online]. Available: https://www.burgessalmon.com:443/news-and-insight/legal-updates/gdpr-personal-data-and-sensitive- personal-data/.[Accessed: 10-Jan-2019]. [11] “Digital Security Act” Act No 46 of the Year 2018, Govt. of People republic of Bangladesh. Available: https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018- Englishversion.pdf . [Accessed: 20-Dec-2019]. [12] “Official Secrets Act, 1923 (Act No. XIX of 1923).” [Online]. Available: http://bdlaws.minlaw.gov.bd/pdf_part.php?id=132. [Accessed: 23-Nov-2019]. [13] “General Data Protection Regulation (GDPR) – Final text neatly arranged,” General Data Protection Regulation (GDPR). [Online]. Available: https://gdpr-info.eu/. [Accessed: 20-Dec-2019]. [14] “(Haque, A K M Bahalul. (2019).Big-Brother-In-1984-The-Modern-Era-Surveillance. International Journal of Scientific & Technology Research. 8. 186-190. [15] “BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team |.” [Online].Available: https://www.cirt.gov.bd /. [Accessed: 05-Feb-2019].
  • 35. AUTHORS AKM Bahalul Haque is currently working a Lecturer of Department of ECE, North South University, Bashundhara, and Dhaka 1229. He has achieved is M.Sc. In Information Technology from Fachhochschule Kiel, Germany, 2018. He achieved his Bachelor of Science (Engineering) in Computer Science and telecommunication engineering in 2014. Has published two of his papers in International Journal. He specializes in Cyber Security, Cloud Computing, Data Privacy and protection. He has one-year experience as Security Engineer and one-year experience as Vulnerability Detection Consultant in Cyber Security Division.
  • 36. CO-EVOLUTION BETWEEN CCC-DRIVEN CASH FLOW MANAGEMENT AND TRANSFORMATION OF R&D – AMAZON’S ENDEAVOR Yuji Tou1 , Chihiro Watanabe 2,3 , Pekka Neittaanmäki2 , 1 Tokyo Institute of Technology, Japan, 2 University of Jyväskylä, Finland and 3 International Institute for Applied Systems Analysis (IIASA), Austria ABSTRACT Amazon became the world R&D leader in 2017 by rapidly increasing R&D investment. The company’s extremely large amount of R&D funds is the result of an ample free cash flow generated by sophisticated cash conversion cycle (CCC) management. Increased R&D induced business advancement and lean cost structure construction leading to further increase in cash flow which has stimulated interaction between vendors, customers, and Amazon via the Amazon marketplace. Activated interaction accelerated CCC advancement, a subsequent free cash flow increase, and user-driven innovation, thus accelerated the transformation of routine and periodic alteration activities into significant improvement simultaneously. All of these components function together as a consolidated sophisticated machine. In light of the increasing concern to R&D resources development without the dilemma of a productivity decline that most digital economies are now confronting, this paper demonstrated the above hypothetical view. An intensive empirical analysis focusing on the development trajectory of Amazon’s techno- financing system over a period from 1997 to 2018 was conducted. An insightful suggestion to neo open innovation that fuses financing management and R&D management was thus provided KEYWORDS R&D, Transformation, Cash flow management, Cash conversion cycle, Amazon FULL TEXT: http://aircconline.com/ijmit/V11N3/11319ijmit01.pdf ABSTRACT URL: http://aircconline.com/abstract/ijmit/v11n3/11319ijmit01.html
  • 37. REFERENCES [1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018. Neo Open Innovation in the Digital Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information Technology 10 (4), 53-75. [2] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2019b. Harnessing Soft Innovation Resources Leads to Neo Open Innovation. Technology in Society, in print. [3] Tou, Y., Watanabe, C., Moriya, K., Vurpillat, V., & Neittaanmäki, P., 2019a. A New Concept of R&D in Neo Open Innovation: Transformation of R&D Triggered by Amazon. International Journal of Managing Information Technology 11 (1) 17-35. [4] Tou, Y., Watanabe, C., Moriya, K., Naveed, N., Vurpillat, V., & Neittaanmäki, P., 2019c. The Transformation of R&D into Neo Open Innovation: A New Concept of R&D Endeavor Triggered by Amazon. Technology in Society 47, in print. [5] Price, R., 2013. Cash Flow at Amazon.Com. Accounting Education 28 (2), 353-374. [6] Fox, J., 2014. At Amazon, It’s All About Cash Flow. Finance & Accounting, 20 Oct. 2014. https://hbr.org/resources/images/article_assets/2014/10/inadifferentleague.png (retrieved 26.06.2019). [7] Naruge, M., 2018. Amazon, The World Top Strategy. Diamond Co., Tokyo. [8] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B, Ed. The Global Internet Economy. MIT Press, Massachusetts. [9] Knott, A.M., 2017. How Innovation Really Works: Using the Trillion-Dollar R&D fix to Drive Growth. McGraw Hill, New York. [10] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random House LLC, New York. [11] Watanabe, C. & Tou, Y., 2019. Transformative Direction of R&D: Lessons from Amazon’s Endeavor. Technovation, in print. [12] Amazon, 2018. Amazon.Com. Inc. Annual Report 2017. Amazon.Com, Inc., Seattle. http://www.annualreports.com/Company/amazoncom-inc (retrieved 06.01.2019). [13] Amazon, 2019a. Amazon.Com. Inc. Annual Report 2018. Amazon.Com, Inc., Seattle. https://ir.aboutamazon.com/static-files/0f9e36b1-7e1e-4b52-be17-145dc9d8b5ec(retrieved 02.07.2019). [14] Bloomberg, 2018. 2018 Global Innovation 1000 Study. Bloomberg, New York. [15] Bezos, J.P., 2005. 2004 Letter to Shareholders. Amazon.com, Inc., Seattle. [16] Amazon, 2019b. Amazon.com, Inc,, Income Statement. Amazon.Com. Inc., Seattle. https://fairlyvalued.com/company/AMZN (retrieved 02.07.2019).
  • 38. [17] Panigrahi, A.K., 2013. Cash Conversion Cycle and Firms’ Profitability. International Journal of Current Research 6, 1484-1488. [18] Zakari, M. and Saidu, S., 2016. The Impact of Cash Conversion Cycle on Firm Profittability: Evidence from Nigerian Listed Telecommunication Companies. Journal of Finance and Accounting 4 (6), 342-350. [19] Zeidan, R. and Shapir, O.M., 2017. Cash Conversion Cycle and Value-enhancing Operations: Theory and Evidence for a Free Lunch. Journal of Corporate Finance 45, 203-219. [20] Uenlue, M., 2018. Amazon Business Model: Three Customer Value Propositions. Innovation Tactics, 22 August 2018. https://www.innovationtactics.com/amazon-business-model-part-2/(retrieved 10.06.2019). [21] Watanabe, C. and Tou, Y., 2003. An Empirical Analysis on the R&D Investment Inducing System in Japanese-style Management. Research Policy and Technology Management 16 (3/4), 184- 202. [22] Bloch, C., 2005. R&D Investment and Internal Finance: The Cash Flow Effect. Economics of Innovation and New Technology, 14 (3), 213-223. [23] Hong, A., Bhattacharyya, D. and Geis, G.T., 2013. The Role of M&A in Market Convergence: Amazon, Apple, Google and Microsoft. Global Economy and Finance Journal 6 (1), 53