In this paper, we investigated the knowledge management (KM) behavior of executives in Malaysia who work in different sectors and involved in Information Technology (IT) related fields. We proposed a conceptual framework based on the Theory of Reasoned Action (TRA), the Theory of Planned Behavior (TPB) and Unified Theory of Acceptance and Use of Technology (UTAUT) to study their intention and involvement in KM initiatives. The knowledge creation theory (SECI process) was employed to operationalize KM intention and KM behavior. We proposed six independent variables that represent the social-cultural nature of KM as the antecedence of KM intention. These variables are trust, management support, decentralization, IT support, performance expectancy (PE), and effort expectancy (EE). Seventy-four executives from both private and government-linked organizations responded to our online questionnaire. SmartPLS3 was used to run the analysis. The reliability was ensured with the factor loadings, Cronbach’s alpha, Composite Reliability (CR) that met the fit requirement of above 0.6, 0.7 and 0.7 respectively. The convergent validity was confirmed through average variance extracted (AVE) that met the fit requirement of above 0.5. The discriminant validity was assessed by using Fornell and Larcker’s criterion. Finally, the structural model confirmed that only PE of KM, and EE of KM are the significant predictors of KM intention and the KM intention significantly predicts KM behavior. The implications of the findings are discussed in detail at the end of the paper.
2007 integrating technology readiness into technology acceptance the tram modelNita Adiyati
This document presents the Technology Readiness and Acceptance Model (TRAM), which integrates the constructs of technology readiness (TR) and the technology acceptance model (TAM). TRAM was developed to better explain consumer adoption of e-services, as TAM was originally developed for technology adoption in work environments. The study proposes that TR influences perceptions of usefulness and ease of use, which in turn influence behavioral intention, as mediated relationships. An online survey was conducted to test the relationships between the TRAM constructs in the context of online stock trading systems.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
IRJET- Campus E-Voting in a Developing Nation: An Application of the Unified ...IRJET Journal
This document summarizes a study that applied the Unified Theory of Acceptance and Use of Technology (UTAUT) model to examine students' perceptions of campus e-voting in Malaysia. A survey was administered to 300 students. The results found that performance expectancy, effort expectancy, social influence, trust, and computer anxiety influenced behavioral intention to use campus e-voting. Specifically, students were most likely to vote online if the system was accessible and they believed it would enhance their performance. Overall, students had positive perceptions of campus e-voting.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
Exploring the behavioral intention to use e-government services: Validating t...Mark Anthony Camilleri
This study explores the online users’ behavioral intention to utilize the governments’ websites and their electronic services. The research methodology validates the measuring items from the unified theory of acceptance and use of technology (UTAUT) to better understand the participants’ attitudes toward their performance expectancy, effort expectancy, social norms, facilitating condition and behavioral intention to use the electronic government (e-gov) services. The findings from the structural equations modeling approach reported a satisfactory fit for this study’s research model. The results suggest that there were highly significant, direct effects from the UTAUT constructs, where the utilitarian motives predicted the online users’ behavioral intentions to use e-gov. Moreover, there were significant moderating influences from the demographic variables, including age, gender and experiences that effected the individuals’ usage of the governments’ online services. In conclusion, this contribution identifies its limitations and suggests possible research avenues to academia.
2007 integrating technology readiness into technology acceptance the tram modelNita Adiyati
This document presents the Technology Readiness and Acceptance Model (TRAM), which integrates the constructs of technology readiness (TR) and the technology acceptance model (TAM). TRAM was developed to better explain consumer adoption of e-services, as TAM was originally developed for technology adoption in work environments. The study proposes that TR influences perceptions of usefulness and ease of use, which in turn influence behavioral intention, as mediated relationships. An online survey was conducted to test the relationships between the TRAM constructs in the context of online stock trading systems.
INVESTIGATING TANZANIA GOVERNMENT EMPLOYEES’ ACCEPTANCE AND USE OF SOCIAL MED...IJMIT JOURNAL
The aim of this paper was to present factors which influence work-related adoption of social media among
government employees. The study adapted the Unified Theory of Acceptance and Use of Technology
(UTAUT) and integrated it with three constructs namely Hedonic Motivation (HM), Perceived Personal
Image (PI) and Attitude (AT). The sample of study consisted of 600 usable responses collected using survey
questionnaire from employees based in Tanzania Ministries, Departments and Agencies (MDAs) employing
convenience sampling technique. The data was analyzed using Structural Equation Modelling. The results
showed that, PI and HM influence attitude (AT), while PI, Social Influence (SI) and AT influence Behavior
Intention (BI). Moreover, SI, PI, AT and BI showed significant effect on actual Use Behavior. Furthermore,
the results showed that PI is affected positively by HM and SI. The added constructs proved to be important
modifications to the UTAUT model as suggested by the increase in explained variance by UTAUT from
70% to 73% on BI and from 53% to 73% on actual use behavior.
Evaluation of Factors Affecting the Adoption of Smart Buildings Using the Tec...Eswar Publications
Objective: This study aimed to find a solution to the acceptance of smart buildings in Iran using the technology
acceptance model (TAM). The main research question is the significance of this model relationships, as well as the
anticipated adoption of smart buildings in Iran using variables included in the model.
Methods: This descriptive study, is based on survey data collection methods and the way of analyzing data is correlational and casual study. Measurement tool was designed based on the standardized questionnaire presented by Davis. The reliability coefficient was 0.88. Statistical population is unlimited and included citizens of Iran in 1395. The sample consisted of 388 individuals. Given the infinity of society and Cochran formula, 384 individual is sufficient for
this research. This study is a random sampling one that was done in the period of 30 days.
Findings and conclusions: The results revealed that all relationships in the model are significant. And among the
variables of the model, perceived usefulness, the attitude toward using, and features of smart buildings had the most
intense relationship in acceptance this technology. Using regression equations, each of the dependent variables in the
model, is predictable by the independent variables.
Innovation of research: The intensity of relationship between variables in technology acceptance model and impact of each variable in explaining the criterion factor was analyzed.
Research limitations: Many people tend not to complete the questionnaire and some ones answer questions unrealistic. Despite all the explanations to justify the respondents, still there are possible directions in responses.
Practical consequences: Using regression equations obtained in this study, we can predict the criterion variables in the
model of technology adoption.
Research on the field of using social media has gained more importance in the recent days due to the rapid development of social media technologies. Looking at the behavioral intention and attitude of using social media for collaborative learning within Malaysian higher educational institutions and the influencing factors in this regard has received little attention by researchers. The study aims at examining the determinants that affect learners’ attitude and behavior intention regarding their use social media to achieve collaborative learning. Such examination is carried out by using the Theory Acceptance Model (TAM) and Unified Theory of Acceptance and Usage of Technology (UTAUT). A total of 243 participants were recruited for this study. The findings indicated that students’ attitudes and behavior are strong indicators of their intentions in terms of using social media in collaborative learning.
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
IRJET- Campus E-Voting in a Developing Nation: An Application of the Unified ...IRJET Journal
This document summarizes a study that applied the Unified Theory of Acceptance and Use of Technology (UTAUT) model to examine students' perceptions of campus e-voting in Malaysia. A survey was administered to 300 students. The results found that performance expectancy, effort expectancy, social influence, trust, and computer anxiety influenced behavioral intention to use campus e-voting. Specifically, students were most likely to vote online if the system was accessible and they believed it would enhance their performance. Overall, students had positive perceptions of campus e-voting.
Extending UTAUT to explain social media adoption by microbusinessesDebashish Mandal
This paper establishes inadequacies of the Unified Theory of Acceptance and Use of Technology (UTAUT) theory to explain social media adoption by microbusinesses. Literature review confirms the explaining power of UTAUT in variety of technology adoption by businesses. This paper uses UTAUT theory to implement social media technology in microbusinesses. Canonical action research method is adopted to introduce social media in microbusinesses. A post positivist approach is used to report the results based on a predetermined premise. It was found that the major constructs of performance and effort expectancy played insignificant role in establishing behavioural and adoption intention of social media by microbusinesses. Social influence and facilitating condition did not influence the behavioural intentions of the microbusiness owners. Individual characteristics and codification effort dominated the use behaviour. Goal of gaining customers leads to behavioural modification resulting in replacing of behavioural intention with goals as a superior method of predicting adoption behaviour within the context of microbusinesses. This paper extends the UTAUT to explain social media adoption in microbusinesses.
Exploring the behavioral intention to use e-government services: Validating t...Mark Anthony Camilleri
This study explores the online users’ behavioral intention to utilize the governments’ websites and their electronic services. The research methodology validates the measuring items from the unified theory of acceptance and use of technology (UTAUT) to better understand the participants’ attitudes toward their performance expectancy, effort expectancy, social norms, facilitating condition and behavioral intention to use the electronic government (e-gov) services. The findings from the structural equations modeling approach reported a satisfactory fit for this study’s research model. The results suggest that there were highly significant, direct effects from the UTAUT constructs, where the utilitarian motives predicted the online users’ behavioral intentions to use e-gov. Moreover, there were significant moderating influences from the demographic variables, including age, gender and experiences that effected the individuals’ usage of the governments’ online services. In conclusion, this contribution identifies its limitations and suggests possible research avenues to academia.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
The Effects of Organizational Changes Towards Students' EmotionNada Rahmah Majied
This paper have been presented at 5th Global Conference Business and Social Science (GCBSS) organized by Global Academy of Training and Research (GATR) at Bangsar South-Kuala Lumpur- Malaysia, 4-5 May, 2017.
Abstract:
Organizational change can produce a number of positive and negative emotional responses. This study uses the Theory of Emotional Contagion (Hatfield, Cacioppo & Rapson, 1993) where negative as well as positive feelings can be transferred to others. The aims of the study are to examine the effects of perception on technological change, leadership change and structural change towards students’ emotions; and to analyze the mediating effect of experience on perception and emotion resulting from organizational changes. The study employs the quantitative research design using the survey method with the self-administered questionnaire. A total of 223 respondents was collected from among the undergraduate students at a faculty in a public university who have faced organizational changes (technological, leadership and structural). Results reveal that perceptions of technology, leadership and structural changes are found to have moderate effects on students’ emotions. However, experiences of change partially mediate students’ emotion and perception of technological, leadership and structural changes. Experience with organizational changes affects students’ emotions badly. This implies that the Emotional Contagion Theory holds true for organizational changes as the hypotheses are supported.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
The Role of Organizational and Individual Factors in Knowledge Management Sys...journalBEEI
The aim of this study is to investigates the how individual and organizational factors influence people behavior in using knowledge management. This research applied Technology Acceptance Model (TAM) as a basis theory; TAM was enriched with individual and organizational factors for this study. A survey approach was conducted for data collection. Three of institutions in Banking Sector at Indonesia were invited to join this study and 215 knowledge workers were participated for the survey. Data from survey were analyzed through Structural Equations Model (SEM) using PLS (Partial Least Square) V2. The conclusion specify that ‘‘individual elements’’ and ‘‘organizational elements’’ are the significantly affect people behavior in KMS acceptance factors that influence knowledge worker behavior in knowledge sharing. However this study not found relationship between individual and organization factors and “perceived ease of use” construct with people behavior in accept KMS.
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...QUESTJOURNAL
ABSTRACT: This is a review of theoretical models most recently used in Information Technology adoption research. A literature review approach has been adopted. More than 25 literatures were reviewed in the area of information adoption covering the last 30 years. We identified the strengths and weaknesses of each of the theory used. It is found that Technology Acceptance Model is by far the most used to underpin research work in this area follow by Theory of planned behaviour.
WHY KNOWLEDGE MANAGEMENT SYSTEM FAILED by DANIEL DONI SUNDJOJODaniel Doni
The document discusses why knowledge management systems often fail in organizations. It argues that for a KM system to be effective, an organization must first transform into a learning organization where there is a culture of learning, motivation to learn, and a willingness to challenge assumptions. The document presents research from a case study of an internet services provider that implemented a KM system alongside strategic, policy, and operational learning initiatives. The results showed that the KM system was effective because the company had transformed into a learning organization where sharing knowledge and improving was a priority.
This document summarizes a research study conducted at Politeknik LP3I Bandung examining the influence of organization structure, work environment, and motivation on employee performance. The study used a quantitative approach, surveying 55 employees. The results found that organization structure, work environment, and motivation all positively influence employee performance. An appropriate organization structure and positive work environment are important for improving employee welfare and motivation, which enhances performance and allows the organization to achieve its goals.
The Effect Of Firm Size And Organizational Culture On The Quality Of Financial Reporting In Sharia Microfinancing Institution (Baitul Maal Wa Tamwil) (The Case Of Ex Banyumas Residency-Indonesia)
This document summarizes a study exploring the practice of the Tawhidic Paradigm (TP) in organizational policy and strategy of small and medium enterprises in Klang Valley, Malaysia. The study found that while entrepreneurs said they practiced TP according to Islamic teachings, they still faced challenges sustaining their businesses. However, they maintained strong faith in Allah and worked hard as an act of worship. The document argues that while TP in organizational policy and strategy is significant theoretically, more research is needed to prove its practical impact due to a lack of existing examples.
This document discusses factors that affect firm value for public manufacturing firms in Indonesia, including social responsibility, corporate governance, company size, and profitability. It provides background on the relationship between these factors and firm value based on prior literature. Theoretical frameworks discussed that may explain these relationships include agency theory, stakeholder theory, legitimacy theory, positive accounting theory, and signaling theory. The purpose of the study is to develop a new model of the relationships between these exogenous, intervening, and endogenous variables based on these theories and prior empirical research.
This document summarizes a research paper that investigated tax awareness and perceptions of tax education among business and non-business students in Indonesia. The research found that there was no significant difference in contextual or ethical tax awareness between the two groups of students. However, business students were more likely to believe that tax knowledge would be useful for their future and that tax education should be an important part of higher education. The results imply that business programs should evaluate how they teach topics related to taxation since their students' awareness levels were similar to non-business students who do not learn about taxes.
This document provides a literature review on the use of grounded theory in management research. It discusses:
1) Grounded theory was introduced in the 1960s by Glaser and Strauss as a qualitative research method to develop theories grounded in empirical data. It aims to close the gap between theory and research.
2) Grounded theory involves collecting and analyzing qualitative data through open, axial, and selective coding to develop conceptual categories and explore their relationships. It produces explanatory theories rather than testing existing hypotheses.
3) Grounded theory has evolved over time, with Glaser developing an emerging design approach and Strauss a more structured systematic design approach. It remains a useful method for developing new concepts and theories in management and
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
This document summarizes a research study on the antecedents and consequences of job satisfaction and organizational commitment among internal auditors in the telecommunications industry in Indonesia. Specifically, it analyzes how the work environment influences job satisfaction and organizational commitment, and how job satisfaction and organizational commitment then impact organizational citizenship behavior. The study aims to answer four research questions regarding the relationships between these variables. It distributed 162 survey questionnaires to internal auditors and used path analysis to analyze the data. The results showed that a conducive work environment leads to greater job satisfaction and organizational commitment, which then encourage employees to exhibit organizational citizenship behavior to help achieve organizational goals.
This document discusses adding an environmental perspective to the balanced scorecard (BSC) as a way to improve corporate social responsibility (CSR) implementation in Indonesia. It notes that CSR implementation and reporting is currently low in Indonesia due to companies viewing CSR as an added expense without clear financial benefits. The document suggests including environmental factors in company performance measurement through the BSC, with the hypothesis that linking environmental performance to financial and non-financial metrics may change company mindsets about CSR. It provides background on the BSC's traditional four perspectives and argues for adding an environmental perspective to create a more comprehensive performance assessment.
Factors relating to the academic achievement and home environment in economic...prjpublications
This document discusses factors related to academic achievement and home environment of economics students in higher secondary school. It analyzes the relationship between academic achievement, gender, type of school (public or private, urban or rural), and aspects of home environment. The study uses surveys from 409 students in Namakkal district, Tamil Nadu, India. It finds significant differences in home environment scores between boys and girls, and between urban and rural school students. The document establishes several hypotheses about the relationships between these variables and analyzes them to understand factors influencing student achievement.
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
This document summarizes a study that investigated factors affecting acceptance of e-learning among students at Universiti Utara Malaysia (UUM). The study tested a model combining the Technology Acceptance Model (TAM) with variables from the Theory of Planned Behavior and Social Cognitive Theory. It found that perceived usefulness and perceived ease of use positively influenced e-learning usage, but social pressure and internet self-efficacy did not. The implications are that universities should focus on developing useful e-learning content to encourage student adoption. A survey of 256 business students found that most used e-learning a few times a week, indicating a moderate overall usage level.
Conceptualizing Information Technology Governance Model for Higher Education:...journalBEEI
Information Technology (IT) governance has been emerging as a central issue in many organizations. This is because IT governance is key to realizing IT business value. Past studies have focused on the three aspects of IT governance, namely, structural capability, process capability and relational capability. At the same time, some studies have suggested that IT governance process should be viewed as a learning process rather than a problem solving process. Based on this scenario, the role of knowledge and knowledge based processes should be the central focus of IT governance. As a learning process, IT governance effectiveness can be determined by how much impact IT governance practices has influenced on decision-makers’ thinking and actions. In this case, knowledge capacity absorbed from IT governance experience reflects a certain level of organizational learning (OL) achieved which later influences the level of IT governance performance. Since studies that adopt this perspective is lacking, this paper proposes a conceptual framework based on absorptive capacity approach for an IT governance performance model in the higher education. The paper contributes theoretically by extending the knowledge of IT governance by exploring a new perspective on OL
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING KNOWLEDGE MANAGEMENT ...ijitcs
The growing importance of business analytics and its increasing influence on the competitive advantage of
organizations leads to the necessity of knowledge management systems, which complex and needs
organizational readiness that has been the subject of earlier research. This study aims to examine whether
the affective factors on the assessment of the readiness for implementation of the knowledge management
system in all organizations are identical. Hence, first by a comprehensive study of literature, readiness
factors of the knowledge management system implementation including six factors of organizational
culture, individuals, information technology infrastructure, knowledge process, senior management
commitment, and strategy were extracted and have been tested in three different organizations of IT
services, educational and commerce. Based on the founding, different factors affect various organizations
and using a general model should not be advised.
Extending utaut to explain social media adoption by microbusinessesIJMIT JOURNAL
This paper extends the use of the Unified Theory of Acceptance and Use of Technology (UTAUT) to explain social media adoption by microbusinesses. A canonical action research method is used to study social media adoption in microbusiness, and a post positivist approach is used to report the results based on a predetermined premise. It is found that the major constructs of performance and effort expectancy played an insignificant role, and social influence and facilitating conditions did not influence the behavioral and adoption intentions of social media by microbusiness owners. Owner characteristics and codification effort dominated the use behavior. The goal of microbusiness owners in gaining additional customers leads to behavioral modification resulting in replacing of behavioral intention with goals as a superior method of predicting adoption behavior within the context of microbusinesses.
The Effects of Organizational Changes Towards Students' EmotionNada Rahmah Majied
This paper have been presented at 5th Global Conference Business and Social Science (GCBSS) organized by Global Academy of Training and Research (GATR) at Bangsar South-Kuala Lumpur- Malaysia, 4-5 May, 2017.
Abstract:
Organizational change can produce a number of positive and negative emotional responses. This study uses the Theory of Emotional Contagion (Hatfield, Cacioppo & Rapson, 1993) where negative as well as positive feelings can be transferred to others. The aims of the study are to examine the effects of perception on technological change, leadership change and structural change towards students’ emotions; and to analyze the mediating effect of experience on perception and emotion resulting from organizational changes. The study employs the quantitative research design using the survey method with the self-administered questionnaire. A total of 223 respondents was collected from among the undergraduate students at a faculty in a public university who have faced organizational changes (technological, leadership and structural). Results reveal that perceptions of technology, leadership and structural changes are found to have moderate effects on students’ emotions. However, experiences of change partially mediate students’ emotion and perception of technological, leadership and structural changes. Experience with organizational changes affects students’ emotions badly. This implies that the Emotional Contagion Theory holds true for organizational changes as the hypotheses are supported.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
The Role of Organizational and Individual Factors in Knowledge Management Sys...journalBEEI
The aim of this study is to investigates the how individual and organizational factors influence people behavior in using knowledge management. This research applied Technology Acceptance Model (TAM) as a basis theory; TAM was enriched with individual and organizational factors for this study. A survey approach was conducted for data collection. Three of institutions in Banking Sector at Indonesia were invited to join this study and 215 knowledge workers were participated for the survey. Data from survey were analyzed through Structural Equations Model (SEM) using PLS (Partial Least Square) V2. The conclusion specify that ‘‘individual elements’’ and ‘‘organizational elements’’ are the significantly affect people behavior in KMS acceptance factors that influence knowledge worker behavior in knowledge sharing. However this study not found relationship between individual and organization factors and “perceived ease of use” construct with people behavior in accept KMS.
The Efficacy of Technology Acceptance Model: A Review of Applicable Theoretic...QUESTJOURNAL
ABSTRACT: This is a review of theoretical models most recently used in Information Technology adoption research. A literature review approach has been adopted. More than 25 literatures were reviewed in the area of information adoption covering the last 30 years. We identified the strengths and weaknesses of each of the theory used. It is found that Technology Acceptance Model is by far the most used to underpin research work in this area follow by Theory of planned behaviour.
WHY KNOWLEDGE MANAGEMENT SYSTEM FAILED by DANIEL DONI SUNDJOJODaniel Doni
The document discusses why knowledge management systems often fail in organizations. It argues that for a KM system to be effective, an organization must first transform into a learning organization where there is a culture of learning, motivation to learn, and a willingness to challenge assumptions. The document presents research from a case study of an internet services provider that implemented a KM system alongside strategic, policy, and operational learning initiatives. The results showed that the KM system was effective because the company had transformed into a learning organization where sharing knowledge and improving was a priority.
This document summarizes a research study conducted at Politeknik LP3I Bandung examining the influence of organization structure, work environment, and motivation on employee performance. The study used a quantitative approach, surveying 55 employees. The results found that organization structure, work environment, and motivation all positively influence employee performance. An appropriate organization structure and positive work environment are important for improving employee welfare and motivation, which enhances performance and allows the organization to achieve its goals.
The Effect Of Firm Size And Organizational Culture On The Quality Of Financial Reporting In Sharia Microfinancing Institution (Baitul Maal Wa Tamwil) (The Case Of Ex Banyumas Residency-Indonesia)
This document summarizes a study exploring the practice of the Tawhidic Paradigm (TP) in organizational policy and strategy of small and medium enterprises in Klang Valley, Malaysia. The study found that while entrepreneurs said they practiced TP according to Islamic teachings, they still faced challenges sustaining their businesses. However, they maintained strong faith in Allah and worked hard as an act of worship. The document argues that while TP in organizational policy and strategy is significant theoretically, more research is needed to prove its practical impact due to a lack of existing examples.
This document discusses factors that affect firm value for public manufacturing firms in Indonesia, including social responsibility, corporate governance, company size, and profitability. It provides background on the relationship between these factors and firm value based on prior literature. Theoretical frameworks discussed that may explain these relationships include agency theory, stakeholder theory, legitimacy theory, positive accounting theory, and signaling theory. The purpose of the study is to develop a new model of the relationships between these exogenous, intervening, and endogenous variables based on these theories and prior empirical research.
This document summarizes a research paper that investigated tax awareness and perceptions of tax education among business and non-business students in Indonesia. The research found that there was no significant difference in contextual or ethical tax awareness between the two groups of students. However, business students were more likely to believe that tax knowledge would be useful for their future and that tax education should be an important part of higher education. The results imply that business programs should evaluate how they teach topics related to taxation since their students' awareness levels were similar to non-business students who do not learn about taxes.
This document provides a literature review on the use of grounded theory in management research. It discusses:
1) Grounded theory was introduced in the 1960s by Glaser and Strauss as a qualitative research method to develop theories grounded in empirical data. It aims to close the gap between theory and research.
2) Grounded theory involves collecting and analyzing qualitative data through open, axial, and selective coding to develop conceptual categories and explore their relationships. It produces explanatory theories rather than testing existing hypotheses.
3) Grounded theory has evolved over time, with Glaser developing an emerging design approach and Strauss a more structured systematic design approach. It remains a useful method for developing new concepts and theories in management and
FACTORS INFLUENCING THE ADOPTION OF E-GOVERNMENT SERVICES IN PAKISTANMuhammad Ahmad
E-government provides opportunities to deliver various services more effectively and better serve citizens. In developing countries, e-government initiatives provide services that have been previously inaccessible to their citizens. However, e-government initiatives in developing countries are still in their infancy and face a wide range of barriers that restrict wide-spread use. Like many other developing countries, Pakistan has a low level of e-government services adoption. Previous research has investigated e-government services in developing countries from the organizational perspective. However, the research stream suffers from an absence of studies that have investigated e-government from a citizen’s perspective. The success of e-government services depends on government support as well as on citizen’s adoption. This paper aims to fill this gap by exploring the challenges and barriers of e-government services from the user’s perspective. In this study, an amended version of the UTAUT model is used to investigate the factors influencing the uptake of e-government services in Pakistan. The results show that the factors influencing the adoption of e-government services in Pakistan are related to ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust. Implications for e-businesses and government policy decision makers are also considered in this study.
This document summarizes a research study on the antecedents and consequences of job satisfaction and organizational commitment among internal auditors in the telecommunications industry in Indonesia. Specifically, it analyzes how the work environment influences job satisfaction and organizational commitment, and how job satisfaction and organizational commitment then impact organizational citizenship behavior. The study aims to answer four research questions regarding the relationships between these variables. It distributed 162 survey questionnaires to internal auditors and used path analysis to analyze the data. The results showed that a conducive work environment leads to greater job satisfaction and organizational commitment, which then encourage employees to exhibit organizational citizenship behavior to help achieve organizational goals.
This document discusses adding an environmental perspective to the balanced scorecard (BSC) as a way to improve corporate social responsibility (CSR) implementation in Indonesia. It notes that CSR implementation and reporting is currently low in Indonesia due to companies viewing CSR as an added expense without clear financial benefits. The document suggests including environmental factors in company performance measurement through the BSC, with the hypothesis that linking environmental performance to financial and non-financial metrics may change company mindsets about CSR. It provides background on the BSC's traditional four perspectives and argues for adding an environmental perspective to create a more comprehensive performance assessment.
Factors relating to the academic achievement and home environment in economic...prjpublications
This document discusses factors related to academic achievement and home environment of economics students in higher secondary school. It analyzes the relationship between academic achievement, gender, type of school (public or private, urban or rural), and aspects of home environment. The study uses surveys from 409 students in Namakkal district, Tamil Nadu, India. It finds significant differences in home environment scores between boys and girls, and between urban and rural school students. The document establishes several hypotheses about the relationships between these variables and analyzes them to understand factors influencing student achievement.
E-GOVERNANCE ADOPTION IN GOVERNMENT ORGANIZATION OF INDIAijmpict
India, the growing economic super-power proceeded with lightning speed towards the adoption and successful implementation of e-governance. The Government of West Bengal (federal unit of India) implemented e-governance in pension office i.e. Pension Management System (PMS), for faster and efficient delivery of public services. The success of PMS is dependent on many factors and one among them is the successful adoption by the employee which has been empirically analyzed. The study used the
Technology Acceptance Model (TAM) and Trust to build a conceptual model. Data collected from 60 employees working on the system and the model is assessed with regression analyses. The findings show that the determinants of the research model are support. The study also shows that the system doesn’t perform completely error free tasks which the Government of West Bengal should address. This is the first study of employee adoption of e-governance in pension office of India.
This document summarizes a study that investigated factors affecting acceptance of e-learning among students at Universiti Utara Malaysia (UUM). The study tested a model combining the Technology Acceptance Model (TAM) with variables from the Theory of Planned Behavior and Social Cognitive Theory. It found that perceived usefulness and perceived ease of use positively influenced e-learning usage, but social pressure and internet self-efficacy did not. The implications are that universities should focus on developing useful e-learning content to encourage student adoption. A survey of 256 business students found that most used e-learning a few times a week, indicating a moderate overall usage level.
Conceptualizing Information Technology Governance Model for Higher Education:...journalBEEI
Information Technology (IT) governance has been emerging as a central issue in many organizations. This is because IT governance is key to realizing IT business value. Past studies have focused on the three aspects of IT governance, namely, structural capability, process capability and relational capability. At the same time, some studies have suggested that IT governance process should be viewed as a learning process rather than a problem solving process. Based on this scenario, the role of knowledge and knowledge based processes should be the central focus of IT governance. As a learning process, IT governance effectiveness can be determined by how much impact IT governance practices has influenced on decision-makers’ thinking and actions. In this case, knowledge capacity absorbed from IT governance experience reflects a certain level of organizational learning (OL) achieved which later influences the level of IT governance performance. Since studies that adopt this perspective is lacking, this paper proposes a conceptual framework based on absorptive capacity approach for an IT governance performance model in the higher education. The paper contributes theoretically by extending the knowledge of IT governance by exploring a new perspective on OL
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING KNOWLEDGE MANAGEMENT ...ijitcs
The growing importance of business analytics and its increasing influence on the competitive advantage of
organizations leads to the necessity of knowledge management systems, which complex and needs
organizational readiness that has been the subject of earlier research. This study aims to examine whether
the affective factors on the assessment of the readiness for implementation of the knowledge management
system in all organizations are identical. Hence, first by a comprehensive study of literature, readiness
factors of the knowledge management system implementation including six factors of organizational
culture, individuals, information technology infrastructure, knowledge process, senior management
commitment, and strategy were extracted and have been tested in three different organizations of IT
services, educational and commerce. Based on the founding, different factors affect various organizations
and using a general model should not be advised.
Ahlan, arshad, ajayi 2014 - it governance in a malaysian public institute o...Binyamin Ajayi
This document summarizes a chapter about IT governance in a Malaysian public university. It discusses the need for effective IT governance in universities to optimize resource usage and impact performance. It presents the COBIT framework as an international benchmark for IT governance standards and practices. The chapter also introduces two intelligent decision making support system methods that could be applied to study IT governance in this context.
Influence of Knowledge Management Processes on Organizational Performance in ...inventionjournals
This research attempts to establish a link between knowledge management processes and organizational performance in knowledge intensive service sectors. The key dimensions of knowledge management processes have been identified which could influence the organizational performance. Metric has been developed for the empirical investigation of the relationships between these research constructs. Structural Equation Modelling (SEM) using partial least square techniques has been used to test these hypotheses with a sample size of 491 knowledge workers (330 - Higher educational institutions and 161 from the IT companies) to investigate the empirical relationships between the factors. All the four hypotheses were supported. The testing of the hypotheses justified the identification of the key dimensions of KM as the critical success factors in terms of the organizational performance. Implications of the study would enable the strategic planning managers to make their knowledge management processes more effective so as to enhance the organizational performance
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Analysing The Relationship Between IT Governance And Business IT Alignment Ma...Lori Moore
This document discusses research on the relationship between IT governance maturity and business/IT alignment maturity. The research aims to understand how organizations implement IT governance in practice and analyze the impact of IT governance implementations on business/IT alignment. The research focuses specifically on financial services organizations in Belgium to control for industry and geographic differences. It is hypothesized that organizations with more mature IT governance practices will have a higher degree of business/IT alignment maturity.
Thriving information system through business intelligence knowledge managemen...IJECEIAES
In the current digitalization dilemma of an organization, there is a need for the business intelligence and knowledge management element for enhancing a perspective of learning and strategic management. These elements will comprise a significant evolution of learning, insight gained, experiences and knowledge through compelling theoretical impact for practitioners, academicians, and scholars in the pertinent field of interest. This phenomenon occurs due to digitalization transformation towards industry revolution 5.0 and organizational excellence in the information system area. This research focuses on the characteristic of a comprehensive performance measure perspective in an organization that conceives information assessment and key challenges of Business Intelligence and Knowledge Management in perceiving a relevant organizational excellence framework. The dynamic research focusing on the decision-making process and leveraging better knowledge creation. The future of organization excellence seemed to be convergent in determining the holistic performance measure perspective and its factors towards industry revolution 5.0. The research ends up with a typical basic excellence framework that will mash up some characteristics in designing an organizational strategic performance framework. The output is a conceptual performance measure framework for a typical decision-making application for organizational strategic performance management dashboarding.
A knowledge management-based conceptual model to improve the level of utiliza...IJAEMSJORNAL
The current commercial context for the Small and medium-sized enterprises (SMEs) is an ever-changing environment that is strongly influenced by the information and communication technologies (ICTs). This has led enterprises to implement these technologies as supportive tools for their business processes. Nevertheless, a vast number of SMEs have not obtained favorable results in implementing ICTs, since the lack of knowledge about the potential and application of these technologies has made this technological implementation activity prevail as an action oriented to the simple acquisition of equipment and informatic systems with a short-term vision without considering a business strategy. The aim of this paper is to perform a literature review that shows evidence of the low utilization of ICTs in SMEs, particularly in the Mexican environment, which leads to proposing a different approach where enterprises consider Knowledge Management (KM) in the implementation of the informatic technology, leading to a conceptual model to ensure human, organizational and relational capital provide the proper capabilities to complement a strategy that implies carrying out a correct acquisition and application of knowledge that contributes to improving the utilization of ICTs in the business processes.
The influence of information technology capability, organizational learning, ...Alexander Decker
This document reports on a study that examined the influence of information technology capability, organizational learning, and knowledge management capability on organizational performance in banking branches in Southern Kalimantan Province, Indonesia. The study hypothesized that information technology capability positively impacts organizational learning, knowledge management capability, and organizational performance. It also hypothesized that organizational learning positively impacts knowledge management capability and organizational performance. Survey data were collected from 69 banking branches and analyzed using partial least squares. The results supported most of the hypotheses, finding significant positive relationships between the variables except for the relationship between organizational learning and knowledge management capability.
IS/IT Capability and Strategic Information System Planning (SISP) SuccessIJMIT JOURNAL
Successful planning of Information Systems (SISP) is perhaps going to be more problematic in today’s world of rapid change and uncertainty. SISP is a cornerstone of the information system discipline and very little attention has been paid to its success based on the resource based view of the firm (RBV).This paper provides a model for IT capability and strategic information system planning success, by considering environmental and organizational factors that may influence this relationship in a contingency model. A review of existing IT capability and SISP literature is given to identify the opportunities in building successful SISP. A model is developed by hypothesizing IT capability as independent variable leads to SISP success as dependent variable; in which organizational & environmental influences are considered as moderating variables. The control variables are firm size, firm structure, and industry type. The study proposes a model to conceptualize the relationship between IT capabilities and SISP success and contingency factors moderating that relationship. This paper explains the ways of exploiting IT capabilities as specialized and integrated knowledge of the firm in IT area to create a more successful SISP. The researchers believe that the aim to build a model for SISP success based on RBV theory is important because this new perspective will be helpful for gaining a superior assessment and better underpinning of the SISP from a knowledge based perspective.
Investigating the Influence of E-HRM Practices on Organizational Performance:...Dr. Amarjeet Singh
Electronic Human Resource Management (E-HRM) came into existence as a result of the evolution of new technology and it leads to eliminating the administrative burden on HR professionals. Financial institutions are the heart of the financial stability of the economy. Nowadays most financial institutions are widely adopting E-HRM practices in order to achieve sustainable competitive advantage. However, it has been observed that there is a lack of empirical studies regarding this phenomenon in the Sri Lankan context. The main contribution of this study is to enrich the knowledge and investigate the impact of E-HRM practices on organizational performance under the mediation role of organizational agility. Thus, the study focusses on to examine how E-HRM impacts organizational performance, and to determine the mediating role of organizational agility between E-HRM and OP. Questionnaires were distributed by using a convenience sampling method to collect primary data from 40 financial institutions in Sri Lanka. Data analysis was performed using Pearson correlation analysis, regression analysis, descriptive statistics, Baron and Kenny mediator analysis method, and Sobel test. Results of the analysis indicated that E-HRM practices significantly and positively impact organizational performance while organizational agility mediates the relationship between E-HRM practices and OP. Outcomes of this study provided implications like enhancing available literature, to understand the real impact of E-HRM on organizational performance to HR managers. This study also suggests some further research areas for future research.
What affects digitalization process in developing economies? An evidence from...journalBEEI
The main objective of this paper is to investigate the SMEs’ leader perspective about the basic factors influencing the transformation into digitalization by SMEs they lead, using technological, organizational, and environmental (TOE) Model. The data were collected from 61 SMEs leaders in Oman, to achieve the study objective TOE model has been adopted. Internal consistency and data normality, and factor analysis were implemented. Structural equation modeling (SEM) used to test the proposed hypotheses. The outcomes of SEM indicate that TOE factors are significantly affects the ability of SMEs to digitalize their business process. The study findings come in the context of Omani definition of SMEs. More, no control was made for industry type to which SMEs participants are belong. Leaders of SMEs should frame strategies to simplify the digital transformation of their enterprises and attempt to provide organizational and technological facilities that will smooth their digitalization which will improve SMEs capabilities, as well as, increasing the international competitiveness of the SMEs. To the best of the authors' knowledge, this study is one of the first that investigated the digital transformation among SMEs from the leaders’ perspective in Oman.
The awareness of the Sustainable Development (SD) issues and stakeholder interactions in the field of information and communication technologies (ICT) management, forces companies to adopt the concepts of Corporate Social Responsibility (CSR) and Green IT to meet the challenges of innovtion agility, and afterwards to create differentiation in the processes of governance and strategic alignment of ICT. In this article, we present the enhanced model of eco-strategy as a new generation model for ICT management, which will serve as a theoretical basis and aims to improve research in the field of responsible management of ICT. The updated eco-strategy model is composed of two dimensions: “ICT Green Alignment” and “ICT Green Governance”. These dimensions were designed according to a Green IT and CSR strategy to provide companies with tools for the development of coherent and sustainable managerial strategies capable of boosting overall performance and to explore new levers of transition towards renewed management modes in service the SD
Synthesis of questions and analysis and create grid.pdfsdfghj21
This document discusses knowledge transfer in virtual organizations and the impact of virtual moderators on business productivity. It begins by defining virtual organizations and outlining their key characteristics, including their reliance on information and communication technologies. It then examines knowledge transfer in healthcare and construction industries, noting that ineffective communication channels can hamper the transfer process. The document reviews different virtual communication methods like Zoom and their ability to facilitate knowledge sharing. It evaluates factors like ease of use, urgency of information, and regulatory constraints that should be considered when selecting a communication medium to ensure efficient knowledge transfer. Finally, it discusses media richness theory and how lean media may be better than rich media for conveying certain types of messages in organizations.
Knowledge transfer mechanisms in service business acquisitionsMiia Kosonen
This document discusses knowledge transfer mechanisms in service business acquisitions. It begins with an introduction that knowledge transfer is important for using resources efficiently and transferring best practices. The document then reviews literature on knowledge transfer mechanisms and the specifics of knowledge transfer in services and acquisitions.
The document presents a qualitative study of knowledge transfer mechanisms in one business-to-business service firm that had acquired four other firms. Six knowledge transfer mechanisms were identified: 1) an acquisition management team, 2) unit managers, 3) formal training, 4) "rooming-in", 5) e-communication, and 6) a codified database. These were further classified into management-, learning-, and technology-related mechanisms.
The
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Neither Information technologies determine organisational structure merely, nor does organisational structure. There is a mutual interaction between there variables. Using information technologies is a must for the organisations in this century. However how information technologies evolved over the time brings a question of what effect can technology bring towards organisations and their structure. This study discusses the conceptual issues that raise the importance of technological tools, views and ways that followed by organisations and changed over the time. It also examines technological, organisational and interactive ties that connect organisational structure and the information technology. It concludes that information technologies have an impact on the organisational structure via centralisation and decentralisation, authority and control, space of control, change in organisational level, departmental structure, decision making process, communication, and organising the work.
The awareness of the Sustainable Development (SD) issues and stakeholder interactions in the field of information and communication technologies (ICT) management, forces companies to adopt the concepts of Corporate Social Responsibility (CSR) and Green IT to meet the challenges of innovation agility, and afterwards to create differentiation in the processes of governance and strategic alignment of ICT. In this article, we present the enhanced model of eco-strategy as a new generation model for ICT management, which will serve as a theoretical basis and aims to improve research in the field of responsible management of ICT. The updated eco-strategy model is composed of two dimensions: “ICT Green Alignment” and “ICT Green Governance”. These dimensions were designed according to a Green IT and CSR strategy to provide companies with tools for the development of coherent and sustainable managerial strategies capable of boosting overall performance and to explore new levers of transition towards renewed management modes in service the SD.
Implementation of a decision support process for evaluating the correlation ...IJECEIAES
The main objective of this paper is to study the correlation between investment in information technologies and especially information systems and information system success based on data collection and a multi-criteria decision-making approach using technique for order preference by similarity to ideal solution (TOPSIS) and analytical hierarchy process (AHP) methods. The criteria of the hierarchical model for evaluating the information system success are chosen from Delone and McLean information systems (IS) success model. The proposed approach has been implemented in 3 sectors recognized by their variation in the use of information systems: the financial sector, the service companies sector, and the construction industry sector. Therefore, the results of this implementation show that massive investment in information systems does not always guarantee good information system success, and information system success is not always the result of massive investment in the information system.
This document summarizes an article from the International Journal of Library and Information Science (IJLIS) that examines knowledge processes for successful knowledge management application in university libraries in Nigeria. The article identifies knowledge identification, acquisition, organization/creation, and dissemination as key knowledge processes. It finds that while identification, acquisition, and organization were carried out to a large extent, creation was carried out to a low extent. The greatest process employed was acquisition. The article recommends intensifying efforts around knowledge creation.
Similar to Antecedents of Knowledge Management Practices: Case of Malaysian Practitioners (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
2. ISSN: 2302-9285
BEEI, Vol. 7, No. 1, March 2018 : 125 – 133
126
sharing (KS) behavior. For example, Ghobadi [1] has done an extensive review of around 50 articles, which
were published between 1993 to 2011, that focused on KS drivers in software teams. Similarly, Mueller [2]
has investigated the cultural antecedence of KS. Nevertheless, there are studies that concentrate on KM
including knowledge creation (KC) & KS as well; for example, [3-8]. However, none of these studies
operationalized the KM from its root processes of SECI (socialization, externalization, combination,
internalization) which is proposed in the knowledge creation theory [9]. Indeed, there is a study [10] based on
SECI, but it is limited only to KM intention. Other than this work it is very difficult to find a study on
antecedence of KM behavior based on it root processes of SECI. To bridge this gap, the current study
investigates the antecedence of KM intention and KM behavior by operationalizing KM through SECI
process. For this purpose, a conceptual research framework with a hypothetical research model was
formulated based on Theory of Reasoned Action (TRA) [11] and Theory of Planned Behavior (TPB) [12]
which advocates human behavior is influenced by human intention. To empirically test the research model,
data were collected from 74 executive level employees who are involved in Information Technology (IT)
related qualifications and works in private and government link corporations in Malaysia. It is believed that
the findings of this study will provide an in-depth understanding on the antecedence of KM behavior among
the executives, especially in the IT sector, which would be the interest of corporate executives who aspire to
see KM culture prevail in their respective organizations. The academic researchers, of course, also would be
interested to know the outcome of the new approach.
The next section elaborates the conceptual framework used in this study while section 3 briefly
describe the methodology used in this study. Section 4 presents the results with a detailed discussion on
findings. The final section tries to derive a conclusion.
2. CONCEPTUAL FRAMEWORK
TRA [11] and TPB [12], which suggest that behavioral intention leads to human behavior, were
considered as the supporting theories to the proposed research framework. The SECI (socialization,
externalization, combination, and internalization) processes, the outcome of knowledge creation theory [13],
laid the operationalization of KM behavior as SECI processes represent both knowledge creation and sharing
behavior [14]-[16]. Thus, involvement in KM behavior could be measured by the involvement in SECI
processes.
The socialization process refers to the conversion of tacit knowledge to new tacit knowledge
through social interactions and shared experience among organizational members [17] while externalization
means the expression of tacit knowledge and its conversion into comprehensible forms that are easier to
understand [18]. Similarly, the combination process collects explicit knowledge from inside or outside the
organization and then combined, edited, or processed to form more complex and systematic explicit
knowledge and the internalization can be understood as praxis, where knowledge is applied and used in
practical situations and becomes the base for new routines [19].
The antecedence of KM intention and KM behavior were operationalized referring unified theory of
acceptance and use of technology (UTAUT) [20] and few prominent previous related works [14, 20-23].
Consequently, trust among colleagues, top management support, decentralization of decision-making
process, and availability of IT support are considered as the antecedence of KM behavior denoting the
elements of organizational climate. Meantime to symbolize the individual acceptance, performance
expectancy of KM (PE of KM) and effort expectancy of KM (EE of KM) which are derived from UTAUT
were incorporated.
Trust refers to the degree of reciprocal faith among the colleagues in terms of intention and behavior
within the organization [21]. People are more willing to participate in knowledge exchange when their
relationships are high in trust, and the increase in knowledge exchange brought by mutual trust results in
knowledge creation [14]. The positive relationship between trust and KM has been established in recent
works [24], [25]. Therefore, we propose
H1: Trust will positively influence KM intention
Management support means the degree of support from top managers for KM through providing
guidance and necessary resources [22]. Without top management’s commitment and active leadership role in
KM activities, it is cumbersome to implement KM successfully [5]. The effect of management support and
KM oriented leadership towards KM initiatives has been explained [3], [26], as such, we believe
H2: Management Support will positively influence KM intention
Decentralization refers to a management structure that emphasizes employee autonomy and
participation in decision making [23]. Centralized structure hinders interdepartmental communication and
frequent sharing of ideas because it imposes certain time-consuming communication channels which causes
distortion and discontinuousness of ideas [27] and hamper the KM process [14]. The positive effects of
3. BEEI ISSN: 2302-9285
Antecedents of Knowledge Management Practices: Case of… (Mohamed Jalaldeen Mohamed Razi)
127
decentralization on KM activities have been well documented [28], [29]. Therefore, we have no reason to
think negatively about the following hypothesis.
H3: Decentralization will positively influence KM intention
IT Support denotes to the degree of availability of IT support for KM process initiatives within the
organization [14]. IT is a critical enabler when implementing KM [30] because IT can enable rapid search,
access, and retrieval of information [31]. The relationship of IT and KM behavior well explained [15, 32].
Therefore, we propose
H4: IT Support will positively influence KM intention
Performance Expectancy (PE) of KM means the degree to which an individual believes that
involvement in KM processes will help him/her to attain gains in job performance [20]. The works of [33,
34] suggest the following relationship.
H5: PE of KM will positively influence KM intention
Effort Expectancy (EE) of KM explains the degree of ease associated with the involvement in KM
process [20]. The influence of effort expectancy on behavior is obvious [20], [35]
H6: EE of KM will positively influence KM intention
KM intention means the degree of perceived intention to be involved in the KM process (KC & KS)
by the organizational individuals within the prevailing organizational context [36] while KM behavior refers
to the real involvement in the KM process (KC & KS) by the organizational individuals within the prevailing
organizational context [36]. Based on TRA [11] and TPB [12] the following hypothesis was formulated.
H7: KM intention will positively influence KM behavior
To show the above hypothetical relationships, a research model was developed as shown in Figure
1.
Figure 1. Proposed research model
3. RESEARCH METHOD
A self-administered online questionnaire was used to collect data from 74 different levels of
executives who are working in the IT sector of private and government link corporations in Malaysia. The
questionnaire items were adapted from previous studies [14], [20]-[23]. Respondents were asked to indicate
(on a 7-point Likert scale ranging from “strongly disagree” to “strongly agree”) their level of agreements on
statements. SmartPLS3 was used for measurement model analysis and structural model analysis. The
measurement model was evaluated using internal consistency reliability, indicator reliability, convergent
reliability and discriminant validity. The coefficient of determination (R²) and path coefficients was
evaluated in structural model assessment.
4. RESULTS AND ANALYSIS
The measurement model as shown in Figure 2.
4. ISSN: 2302-9285
BEEI, Vol. 7, No. 1, March 2018 : 125 – 133
128
Figure 2. Measurement model
Table 1 shows the factor loading values of each item, and Cronbach’s Alpha (α), Composite
Reliability (CR), and Average Variance Extracted (AVE) values for each variable. Following [37], 0.65 was
considered as the threshold value for factor loadings and all items met the criteria. The Cronbach’s Alpha and
CR values are greater than the threshold value of 0.7 and the AVE values are greater than the threshold value
of 0.5. Therefore, the reliability and convergent validity of the instruments used are confirmed.
Table 1. Factor Loadings, Cronbach’s Alpha, Composite Reliability, Average Variance Extracted
Variable Loadings α CR AVE
Trust
Trust1, Trust2, Trust3, Trust4 0.881, 0.897, 0.879, 0.907
0.914 0.939 0.794
Mgt. Supt.
MGT1, MGT2, MGT3 0.944, 0.931, 0.946
0.934 0.958 0.884
Decentralization
Dec.1, Dec.2, Dec.3, Dec.4 0.926, 0.802, 0.790, 0.691
0.823 0.881 0.651
IT Supt.
ITS1, ITS2, ITS3, ITS4 0.926, 0.901, 0.755, 0.813
0.885 0.913 0.725
PE of KM
PE1, PE2, PE3, PE4 0.928, 0.960, 0.602, 0.954
0.887 0.926 0.764
EE of KM
EE1, EE2, EE3, EE4 0.925, 0.856, 0.955, 0.948
0.941 0.958 0.850
KM Intention
SOC1I, SOC2I, SOC3I, SOC4I
EXT1I, EXT2I, EXT3I, EXT4I
COM1I, COM2I, COM3I, COM4I
INT1I, INT2I, INT3I, INT4I
0.885, 0.922, 0.880, 0.923
0.879, 0.847, 0.814, 0.927
0.839, 0.785, 0.838, 0.885
0.857, 0.839,0.896, 0.940
0.979 0.981 0.763
KM Behavior
SOC1B, SOC2B, SOC3B, SOC4B
EXT1B, EXT2B, EXT3B, EXT4B
COM1B, COM2B, COM3B,
COM4B
INT1B, INT2B, INT3B, INT4B
0.834, 0.876, 0.816, 0.806
0.828, 0.778, 0.839, 0.845
0.665, 0.668, 0.758, 0.740
0.672, 0.646, 0.759, 0.848
0.958 0.960 0.604
The discriminant validity was assessed by using Fornell and Larcker’s criterion. The correlations
and discriminant validity are shown in Table 2. The square root of AVE should exceed the correlations
between the measure and all the other measures, and the indicators’ loadings are higher against their
respective construct compared to the other constructs. Accordingly, all variables satisfy the requirements.
Therefore, the researchers of this study believe that the study had proven that all the reliability and validity
tests conducted for the measurement model had achieved the satisfactory level.
5. BEEI ISSN: 2302-9285
Antecedents of Knowledge Management Practices: Case of… (Mohamed Jalaldeen Mohamed Razi)
129
Table 2. Discriminant Validity
0 Decentralization EEof
KM
IT
Support
KM
Behavior
KM
Intention
Mgt.
Support
PEof
KM
Trust
Decentralization 0.807
EE of KM 0.458 0.922
IT Support 0.574 0.594 0.851
KM Behavior 0.645 0.541 0.630 0.777
KM Intention 0.446 0.814 0.433 0.452 0.873
Mgt. Support 0.571 0.567 0.655 0.499 0.630 0.940
PE of KM 0.445 0.888 0.633 0.577 0.830 0.694 0.874
Trust 0.505 0.645 0.466 0.363 0.724 0.703 0.727 0.891
Having established the validity and the reliability of the measurement model, to test the
hypothesized relationship, bootstrapping (with 500 sub-samples) was performed using SmartPLS 3.0. The
predictive relevance of the model, i.e. the quality of the structural model, was assessed by R2. This depicts
the variance in the endogenous variables of KM intention and KM behavior. Based on the result reported in
Figure 2, R2 was found to be 0.780 and 0.205 for KM intention and KM behavior respectively. Using the
assessment criterion suggested by [38], we concluded that it is significant. All the hypotheses were tested by
examining the significance of the respective path coefficients. The results are shown in figure 3 and the
summary of the results are shown in Table 3.
Figure 3. Structural model
Table 3. Result Summary
Hypotheses β t p
H1 Trust -> KM Intention 0.168 1.267 0.206 Not Supported
H2 Mgt. Support -> KM Intention 0.155 1.321 0.187 Not Supported
H3 Decentralization -> KM Intention 0.071 0.645 0.519 Not Supported
H4 IT Support -> KM Intention -0.268 2.202 0.028 Not Supported
H5 PE of KM -> KM Intention 0.365 2.326 0.020 Supported
H6 EE of KM -> KM Intention 0.420 3.433 0.001 Supported
H7 KM Intention -> KM Behavior 0.452 5.745 0.000 Supported
6. ISSN: 2302-9285
BEEI, Vol. 7, No. 1, March 2018 : 125 – 133
130
Out of the seven hypotheses proposed three are supported. PE of KM (H5) and EE of KM (H6) are
positively influenced KM intention with positive path coefficient (β) with significant t value at 0.001 and
0.05 confidence level respectively. Even though it was expected that IT support will have a positive influence
on KM intention, the result showed a negative β (-0.268) value with significant t value (t=2.202, p=0.028).
Therefore, the said hypothesis was considered not supported. The other three hypotheses (H1, H2, and H3)
were also considered not supported as the p values are greater than 0.05.
As a summary, the findings of this study only recognizes the positive relationship of factors of
individual acceptance which are derived from UTAUT; performance expectancy of KM (b=0.365, t=2.326,
p=0.020) and effort expectancy of KM (b=0.420, t=3.433, p=0.001) on KM intention. The results suggest
that the more respondents perceive that KM is useful in doing the job, lead to better pay and improves their
productivity; the more likely they are to be involved in KM. Similarly, the more they perceive that involving
in KM processes is easy, clear to understand and easy to learn; the more likely they are to be involved in KM.
Theoretically, these result further strengthens the propositions of UTAUT [20] in predicting individual
behavioral intention and the current findings are consistent with many previous research works [33], [34],
[39]-[42].
The scale used for measuring performance expectancy focused on involvement in KM useful in
accomplishing job task, enhance productivity and leads to better pay. Therefore, from the practical point of
view, the managers could make an environment where the executives believe that if they involve in KM it
would lead to increase in their performance. Perhaps they could make an awareness of how the involvement
in KM process will improve their performance and their productivity. At the same time, the managers could
make it clear how the involvement in KM can lead to better pay; i.e. salary increment, bonus or promotion.
The items used for measuring effort expectancy focused on the degree of ease in involving in KM.
The scales used to measure effort expectancy focused on easy to learn, easy to be involved and clear to
understand the role in the KM process. Therefore, the corporate managers may emphasize or educate the
easiness of involving in KM and make clear the role expected from each of them for KM initiatives which
are being introduced in their particular organization.
The findings also confirm the positive influence of KM Intention towards KM Behavior (b=0.452,
t=5.745, p=0.000) that strength the fundamental proposition of TRA [11] and TPB [12]. However, the other
four hypotheses (H1, H2, H3, H4) were not supported contradicting to the literature cited in the hypotheses
formulation section. The respondents, the executives in the IT field with at least a university bachelor degree
in ICT, are considered knowledge workers. Knowledge workers tend to be autonomous, self-motivated and
self-reliance. Thus, they may not be expecting the trust culture (H1), management support (H2) and
decentralized structure (H3) as very important or influencing factors them to be involved in KM behavior.
They are naturally inclined to be involved in such activities regardless of organizational climate. It is quite
difficult to understand why the IT support has a negative coefficient of -0.268 which literally means an
inverse relationship between IT support and KM intention and KM behavior. The respondents might have
misinterpreted the questionnaire items as the questions are focused on IT support for communication and
collaboration. For example, a question focuses on IT support for collaborative works regardless of time and
place; another question focuses on IT support for communication among colleagues; next question focuses on
IT support for searching necessary information and sharing and so on. As the respondents are IT experts and
they use the IT in a wider range of capacity to get the optimum from it, they might have perceived the mere
use of IT for communication and collaboration might be hindering their work activities and performance.
5. CONCLUSION
The current study provides theoretical and practical understandings on antecedence of KM intention
and KM behavior among practitioners in the corporate sector. The findings should be beneficial to both
researchers in the domain of KM and the practitioners; the decision makers in the corporate sector. For the
researchers, the conceptual research framework used in this study can be used to test the other settings
involving different types of population and sample. For the managers, the findings of this study propose that
if they really interested to see their executives, especially who involve in IT related works, involved in KM
practices, they have to inform them about the usefulness of KM to better perform in their job and
involvement in KM is easy and comfortable.
Similar to most of the research work, there are limitations related to the conduct of this study as
well. The respondents are limited to one particular type. Future works may consider extending the scope of
the population by considering a wider range of populations. Moreover, in addition to the six antecedence
considered in this study, some more variables such as motivational factors, cultural factors, structural factors
etc. could be examined in future works.
7. BEEI ISSN: 2302-9285
Antecedents of Knowledge Management Practices: Case of… (Mohamed Jalaldeen Mohamed Razi)
131
ACKNOWLEDGEMENTS
This work has been supported through International Islamic University Malaysia Research Initiative
Grant Scheme (RIGS16-148-0312).
REFERENCES
[1] S. Ghobadi, "What drives knowledge sharing in software development teams: A literature review and
classification framework," Information & Management, vol. 52, no. 1, pp. 82-97, 2015.
[2] J. Mueller, "A specific knowledge culture: Cultural antecedents for knowledge sharing between project teams,"
European Management Journal, vol. 32, no. 2, pp. 190-202, 2014.
[3] M. J. Donate and J. D. S. de Pablo, "The role of knowledge-oriented leadership in knowledge management
practices and innovation," Journal of Business Research, vol. 68, no. 2, pp. 360-370, 2015.
[4] D. Holt, S. Bartczak, S. Clark, and M. Trent, "The development of an instrument to measure readiness for
knowledge management," Knowledge Management Research & Practice, vol. 5, no. 2, pp. 75-92, 2007.
[5] C. Wei, C. Choy, and W. Yew, "Is the Malaysian telecommunication industry ready for knowledge management
implementation?," Journal of Knowledge Management, vol. 13, no. 1, pp. 69-87, 2009.
[6] W. Taylor and M. Schellenberg, "Measuring organizational readiness for knowledge management," Advanced
Topics in Information Resources Management: Volume 4, vol. 4, p. 93, 2005.
[7] N. D. Mamaghani, R. Samizadeh, and F. Saghafi, "Evaluating the readiness of Iranian research centers in
knowledge management," American Journal of Economics and Business Administration, vol. 3, no. 1, p. 203,
2011.
[8] A. Shirazi and S. Mortazavi, "Factors affecting employees' readiness for knowledge management," European
Journal of Economics, Finance and Administrative Sciences, vol. 7, 2011.
[9] I. Nonaka, "Organizational knowledge creation theory: a first comprehensive test," International Business Review,
vol. 3, no. 4, pp. 337-351, 1994.
[10] N. S. A. Karim, M. J. M. Razi, N. Mohamed, and L. M. Abdullah, "Influential Factors of KM Process Adoption:
A Social-technological Based Approach," International Journal of Innovation and Business Strategy, vol. 01, no.
December, pp. 95-102, 2012.
[11] M. Fishbein and I. Ajzen, Belief, attitude, intention and behaviour: An introduction to theory and research.
Addison-Wesley, 1975.
[12] I. Ajzen, "The theory of planned behavior," Organizational behavior and human decision processes, vol. 50, no.
2, pp. 179-211, 1991.
[13] I. Nonaka, P. Byosiere, C. C. Borucki, and N. Konno, "Organizational knowledge creation theory: a first
comprehensive test," International Business Review, vol. 3, no. 4, pp. 337-351, 1994.
[14] H. Lee and B. Choi, "Knowledge management enablers, processes, and organizational performance: An
integrative view and empirical examination," Journal of management information systems, vol. 20, no. 1, pp. 179-
228, 2003.
[15] W. Teerajetgul and C. Charoenngam, "Factors inducing knowledge creation: empirical evidence from Thai
construction projects," Engineering, Construction and Architectural Management, vol. 13, no. 6, pp. 584-599,
2006.
[16] I. Becerra-Fernandez, A. Gonzalez, and R. Sabherwal, Knowledge Management: Challenges (Solutions and
Technologies. Pearson/Prentice Hall). 2004.
[17] M. Alavi and D. E. Leidner, "Review: Knowledge management and knowledge management systems: Conceptual
foundations and research issues," MIS quarterly, pp. 107-136, 2001.
[18] I. Becerra-Fernandez and R. Sabherwal, "Organizational knowledge management: A contingency perspective,"
Journal of management information systems, vol. 18, no. 1, pp. 23-55, 2001.
[19] I. Nonaka and R. Toyama, "The knowledge-creating theory revisited: knowledge creation as a synthesizing
process," Knowledge Management Research &# 38; Practice, vol. 1, no. 1, pp. 2-10, 2003.
[20] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, "User acceptance of information technology: Toward a
unified view," MIS quarterly, pp. 425-478, 2003.
[21] S. Y. Choi, Y. S. Kang, and H. Lee, "The effects of socio-technical enablers on knowledge sharing: an exploratory
examination," Journal of Information Science, vol. 34, no. 5, p. 742, 2008.
[22] H. F. Lin, "Knowledge sharing and firm innovation capability: an empirical study," International Journal of
Manpower, vol. 28, no. 3/4, pp. 315-332, 2007.
[23] G. Meirovich, Y. Brender-Ilan, and A. Meirovich, "Quality of hospital service: the impact of formalization and
decentralization," International Journal of Health Care Quality Assurance, vol. 20, no. 3, pp. 240-252, 2007.
[24] C. Chen and S. Hung, "To give or to receive? Factors influencing members' knowledge sharing and community
promotion in professional virtual communities," Information & Management, vol. 47, no. 4, pp. 226-236, 2010.
[25] M. R. Lee and Y. C. Lan, "Toward a unified knowledge management model for SMEs," Expert Systems with
Applications, vol. 38, no. 1, pp. 729-735, 2011.
[26] J. M. Pawlowski and M. Bick, "The global knowledge management framework: Towards a theory for knowledge
management in globally distributed settings," Leading Issues in Knowledge Management, Volume Two, vol. 2, p.
134, 2015.
8. ISSN: 2302-9285
BEEI, Vol. 7, No. 1, March 2018 : 125 – 133
132
[27] Y. C. Lee and S. K. Lee, "Capabilities, processes, and performance of knowledge management: A structural
approach," Human Factors and Ergonomics in Manufacturing & Service Industries, vol. 17, no. 1, pp. 21-41,
2007.
[28] C. Chen and J. Huang, "How organizational climate and structure affect knowledge management--The social
interaction perspective," International Journal of Information Management, vol. 27, no. 2, pp. 104-118, 2007.
[29] A. Willem and M. Buelens, "Knowledge sharing in inter-unit cooperative episodes: The impact of organizational
structure dimensions," International Journal of Information Management, vol. 29, no. 2, pp. 151-160, 2009.
[30] C. Yang and L. C. Chen, "Can organizational knowledge capabilities affect knowledge sharing behavior?,"
Journal of Information Science, vol. 33, no. 1, pp. 95-109, 2007.
[31] H. Lin, "A stage model of knowledge management: an empirical investigation of process and effectiveness,"
Journal of Information Science, vol. 33, no. 6, p. 643, 2007.
[32] J. F. Cohen and K. Olsen, "Knowledge management capabilities and firm performance: A test of universalistic,
contingency and complementarity perspectives," Expert Systems with Applications, vol. 42, no. 3, pp. 1178-1188,
2015.
[33] W. Li, "Virtual knowledge sharing in a cross-cultural context," Journal of Knowledge Management, vol. 14, no. 1,
pp. 38-50, 2010.
[34] N. Behringer and K. Sassenberg, "Introducing social media for knowledge management: Determinants of
employees’ intentions to adopt new tools," Computers in Human Behavior, vol. 48, pp. 290-296, 2015.
[35] M. Razi, "Applicability of technology acceptance in knowledge management implementation," in The 6th
International Conference on Information Technology (ICIT 2013), Amman, Jordan, 2013.
[36] M. J. M. Razi, A Model of Knowledge Management Readiness And Its Contributing Factors: Measuring
organizational members readiness for knowledge management using intention to be involved with SECI processes.
Germany: LAP LAMBERT Academic Publishing, 2014, p. 268.
[37] J. Hair, W. Black, B. Babin, and R. Anderson, Multivariate Data Analysis a Global Perspective, Seventh ed. (New
Jersey). Pearson Education, 2010.
[38] J. Cohen, P. Cohen, S. G. West, and L. S. Aiken, Applied multiple regression/correlation analysis for the
behavioral sciences. Routledge, 2013.
[39] M. J. M. Razi, N. S. A. Karim, and N. Mohamed, "Knowledge management readiness measurement: Case study at
institution of higher learning in Malaysia," in 2011 International Conference on Research and Innovation in
Information Systems, 2011, pp. 1-5: IEEE.
[40] M. Cimperman, M. M. Brenčič, and P. Trkman, "Analyzing older users’ home telehealth services acceptance
behavior—applying an Extended UTAUT model," International journal of medical informatics, vol. 90, pp. 22-
31, 2016.
[41] M. Kuciapski, "A model of mobile technologies acceptance for knowledge transfer by employees," Journal of
Knowledge Management, no. just-accepted, pp. 00-00, 2017.
[42] L. Khanam, M. A. Mahfuz, and E. Ahmed, "Employee Behavioral Intention to Adopt Knowledge Management
Systems (KMS) in Bangladesh," in European Conference on Knowledge Management, 2016, p. 445: Academic
Conferences International Limited.
9. BEEI ISSN: 2302-9285
Antecedents of Knowledge Management Practices: Case of… (Mohamed Jalaldeen Mohamed Razi)
133
BIOGRAPHIES OF AUTHORS
Dr. Mohamed Jalaldeen Mohamed Razi is an Assistant Professor at the Department of
Information Systems, International Islamic University Malaysia (IIUM). He obtained his
bachelor degree in Commerce (B. Com) and Master degree in Business Administration (MBA)
from University of Colombo, Sri Lanka in 1998 and 2003 respectively and his PhD in
Information Technology (PhD in IT) from IIUM in 2011. Currently, his research interests are in
Knowledge Management, Electronic Commerce, and IT adoption and appropriation.
Mohd Izzuddin Mohd Tamrin is a Lecturer in the Department of Information System,
International Islamic University Malaysia. In 2004, he received his B.IT. degree majoring in
Information System Engineering from Multimedia University Malaysia. One year later, he
obtained his M.IT. degree from University of Melbourne Australia. In 2013, he earned his Ph.D.
degree from International Islamic University Malaysia. Prior to his academic life, he was
employed in IT Department for Telekom Malaysia, one of the biggest telecommunication service
providers in Malaysia.
Abdul Rahman Ahmad Dahlan is a Senior Academic Fellow at the Kulliyah of Information and
Communication Technology, International Islamic University Malaysia (IIUM). Currently, he is
the Deputy Director, Office of Corporate Strategy, IIUM.
Noor Azian Mohamad Ali is an Academic Fellow at the Department of Information Systems,
Kulliyyah of Information and Communication Technology in International Islamic University
Malaysia. Prior to being an academic fellow at IIUM, she has worked for Celcom Malaysia and
DiGi Telecommunication since 1995. Now, she is currently teaching project management course
and supervising students doing their final year projects. She is also a Project Coordinator at
IIUM Advanced Technologies Sdn Bhd overseeing system development and managing client
projects. Areas of interest and expertise are in telecommunication, project management, system
analysis and design, technopreneurship and startup development.