This document discusses a proposed context-aware business intelligence framework for South African higher education institutions. It notes that many universities are struggling with performance issues and lack integrated ICT systems to provide analytics and reporting. The research aims to develop a framework that leverages existing data across systems to provide standardized management information and support decision-making. A mixed methods approach is proposed, including surveys, interviews and desktop research to analyze current BI solutions, develop an improved framework, and evaluate its implementation at the University of Venda.
Big Data Courses In Mumbai at Asterix Solution is designed to scale up from single servers to thousands of machines, each offering local computation and storage. With the rate at which memory cost decreased the processing speed of data never increased and hence loading the large set of data is still a big headache and here comes Hadoop as the solution for it.
http://www.asterixsolution.com/big-data-hadoop-training-in-mumbai.html
An overview of information extraction techniques for legal document analysis ...IJECEIAES
In an Indian law system, different courts publish their legal proceedings every month for future reference of legal experts and common people. Extensive manual labor and time are required to analyze and process the information stored in these lengthy complex legal documents. Automatic legal document processing is the solution to overcome drawbacks of manual processing and will be very helpful to the common man for a better understanding of a legal domain. In this paper, we are exploring the recent advances in the field of legal text processing and provide a comparative analysis of approaches used for it. In this work, we have divided the approaches into three classes NLP based, deep learning-based and, KBP based approaches. We have put special emphasis on the KBP approach as we strongly believe that this approach can handle the complexities of the legal domain well. We finally discuss some of the possible future research directions for legal document analysis and processing.
CONNECTING O*NET® DATABASE TO CYBERSECURITY WORKFORCE PROFESSIONAL CERTIFICAT...IJITE
The Occupational Information Network O*NET is considered the primary source of occupational
information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce
readiness certification programs. The O*NET database is used to map out education requirements and how
they relate to professional certifications as required by employers and job designers in accordance with the
National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information
Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Statistics (BLS),
and finally tied back to NICCS source work role to identify certifications requirements. I found that no site
has listed any certification as required, desirable or mandatory. NICCS offered general guidance to potential
topics and areas of certification. Careeronestop site provided the ultimate guidance for this role certification.
Professional certifications are still not integrated in the Cybersecurity Workforce Framework official
guidance.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Big Data Courses In Mumbai at Asterix Solution is designed to scale up from single servers to thousands of machines, each offering local computation and storage. With the rate at which memory cost decreased the processing speed of data never increased and hence loading the large set of data is still a big headache and here comes Hadoop as the solution for it.
http://www.asterixsolution.com/big-data-hadoop-training-in-mumbai.html
An overview of information extraction techniques for legal document analysis ...IJECEIAES
In an Indian law system, different courts publish their legal proceedings every month for future reference of legal experts and common people. Extensive manual labor and time are required to analyze and process the information stored in these lengthy complex legal documents. Automatic legal document processing is the solution to overcome drawbacks of manual processing and will be very helpful to the common man for a better understanding of a legal domain. In this paper, we are exploring the recent advances in the field of legal text processing and provide a comparative analysis of approaches used for it. In this work, we have divided the approaches into three classes NLP based, deep learning-based and, KBP based approaches. We have put special emphasis on the KBP approach as we strongly believe that this approach can handle the complexities of the legal domain well. We finally discuss some of the possible future research directions for legal document analysis and processing.
CONNECTING O*NET® DATABASE TO CYBERSECURITY WORKFORCE PROFESSIONAL CERTIFICAT...IJITE
The Occupational Information Network O*NET is considered the primary source of occupational
information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce
readiness certification programs. The O*NET database is used to map out education requirements and how
they relate to professional certifications as required by employers and job designers in accordance with the
National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information
Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Statistics (BLS),
and finally tied back to NICCS source work role to identify certifications requirements. I found that no site
has listed any certification as required, desirable or mandatory. NICCS offered general guidance to potential
topics and areas of certification. Careeronestop site provided the ultimate guidance for this role certification.
Professional certifications are still not integrated in the Cybersecurity Workforce Framework official
guidance.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Higher education institutions now a days are operating in an increasingly complex and
competitive environment. The application of innovation is a must for sustaining its competitive advantage.
Institution leaders are using data management and analytics to question the status quo and develop effective
solutions. Achieving these insights and information requires not a single report from a single system, but
rather the ability to access, share, and explore institution-wide data that can be transformed into meaningful
insights at every level of the institution. Consequently, institutions are facing problems in providing necessary
information technology support for fulfilling excellence in performance. More specifically, the best practices
of big data management and analytics need to be considered within higher education institutions. Therefore,
the study aimed at investigating big data and analytics, in terms of: (1) definition; (2) its most important
principles; (3) models; and (4) benefits of its use to fulfill performance excellence in higher education
institutions. This involves shedding light on big data and analytics models and the possibility of its use in
higher education institutions, and exploring the effect of using big data and analytics in achieving performance
excellence. To reach these objectives, the researcher employed a qualitative research methodology for
collecting and analyzing data. The study concluded the most important result, that there is a significant
relationship between big data and analytics and excellence of performance as big data management and
analytics mainly aims at achieving tasks quickly with the least effort and cost. These positive results support
the use of big data and analytics in institutions and improving knowledge in this field and providing a practical
guide adaptable to the institution structure. This paper also identifies the role of big data and analytics in
institutions of higher education worldwide and outlines the implementation challenges and opportunities in the
education industry.
A Review of Big Data Analytics in Sector of Higher EducationIJERA Editor
This paper is about the use of big data analytics in higher education. In this paper, we see what the big data is and where does it come from. We will also try to find why the big data analytics has become a buzzword in almost every sector today through our literature review on the big data analytics and its applications in higher education sector. Then we see what the big educational data is, how it is generated and analyzed. We found that the two most important types of analytics are- Learning and academic analytics which will be discussed. Several papers describe the benefits of implementation of analytics in the education sector and the opportunities provided which will be discussed in this paper. We also found that the basic characteristics such as size, speed, variety and some other factors are responsible for some issues and challenges to the use of analytics in this sector. We will discuss those issues and challenges and discuss some proposed solutions to address them.
The effect of technology-organization-environment on adoption decision of bi...IJECEIAES
Big data technology (BDT) is being actively adopted by world-leading organizations due to its expected benefits. However, most of the organizations in Thailand are still in the decision or planning stage to adopt BDT. Many challenges exist in encouraging the BDT diffusion in businesses. Thus, this study develops a research model that investigates the determinants of BDT adoption in the Thai context based on the technology-organizationenvironment (TOE) framework and diffusion of innovation (DOI) theory. Data were collected through an online questionnaire. Three hundred IT employees in different organizations in Thailand were used as a sample group. Structural equation modeling (SEM) was conducted to test the hypotheses. The result indicated that the research model was fitted with the empirical data with the statistics: Normed Chi-Square=1.651, GFI=0.895, AFGI=0.863, NFI=0.930, TLI=0.964, CFI=0.971, SRMR=0.0392, and RMSEA=0.046. The research model could, at 52%, explain decision to adopt BDT. Relative advantage, top management support, competitive pressure, and trading partner pressure show significant positive relation with BDT adoption, while security negatively influences BDT adoption.
This proposed system will help in consulting the career opportunities to the students after 10th, 12th or graduation for their bright future and will show the recent industrial trends in that particular profession. In this system we will be working on real time web-based application which will provide students forum for discussion, real time job updates from industry, different industrial events nearby places, live chat with the professional experts. User can apply for the jobs. Database management, real time system and web-based languages will be used design this application. This proposed system will provide the direct communication platform for students with the industry. This system will help the students or employees to build the professional career, resume according to the format approved by industry. User can update and share their documents and experiences with the industry. This system will provide automated verification system with the help of network security. Priyanka Bodke | Nikita Kale | Sneha Jha | Vaishnavi Joshi"Real Time Application for Career Guidance" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11525.pdf http://www.ijtsrd.com/engineering/computer-engineering/11525/real-time-application-for-career-guidance/priyanka-bodke
In 80386 Microprocessor , the physical memory is organized as a sequence bytes.
The model of memory organization seen by applications programmers is determined by systems-software designers.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
CHALLENGES FOR MANAGING COMPLEX APPLICATION PORTFOLIOS: A CASE STUDY OF SOUTH...IJMIT JOURNAL
This research explores the challenges in management and the root cause for complex application portfolios
in the public sector. It takes Australian public sector organisations with the case of South Australia Police
(SAPOL) for evaluation it being one of the significant and mission critical state government agencies. The
exploratory research surfaces some of the key challenges using interview as primary data collection
source, along with archive records, documentation, and direct observation as secondary sources. This
paper reports on the information analysed surfacing eight key issues. It highlights that the organic growth
of the technology portfolios, with mission criticality has resulted in many quick fixes which are not aligned
with long term enterprise architectural stability. Integration of different mismatched technologies, along
with the pressure from the business to always keep the lights on, does not provide the opportunity for the
portfolios to be rationalised in an ongoing way. Other issues and the areas for further study are explored
at the end.
An Investigation into the Impact of the Electronic Taxation System: A Case St...FinancialMarketCorpo
The Namibian government has benefited to date from information technology in many ways. The
current research attempts to investigate the impact of electronic taxation systems, how well it is used, understood and utilized in developing countries. The importance of understanding and influencing Namibian citizens’
acknowledgement of E-Government services is key, given the substantial investment in government communication, information system technology and the potential for cost saving. One of the most successful E-Government
initiatives, the electronic filing system (e-Filing), allows tax returns to be filed electronically. Despite many taxpayers
adopting this method, a large number are still using the traditional manual method of filing tax returns. A descriptive
research approach, namely the Quantitative method was used to evaluate the impact of electronic taxation systems.
This study utilized the decomposed theory of planned behavior with factors adjusted specifically for Namibia as a
developing country to identify the possible determinants of user acceptance of the e-Filing system among taxpayers. This exploratory study was conducted by means of a questionnaire survey. The questionnaires were completed
by 48 individual taxpayers in Windhoek, which made up the whole sample. The research instruments used were
questionnaires. The data and information collected was inspected for accuracy and completeness. Data collected
was presented in the form of tables, charts and graphs for better understanding. After the data was analyzed the
following findings and conclusions were drawn. Taxpayers using the manual method lack facilitating conditions
such as access to computer and internet resources, which was the most significant barrier to e-Filing usage, while
taxpayers using the electronic method reported perceived usefulness as the primary determinant in their decision to
use e-Filing. Understanding these acceptance factors can extend our knowledge of taxpayers’ decision-making and
lead to better arranging and usage of future EGovernment initiatives in Namibia and other developing countries.
Effect of Technology on Staff Retention: Case Study of Pick N Pay NamibiaFinancialMarketCorpo
Business leaders often realize greater profitability when they have strategies to retain IT employees. However, the cost to replace IT employees creates significant challenges for business leaders. Given the growing impact of
technology on operational costs, retention of IT employees is imperative. This exploratory single case study sought
to identify the strategies that leaders use to increase IT employee retention. The population was employees from
Pick N Pay in Windhoek Namibia, responsible for the retention of IT employees. Herzberg’s two-factor theory was
the conceptual framework for this study. The data was collected from questionnaire that was send through email
by google forms. Data analysis and methodological triangulation which analyzed the answers from questionnaire
It also includes organizations becoming profitable through better employee retention strategies, and it adds to the
body of knowledge that leaders could use to provide stable employment opportunities to individuals. The retention
rates among IT employees affect individuals, families, communities, organizations, and the economy. Implementing
retention strategies may result in improving employee-employer relationships and organizational profitability
Higher education institutions now a days are operating in an increasingly complex and
competitive environment. The application of innovation is a must for sustaining its competitive advantage.
Institution leaders are using data management and analytics to question the status quo and develop effective
solutions. Achieving these insights and information requires not a single report from a single system, but
rather the ability to access, share, and explore institution-wide data that can be transformed into meaningful
insights at every level of the institution. Consequently, institutions are facing problems in providing necessary
information technology support for fulfilling excellence in performance. More specifically, the best practices
of big data management and analytics need to be considered within higher education institutions. Therefore,
the study aimed at investigating big data and analytics, in terms of: (1) definition; (2) its most important
principles; (3) models; and (4) benefits of its use to fulfill performance excellence in higher education
institutions. This involves shedding light on big data and analytics models and the possibility of its use in
higher education institutions, and exploring the effect of using big data and analytics in achieving performance
excellence. To reach these objectives, the researcher employed a qualitative research methodology for
collecting and analyzing data. The study concluded the most important result, that there is a significant
relationship between big data and analytics and excellence of performance as big data management and
analytics mainly aims at achieving tasks quickly with the least effort and cost. These positive results support
the use of big data and analytics in institutions and improving knowledge in this field and providing a practical
guide adaptable to the institution structure. This paper also identifies the role of big data and analytics in
institutions of higher education worldwide and outlines the implementation challenges and opportunities in the
education industry.
A Review of Big Data Analytics in Sector of Higher EducationIJERA Editor
This paper is about the use of big data analytics in higher education. In this paper, we see what the big data is and where does it come from. We will also try to find why the big data analytics has become a buzzword in almost every sector today through our literature review on the big data analytics and its applications in higher education sector. Then we see what the big educational data is, how it is generated and analyzed. We found that the two most important types of analytics are- Learning and academic analytics which will be discussed. Several papers describe the benefits of implementation of analytics in the education sector and the opportunities provided which will be discussed in this paper. We also found that the basic characteristics such as size, speed, variety and some other factors are responsible for some issues and challenges to the use of analytics in this sector. We will discuss those issues and challenges and discuss some proposed solutions to address them.
The effect of technology-organization-environment on adoption decision of bi...IJECEIAES
Big data technology (BDT) is being actively adopted by world-leading organizations due to its expected benefits. However, most of the organizations in Thailand are still in the decision or planning stage to adopt BDT. Many challenges exist in encouraging the BDT diffusion in businesses. Thus, this study develops a research model that investigates the determinants of BDT adoption in the Thai context based on the technology-organizationenvironment (TOE) framework and diffusion of innovation (DOI) theory. Data were collected through an online questionnaire. Three hundred IT employees in different organizations in Thailand were used as a sample group. Structural equation modeling (SEM) was conducted to test the hypotheses. The result indicated that the research model was fitted with the empirical data with the statistics: Normed Chi-Square=1.651, GFI=0.895, AFGI=0.863, NFI=0.930, TLI=0.964, CFI=0.971, SRMR=0.0392, and RMSEA=0.046. The research model could, at 52%, explain decision to adopt BDT. Relative advantage, top management support, competitive pressure, and trading partner pressure show significant positive relation with BDT adoption, while security negatively influences BDT adoption.
This proposed system will help in consulting the career opportunities to the students after 10th, 12th or graduation for their bright future and will show the recent industrial trends in that particular profession. In this system we will be working on real time web-based application which will provide students forum for discussion, real time job updates from industry, different industrial events nearby places, live chat with the professional experts. User can apply for the jobs. Database management, real time system and web-based languages will be used design this application. This proposed system will provide the direct communication platform for students with the industry. This system will help the students or employees to build the professional career, resume according to the format approved by industry. User can update and share their documents and experiences with the industry. This system will provide automated verification system with the help of network security. Priyanka Bodke | Nikita Kale | Sneha Jha | Vaishnavi Joshi"Real Time Application for Career Guidance" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11525.pdf http://www.ijtsrd.com/engineering/computer-engineering/11525/real-time-application-for-career-guidance/priyanka-bodke
In 80386 Microprocessor , the physical memory is organized as a sequence bytes.
The model of memory organization seen by applications programmers is determined by systems-software designers.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
CHALLENGES FOR MANAGING COMPLEX APPLICATION PORTFOLIOS: A CASE STUDY OF SOUTH...IJMIT JOURNAL
This research explores the challenges in management and the root cause for complex application portfolios
in the public sector. It takes Australian public sector organisations with the case of South Australia Police
(SAPOL) for evaluation it being one of the significant and mission critical state government agencies. The
exploratory research surfaces some of the key challenges using interview as primary data collection
source, along with archive records, documentation, and direct observation as secondary sources. This
paper reports on the information analysed surfacing eight key issues. It highlights that the organic growth
of the technology portfolios, with mission criticality has resulted in many quick fixes which are not aligned
with long term enterprise architectural stability. Integration of different mismatched technologies, along
with the pressure from the business to always keep the lights on, does not provide the opportunity for the
portfolios to be rationalised in an ongoing way. Other issues and the areas for further study are explored
at the end.
An Investigation into the Impact of the Electronic Taxation System: A Case St...FinancialMarketCorpo
The Namibian government has benefited to date from information technology in many ways. The
current research attempts to investigate the impact of electronic taxation systems, how well it is used, understood and utilized in developing countries. The importance of understanding and influencing Namibian citizens’
acknowledgement of E-Government services is key, given the substantial investment in government communication, information system technology and the potential for cost saving. One of the most successful E-Government
initiatives, the electronic filing system (e-Filing), allows tax returns to be filed electronically. Despite many taxpayers
adopting this method, a large number are still using the traditional manual method of filing tax returns. A descriptive
research approach, namely the Quantitative method was used to evaluate the impact of electronic taxation systems.
This study utilized the decomposed theory of planned behavior with factors adjusted specifically for Namibia as a
developing country to identify the possible determinants of user acceptance of the e-Filing system among taxpayers. This exploratory study was conducted by means of a questionnaire survey. The questionnaires were completed
by 48 individual taxpayers in Windhoek, which made up the whole sample. The research instruments used were
questionnaires. The data and information collected was inspected for accuracy and completeness. Data collected
was presented in the form of tables, charts and graphs for better understanding. After the data was analyzed the
following findings and conclusions were drawn. Taxpayers using the manual method lack facilitating conditions
such as access to computer and internet resources, which was the most significant barrier to e-Filing usage, while
taxpayers using the electronic method reported perceived usefulness as the primary determinant in their decision to
use e-Filing. Understanding these acceptance factors can extend our knowledge of taxpayers’ decision-making and
lead to better arranging and usage of future EGovernment initiatives in Namibia and other developing countries.
Effect of Technology on Staff Retention: Case Study of Pick N Pay NamibiaFinancialMarketCorpo
Business leaders often realize greater profitability when they have strategies to retain IT employees. However, the cost to replace IT employees creates significant challenges for business leaders. Given the growing impact of
technology on operational costs, retention of IT employees is imperative. This exploratory single case study sought
to identify the strategies that leaders use to increase IT employee retention. The population was employees from
Pick N Pay in Windhoek Namibia, responsible for the retention of IT employees. Herzberg’s two-factor theory was
the conceptual framework for this study. The data was collected from questionnaire that was send through email
by google forms. Data analysis and methodological triangulation which analyzed the answers from questionnaire
It also includes organizations becoming profitable through better employee retention strategies, and it adds to the
body of knowledge that leaders could use to provide stable employment opportunities to individuals. The retention
rates among IT employees affect individuals, families, communities, organizations, and the economy. Implementing
retention strategies may result in improving employee-employer relationships and organizational profitability
Posta Power - Testimonianze Clienti Ascoli PicenoPostaPowerIT
Ecco cosa dicono di noi alcuni degli avvocati e professionisti di Ascoli Piceno che hanno smesso di fare la fila in posta e inviano la propria corrispondenza senza abbandonare il proprio ufficio.
Chiama ora il numero verde e chiedi il ritiro della tua posta in maniera completamente gratuita:
Via Dino Angelini, 33,
63100 Ascoli Piceno AP, Italia
Fabio Ferretti
800-030-671
Posta Power - Testimonianze Clienti RomaPostaPowerIT
Ecco cosa dicono di noi alcuni degli avvocati e professionisti di Roma che hanno smesso di fare la fila in posta e inviano la propria corrispondenza senza abbandonare il proprio ufficio.
Chiama ora il numero verde e chiedi il ritiro della tua posta in maniera completamente gratuita:
Roma 1 Via dei Capocci, 94, 00184
- Konstantin Zavinovskij – 800-642-826
Roma 2 Via Boezio, 6, 00193
- Chiara Napoleoni – 800-710-840
Roma 3 Piazza Mancini 4 00196
- Tomas Lattanzi – 800-984-872
Roma 4 Largo Messico, 16, 00198
– Danilo Filippo Bosco – 800-592-886
Posta Power - Testimonianze Clienti AnconaPostaPowerIT
Ecco cosa dicono di noi alcuni degli avvocati e professionisti di Ancona che hanno smesso di fare la fila in posta e inviano la propria corrispondenza senza abbandonare il proprio ufficio.
Chiama ora il numero verde e chiedi il ritiro della tua posta in maniera completamente gratuita:
Via San Martino, 23
60122 Ancona
Deborah Di Ruscio
800-912-540
ow-a-days data volumes are growing rapidly in several domains. Many factors have contributed to this growth, including inter alia proliferation of observational devices, miniaturization of various sensors ,improved logging and tracking of systems, and improvements in the quality and capacity of both disk storage and networks .Analyzing such data provides insights that can be used to guide decision making. To be effective, analysis must be timely and cope with data scales. The scale of the data and the rates at which they arrive make manual inspection infeasible. As an educational management tool, predictive analytics can help and improve the quality of education by letting decision makers address critical issues such as enrollment management and curriculum Development. This paper presents an analytical study of this approach’s prospects for education planning. The goals of predictive analytics are to produce relevant information, actionable insight, better outcomes, and smarter decisions, and to predict future events by analyzing the volume, veracity, velocity, variety, value of large amounts of data and interactive exploration.
Artificial Intelligence & Business Application.pptxShamraoGhodake2
*Artificial Intelligence- Introduction, use of Artificial Intelligence in Management
Machine Learning.
*Knowledge Management: Concept
*KM Strategies – Architecture and Tools – KM Practices.
*Components and Type of Knowledge , Knowledge Building Models
*KM Cycle & KM architecture, KM tools, KM approaches
*VUCA: Introduction to Volatility, Uncertainty, Complexity,
*Ambiguity (VUCA) –Significance – Challenges in Business - digitalization, globalization, and social inclusion,
*Quantum Computing, Big Data, 5G Ecosystem and its Impact,
*Virtual reality (VR) and augmented reality (AR).
Background: As a result of enormous progress in the information technology and communications, several
organizations adopt business intelligence (BI) applications in order to cope with the development in
business mechanisms, staying at the marketplace, competition, customer possession and retention.
The rapid growing capabilities of both generating and gathering data has created an imperative
necessity for new techniques and tools can intelligently and automatically transform the processed data in
to a valuable information and knowledge. Knowledge management is a cornerstone in selecting accurate
information at the appropriate time from many relevant resources.
Objective: The major Objective of this research is to "examine the impact of business intelligence on
employee's knowledge sharing at the Jordanian telecommunications company (JTC)".
Design/methodology/approach: A review of the literature serves as the basis for measuring the impact of
business intelligence using knowledge sharing scale. The study sample consisted of administrators,
technical staff, and senior managers.75 questionnaires were distributed in the site of JTC. (70)
Questionnaires were collected. (63) Found statistically usable for this study representing a response rate
of (84 %).
Findings: Most important findings for this study demonstrate that business intelligence tools respectively
(OLAP, Data Warehousing, and Data Mining)are highly effect on employee knowledge sharing.
Originality/ Value: Business Intelligence play a significant role in obtaining the underlying knowledge in
the organization, through optimum utilization of data sources the internal and external alike. Several
researches addressed the importance of integrating business intelligence with knowledge management,
little of these researches addressing the impact of business intelligence on knowledge sharing. This study
has tried to address this need.
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
Running Header: 1
APPLICATION DEVELOPMENT METHODS 2
Unit 1 Group Project
Application Development Methods
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
April 10, 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 8
Section 5 - Complete Features and Trade-off Analysis 10
Section 6 - Milestones and Deliverables Based on Date and Dependencies 11
Section 7 - System Architecture Aligned with System Requirements 12
Section 8 - Technical Design Document 13
Section 9 - Design Review Checklist 14
Section 10 - Testing and Deployment 15
References 16
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the .
In his presentation entitled: “FInES Research Roadmap 2025 A Summary of Key Ideas”, Mr. Michele Missikoff from CNR presented the essence methodology and objectives of the FInES Research Roadmap (RR). He also discussed and analyzed the chracteristics and positioning of the 4 FInES spaces - Socio-economic, Enterprise, FInES and Technology.
Data mining technique has a key role in knowledge
extraction from databases to promote efficient decision making.
This paper presents an approach for knowledge extraction from
a sample database of some school dropped students using
association rule generation and classification algorithms to
demonstrate how knowledge-based development policy making
decisions can be processed from the extracted knowledge. A
system architecture is proposed considering mobile computing
devices as user interface to the system connecting mass people
database with cloud computing environment resources. The
causes of education termination are investigated by analyzing the
sample database in terms of attribute value relationship in the
form of association rules to reason about the causes based on the
computed support and confidence. It is observed that if the
affected family had no service holders, the dropped student had
to stop his education because of financial problem. Classification
is applied to classify the dropped students in different groups
based on their level of education.
Running Header: 1
SYSTEM ARCHITECTURE 2
Unit 3 Group Project
System Architecture
Group 4
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
24 April 2019
IT487 – IT Capstone 1
Nolyn Johnson
Table of Contents
Section 1 - Overview of Company and Client Business Case 3
Section 2 - Application Requirement Elicitation Strategy 5
Section 3 - System Components and Design Requirements 7
Section 4 - Methodology for Application Development Process 10
Section 5 - Complete Features and Trade-off Analysis 12
Section 6 - Milestones and Deliverables Based on Date and Dependencies 15
Section 7 - System Architecture Aligned with System Requirements 21
Section 8 - Technical Design Document 24
Section 9 - Design Review Checklist 25
Section 10 - Testing and Deployment 26
References 27
Section 1 - Overview of Company and Client Business Case
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic caree.
Running Header: 1
SYSTEM ARCHITECTURE 24
Group Project
Group 1
Charles Williams
Participating Members
John Holmberg, Sean Austin, Christian Dillon, Charles Williams, Matthew Serdy, Frank Opoku
Non-Participating Members
5/22/2019
IT488 – IT Capstone II (IT488-1902B-01)
Henrietta Okoro
Table of Contents
Section 1 – Project Overview (from IT487) 3
Section 2 – Requirements (from IT487) 5
Section 3 – Design (from IT487) 7
Section 4 - Methodology 10
Determining Methodology 10
Section 5 – Work Breakdown Structure 12
Section 6 – Communication Plan 13
Plan involvement – 13
Stakeholder requirements 14
Key Messages 14
Scheduling 15
Section 7 – Quality Assurance Plan 16
Section 8 – Documentation Plan 17
Section 9 – Quality Assurance and Results of Test Case 18
Project Closure 19
References 20
Section 1 – Project Overview (from IT487)
The company Education Information Systems. (EiS) is an information and management company that specializes in the creation and care of large-scale educational information and technology systems. EiS has implemented and managed systems ranging from the pre-K to 12th year primary school systems, and is developing larger scale systems to facilitate collegiate, graduate and post graduate educational institutions. EiS is a privately held organization that has the primary focus of providing the best possible systems to help grow the educational sector. Previous clients have implemented system wide software replacement and upgrades. With a stellar track record of previous educational institutions, and references, EiS has completed all the projects on time, and within budgetary guidelines. All problem issues or negative feedback from clients were handled in professional and timely manner that resulted in a completely satisfied client.
Moving toward post high school educational institutions, EiS is working with an extremely talented development team to move into the graduate and post graduate sector with ease. With new projects being developed, and more clients, EiS also works to recruit the best talent in the development, and technical aspects of information technology.
The information system to be developed by EiS for the institution will allow for all student, and faculty to store, share, and secure data. Utilizing a web-based UI, the information will be easily accessed, with the proper credentials. Data can be shared among staff, and students with preferences designed to mitigate corruption of data, loss of information, especially personal and financial information. All faculty and staff can be added to the application via an admin portal and all security is designated there. All remote access to the application will require a 2 factor
authentication system for another level of security to ensure that the proper access protocols are being followed. All information that is stored will be designed to the student or faculty member, and kept throughout the students’ academic career or the faculty member’s tenure. The.
Using Machine Learning embedded in Organizational Responsibility Model, added to the ten characteristics of the CIO Master and the twelve competencies of the workforce can help lead the Digital Transformation of the traditional public organizations to the Exponential.
Uncovering the Potential_ Examining Bhopal's Data Science Courses.pptxtech23250
To bridge the gap between theory and practice, many data scientist courses in Bhopal emphasize hands-on learning experiences. Participants engage in practical exercises, projects, and case studies, working with real-world datasets to apply theoretical concepts in practical scenarios. Through hands-on experimentation and exploration, students develop proficiency in data analysis, modeling, and interpretation.
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxclarebernice
CIS 599 – Student Notes
(Prerequisite: To be taken last or next to last)
COURSE DESCRIPTION
This course is an integrative capstone course for the Master of Science in Information Systems program. Students will examine and solve real-world projects and problems, and apply project management techniques to create practical solutions. The course takes an integrative and senior management approach to address the integration of a broad range of technologies inclusive of databases, security, networking, computer infrastructure, and human computer interaction.
INSTRUCTIONAL MATERIALS
Required Resources
Lane, D. (2011). The chief information officer's body of knowledge. Hoboken, New Jersey: John Wiley & Sons, Inc.
Stenzel, J. (2011). CIO best practices (2nd ed.). Hoboken, New Jersey: John Wiley & Sons, Inc.
Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as OpenOffice, Dia, and Open Project are required. Tutorials for Microsoft Office 2010 can be found on Microsoft’s support site, located at http://office.microsoft.com/en-us/support/training-FX101782702.aspx.
Supplemental Resources
Association for Computing Machinery Website. (2012). General format. Retrieved from http://www.acm.org/
National Security Agency – Central Security Service Website. (2009). General format. Retrieved from http://www.nsa.gov/
The Committee on National Security Systems Website. General format. Retrieved from http://www.cnss.gov/
COURSE LEARNING OUTCOMES
1. Describe the integrative functions and activities within the information systems area, including the role of the CIO and technologies managed within the organization.
2. Evaluate how information technology (IT) is aligned with the strategy of the organization, and how to make appropriate choices about architecture in relationship to overall organization goals.
3. Explain how to develop reasoned responses to the major forces shaping the role of IT in organizations competing in a global economy.
4. Describe the methods and best practices in implementing process change in IT organizations.
5. Describe the role and methods of technology-induced process improvement in organizations.
6. Develop an integrative technology project plan to address and solve a proposed business problem.
7. Explain the competitive advantage that information technology affords organizations.
8. Summarize economic factors of information systems at the enterprise level.
9. Describe the ethical role of IT within organizational, social, and environmental settings.
10. Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
11. Use technology and information resources to research issues in information systems.
12. Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.
WEEKLY COURSE SCHEDULE
The standard requirement for ...
ICFAI IT and Systems - Solved assignments and case study help
ALFRED_MUTANGA_CABIF
1. A Context-Aware Business Intelligence
Framework for South African Higher Education
Presented at the 22nd SAAIR Conference 2015
2. INTRODUCTION
• A number of HEIs are falling below expected proficiency levels
(Piedade & Santos, 2010)
• Universities have to measure, monitor and understand various
metrics that constitute their performances
• An ICT infrastructure that facilitate the management at HEIs to
get meaningful information for decision making is indispensable
(Guster & Brown, 2012)
• Many HEIs find it difficult to leverage existing information stored
as independent silos and implement integrated ICT
infrastructures that assist providing analytics and reporting.
3. INTRODUCTION (cont.)
In South Africa:
• Universities need to standardize technologies that provide
management information , for example, HEMIS and
Operational data from peripheral Systems
• Institutions have to achieve organizational intelligence by
developing contextualized decision support systems
• Institutions have to harness skills, processes, technologies,
applications and practices that leverage external and internal
data assets that support and improve decision making
(Sharman, 2010, Piedade & Santos, 2010; Lock, 2011;Guster & Brown, 2012)
4. Problem Statement
The problems facing higher education institutions include:
The overarching aim of this research is; to bring out the scientific nuggets that
elucidate that MIS technologies in HEIs should be based upon theory and
supported by suitable academic practices.
• Shrinking government budget to institutions
• Attracting and admitting high quality students, including attracting
skilled and competent staff
• Large amounts of data stored in silos and the data integration
capability is almost non-existent
• Implementation of BI using one-size-fits-all approach
• Selecting a technology and linking it with the theoretical foundations
of Information Systems Research
5. Research Question one
RQ1: What are the conceptual foundations of the business
Intelligence frameworks currently used in the South African
public Higher Education Institutions, and are these
technological entities theoretically and practically
contextualised?
– The research question guides in scanning the R.S.A. HE sector
and solicit information concerning the current BI solutions and
frameworks and contextualize them.
– We then Customize a Business Intelligence Framework for the
sector.
Data Collection instruments for this Research include -:
– Desktop Research,
– Surveying & Interviewing MIS champions in the SA HEIs,
– Relevant Documentation for SA HE (Statutory, legislative etc.)
6. Research Question Two
RQ2: What Context-Aware Business Intelligence Framework is
Suitable for South African Higher Education Sector, and
Why?
Grounded on the first research question, it is further
authenticated by:
- Design Science Research as theorised and publicised by
Gregor and Hevner (2013)
- Design is what derives innovations and artifacts in the field of
information systems.
- Constructs, models, methods and instantiations of design
theory in BI for HE are solicited to come with a CABIF
- Synthesis and analysis of the data collected is fundamental in
collective intelligence from the Higher Education sector
7. Research Question Three
RQ3: How and what technology can the Context-aware business
intelligence framework be implemented as a vehicle for
decision making processes at the university of Venda?
Practical implementation of the developed CABIF:
- Soliciting Information Systems Theory as theorised and
publicised by Gregor and Hevner (2013)
- Contextualizing reports for decision making.
- A Performance Evaluation Balanced-Scorecard implemented
within the realm of CABIF and selected technology
- Predicting and presenting useful data for Strategic Planning
- Determining the end-users’ perceived adoption and
acceptance of the implemented technology
Data Collection instruments include:
– Technology Acceptance Survey
– Desktop research
8. Hypothesis
• Hypothesis 1: There is a negative relationship between the age of the user and
(a) perceived ease of use and (b) perceived usefulness for using the context-
aware business intelligence solution at university of Venda
• Hypothesis 2: There is a positive relationship between the experience of the
user and (a) perceived ease of use and (b) perceived usefulness for using the
context-aware business intelligence solution at university of Venda
• Hypothesis 3: There is a positive relationship between perceived ease of use
and the attitude for users of the context-aware business intelligence solution.
• Hypothesis 4: There is a positive relationship between perceived usefulness
and the attitude for users of the context-aware business intelligence solution.
• Hypothesis 5: There is a positive relationship between attitude and the
intention of using the context-aware business intelligence solution at university
of Venda
• Hypothesis 6: There is a positive relationship between intention to use and the
actual usage of the context-aware business intelligence solution at university of
Venda
• Hypothesis 7: There is a positive relationship between facilitating factors and
the actual usage of the context-aware business intelligence solution at university
of Venda
9. Research Aims and Objectives
This study aims to develop and implement a Context-Aware Business
Intelligence Framework for the South African Higher Education Sector
This aim can be achieved through:
a) Leveraging the collective knowledge of the existing BI Systems
in the sector to accommodate a CABIF for the sector
b) Establishing practices and processes for management
information to end-users
c) Streamlining the collection and integration of institutional data
assets and provide comprehensive reporting for management
information
d) Measuring the institutional performance against its strategic
objectives
e) Providing institutional data valuable for strategic planning
f) Evaluating the technology acceptance on the rolled out
technology based CABIF
10. Theoretical Framework
The theoretical Framework for this research study is being informed
by:
• The field of Management Information Systems (MIS) in the
Higher Education Sector
• The role played by Business Intelligence in Higher Education
• Therefore the theories, constructs and concepts of
Business intelligence have been explored to form a
fundamental basis for the construction of a Context-Aware
Business Intelligence within the South African Higher
Education Sector
11. • Business Intelligence, phrase was coined in 1865 by Richard
Millar Devens in his book “Cyclopaedia of Commercial and
Business Anecdotes”
• It was with the 1958 publication of a landmark article entitled “A
Business Intelligence System”, written by IBM computer scientist
Hans Peter Luhn, that the potential of BI was recognized
• First Generation Business Intelligence (1990s – Early 2000s)
• Second Generation Business Intelligence Technologies (2000s)
• BI and the Proliferation of Internet Technologies (2000s)
• Self-Service Business Intelligence
• Cloud BI and Mobile Business Intelligence (Current)
History of Business Intelligence
12. Business Intelligence Maturity Models
• TDWI BI Maturity Model
• Business Information Maturity Model
• Gartner’s Maturity Model for Business Intelligence and
Performance Management
• AMR Research’s Business Intelligence/Performance
Management Maturity Model, Version 2
• Business Intelligence Maturity Hierarchy
• The Infrastructure Optimization Maturity Model
• Oficina de Cooperacion Universitaria (OCU) Maturity Model for
Institutional Intelligence
• Joint Information Systems Committee (JISC) BI InfoKit V
The proliferation of BI maturity models, is an indication that BI has
become an essential element of the information pipeline and an
important ingredient of organizational success
13. Previous Research
• Many higher education institutions are faced with the
problem of the “Execution Gap”, (Beckett & McComb,
2012; Covey, 2012)
• Creation of business value through IT implementations in
HE(Van Dyk, 2008; Guster & Brown, 2012; Wagner&
Weitzel, 2012)
• BI in HE has been researched and documented (Angelo,
2007, Beckett & McComb, 2012; Grabova et al.,
2010,Guster & Brown, 2012; Wagner& Weitzel, 2012)
• Previous research has been focusing on technology and
information security
• This research take a context in Higher education as a
premise for BI implementations in Higher Education
14. Context-Aware
“Context is any information that can be used
to characterize the situation of an entity. An
entity is a person, place, or object
considered relevant to the integration
between user and an application, including
the user and the application themselves”
(Anagnostopoulos & Hadjiefthymiades, 2010,2013)
In our research context we refer to context as business
processes, statutory requirements, technology resources and
human resources involved in management information systems
within the South African Higher Education Sector
15. Findings from Literature
• The link between BI maturity, organizational success and the
impact of BI initiatives is not quite clear;
• The BI maturity models concentrate on addressing classical
IT topics rather than embracing the organizational structure,
the legislative framework governing the operations of the
organizations, efficiency and organizational strategies;
• The alignment of BI strategy, technology, and business
strategies are rarely addressed within the maturity models
described in literature;
The BI initiatives within organizations have should be
conceptualized on the basis of information systems success
models and the inherent underlying conceptual frameworks
16. Research Design & Methodology
• The MIS field has provoked debate whether it has native
research theories, i.e., “theories specifically developed to
describe, explain, predict or design management
information system phenomenon” (Straub, 2012)
• In our research we use Mixed Method Research design
as theorised and publicised by (Venkatesh, Brown &
Bala, 2013; Zachariadis, Scott, & Barret, 2013)
• The Design Science Research Approach as
developed by Gregor & Hevner, 2013 is used in the
development of CABIF
• A modified Technology Acceptance Model (Davis,
1989) is used to measure the adoption and acceptance
of CABIF at UNIVEN
17. Topic of interest: BI in SA HEIs
Theoretical propositions:
Literature Review
exploratory
Interviews/
Surveys
Data
collection
Data
analysis
Survey
Research;
Technology
Acceptance
Model Data
collection
Data
analysis
Quantitative Research
design
Qualitative Research design
Semi-Structured
interviews
Data
collection
Data
analysis
University
of Venda:
Case Study
Assessment or
Elimination Phase
Meta-inferences & Causal
Mechanisms
Quantitative
Inference
Qualitative
Inference
Iterative process
Research progress
Data
analysis
Data
collection
18. Research
Opportunities and
Problems
Vision and Imagination
Research
Questions(RQ2)
Application Environment:
South African Higher
Education
Ω Knowledge
Contribution
to Ω
Knowledge
Informing Ω
Knowledge
Constructs Models Methods Instantiations
Design Theory
β Knowledge
Cognitive
- Creativity
- Reasoning
- Analysis
- Synthesis
Social
- Teamwork
- Collective
Intelligence
Human
Capabilities
Design Science Research, Gregor & Hevner, 2013, p.344
20. Why Mixed Research?
• Complementarity
– Used to gain complimentary views about the same phenomena
• Completeness
– Complete picture of a phenomenon is obtained
• Developmental
– Questions from one strand emerge from the inference of a previous one (one
strands may provide hypothesis to be tested to the next)
• Expansion
– Explain or expand upon the understanding obtained from one approach
• Corroboration/Confirmation
– Used in order to assess the credibility of inferences obtained from one approach
• Compensation
– Enable to compensate for the weaknesses of one approach by using the other
• Diversity
– Used with the hope of obtaining divergent views of the same phenomenon
(Venkatesh, Brown, & Bala, 2013, p.6)
21. Data Collection Instruments
Online Survey being deployed in
South African Public Higher
Educations cover the following
areas:
• Business and Technology
Alignment
• Organizational and Behavioural
Strategies
• Technology Strategies
• Business Intelligence
22. Intentional Population and Sample
• The population & Sample consists of:
– Information technology professionals at various
universities,
– Institutional Planning members
– Management information professionals and
Institutional researchers and data scientists.
Selection Criterion is Intentional
23. Data Analysis Approach
• Qualitative Data Analysis
– Obtaining data from sufficient interviewees in such a way that the
likelihood of reaching any kind of saturation point in the data (from
a qualitative perspective) is extremely likely.
– The coding of the data from interviews is going to be explicit in the
data analysis and an emphasis in the use of coding text into
various themes.
• Quantitative Data Analysis
– Principal Component Analysis is Used to analyse data from
Surveys
– The reliability of each of the measured variables will be
investigated with Cronbach’s alpha
– Correlations among variables will be calculated and the variables
in each of the seven hypothesis will be explored through
regression analysis
24. Publications from the Research
• Mutanga, A. A Context-Based Business Intelligence Solution
for South African Higher Education, 2014 SCIEI International
Conference on Information Management and Industrial
Engineering (ICII 2014), Dubai, UAE, August 22-23, 2014
• Mutanga, A. (2015). A Context-Based Business Intelligence
Solution for South African Higher Education. Journal of
Industrial and Intelligent Information (JIII), 3(2), 119-125
• Mutanga, A. A Context-Based Business Intelligence Solution
for South African Higher Education, AITEC ICT Southern
Africa Summit, Maputo, Mozambique, April 2-4, 2014
26. Technology Choice
• Leverage Existing
Systems at UNIVEN
• Be Platform Independent
• Visualization
• Self-Service Capabilities
• User driven
27. Significance of the Research
• Contributions to knowledge
– Theory and practice of management information
systems in higher education
• Contributions to practice
– Promote a culture of evidence to drive decision
making processes in the higher education sector
• Contributions to Policy
– Provide for an impetus for higher education
executives and management to develop data
governance policies
– Encourage higher education practitioners to develop
ICT strategies that align with core business of the
institution
28. Selected References
• Davis, F. (1989). Perceived Usefulness, Perceived Ease of Use and User
Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340.
• Guster, D., & Brown, C. G. (2012). The Application of Business
Intelligence Higher Education: Technical and Managerial Perspectives.
Journal of Information Technology, XXIII(2), 42-62.
• Venkatesh, V., Brown, S. A., & Bala, H. (2013). Bridging the Qualitative-
Quantitative Divide: Guidelines for conducting Mixed Methods Research in
Information Systems, MIS Quarterly, 37(1), pp. 21-54
• Weiss, M. (2012). APC Forum: Harvesting Digital Data Streams. MIS
Quarterly, 11(4), 205-206.
• Xuea, W., Pung, H. K., & Sen, S. (2013). Managing context data for
diverse operating spaces. Pervasive and Mobile Computing, 9(2013), 57-
75.
• Zachariadis, M., Scott, S., & Barret, M. (2013). Methodological
Implications of Critical Realism for Mixed-Methods Research, MIS
Quarterly,Vol.37(3), pp. 855-879
29. Acknowledgements
Promoter: Prof. A. Kadyamatimba
Co-Promoter: Prof. N. Mavetera
Co-Promoter :Dr JJ Zaaiman
University of Venda for funding the Research
IDSC: BI Technology Sponsorship
This research is part of my doctoral research and would like to
acknowledge the following: