journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Effect of Knowledge Management on Organizational Performance - A Systematic L...scmsnoida5
Purpose: This paper aims to identify the state of
the art related to the research problem “The effect
of Knowledge Management on Organizational
Performance”.
Design/Methodology/Approach: The systematic
literature review includes 42 papers published
between 2010 and 2012. The selected papers were
classified according to research approach used, the
country and industry of the sample population,
research parameters/constructs studied, Data
Analysis and software tools used and the research
gaps in the inspected studies.
Findings: This paper significantly contributes
to the literature. First, the study has identified
and gathered if not all, then at least the
immense majority of “state of the art”
concerning the research problem from January,
2010 to September, 2012. Second, despite
the complications generated by the diversity
of the research approaches, research constructs, sample population, the study has been able
to aggregate the individual properties, thus
leading to a higher level of evidence about the
pieces of knowledge about the research problem
under investigation.
Originality/Value: The paper is the first effort
towards a systematic literature review of the
research problem.
Organizations worldwide are showing increasing interest in knowledge management practices to address the contemporary challenges of today's digital age. Knowledge is becoming a critical core asset to sustain competitive advantage and as a vehicle for continuous improvement and innovation. However, most of the developments in the knowledge management field are driven by international organizations or private commercial companies. Considering the impact of knowledge management practices, government organizations have the potential for significant improvements in performance, transformation, and the development of a more responsive citizen-centric government.
This article has two objectives: The first is to provide an overview of knowledge management and highlight the importance of this field of practice, and the second is to provide a case study of the successful implementation of knowledge management in a federal government organization in the United Arab Emirates. This article outlines the adopted approach and framework and elaborates on each of the implemented components. The presented case study and lessons learned are benchmarks for best practices and contribute to the existing experimental cases. This, in turn, should help organizations and researchers to better understand how public sector government organizations perceive and practicing knowledge management, which should enable them to reflect and propose improvements.
Process Mining in Supply Chains: A Systematic Literature Review IJECEIAES
Performance analysis and continuous process improvement efforts are often supported by the construction of process models representing the interactions of the partners in the supply chain. This study was conducted to determine the state of the art in the process mining field, specifically in the context of cross-organizational process. The Systematic Literature Review (SLR) method is used to review a collection of twenty-one papers that are classified according to the Artifact framework of Hevner, et al. and within the Process Mining framework of Van der Aalst. In the reviewed papers, the authors conducted a variety of techniques to establish the event log, which is then used to perform the process mining analysis. Eight of the reviewed papers focus on the definition of concepts or measures. Five of the papers describe models and other abstractions that are used as a theoretical basis for process mining in the context of supply chains. The majority twenty of papers describe some kind of informal method or formal algorithm to perform process mining analysis. Nine of the papers that propose a formal algorithm also present an accompanying software implementation. Eight papers discuss the data preparation challenges and twelve papers discuss process discovery techniques.
Higher education institutions now a days are operating in an increasingly complex and
competitive environment. The application of innovation is a must for sustaining its competitive advantage.
Institution leaders are using data management and analytics to question the status quo and develop effective
solutions. Achieving these insights and information requires not a single report from a single system, but
rather the ability to access, share, and explore institution-wide data that can be transformed into meaningful
insights at every level of the institution. Consequently, institutions are facing problems in providing necessary
information technology support for fulfilling excellence in performance. More specifically, the best practices
of big data management and analytics need to be considered within higher education institutions. Therefore,
the study aimed at investigating big data and analytics, in terms of: (1) definition; (2) its most important
principles; (3) models; and (4) benefits of its use to fulfill performance excellence in higher education
institutions. This involves shedding light on big data and analytics models and the possibility of its use in
higher education institutions, and exploring the effect of using big data and analytics in achieving performance
excellence. To reach these objectives, the researcher employed a qualitative research methodology for
collecting and analyzing data. The study concluded the most important result, that there is a significant
relationship between big data and analytics and excellence of performance as big data management and
analytics mainly aims at achieving tasks quickly with the least effort and cost. These positive results support
the use of big data and analytics in institutions and improving knowledge in this field and providing a practical
guide adaptable to the institution structure. This paper also identifies the role of big data and analytics in
institutions of higher education worldwide and outlines the implementation challenges and opportunities in the
education industry.
Effect of Knowledge Management on Organizational Performance - A Systematic L...scmsnoida5
Purpose: This paper aims to identify the state of
the art related to the research problem “The effect
of Knowledge Management on Organizational
Performance”.
Design/Methodology/Approach: The systematic
literature review includes 42 papers published
between 2010 and 2012. The selected papers were
classified according to research approach used, the
country and industry of the sample population,
research parameters/constructs studied, Data
Analysis and software tools used and the research
gaps in the inspected studies.
Findings: This paper significantly contributes
to the literature. First, the study has identified
and gathered if not all, then at least the
immense majority of “state of the art”
concerning the research problem from January,
2010 to September, 2012. Second, despite
the complications generated by the diversity
of the research approaches, research constructs, sample population, the study has been able
to aggregate the individual properties, thus
leading to a higher level of evidence about the
pieces of knowledge about the research problem
under investigation.
Originality/Value: The paper is the first effort
towards a systematic literature review of the
research problem.
Organizations worldwide are showing increasing interest in knowledge management practices to address the contemporary challenges of today's digital age. Knowledge is becoming a critical core asset to sustain competitive advantage and as a vehicle for continuous improvement and innovation. However, most of the developments in the knowledge management field are driven by international organizations or private commercial companies. Considering the impact of knowledge management practices, government organizations have the potential for significant improvements in performance, transformation, and the development of a more responsive citizen-centric government.
This article has two objectives: The first is to provide an overview of knowledge management and highlight the importance of this field of practice, and the second is to provide a case study of the successful implementation of knowledge management in a federal government organization in the United Arab Emirates. This article outlines the adopted approach and framework and elaborates on each of the implemented components. The presented case study and lessons learned are benchmarks for best practices and contribute to the existing experimental cases. This, in turn, should help organizations and researchers to better understand how public sector government organizations perceive and practicing knowledge management, which should enable them to reflect and propose improvements.
Process Mining in Supply Chains: A Systematic Literature Review IJECEIAES
Performance analysis and continuous process improvement efforts are often supported by the construction of process models representing the interactions of the partners in the supply chain. This study was conducted to determine the state of the art in the process mining field, specifically in the context of cross-organizational process. The Systematic Literature Review (SLR) method is used to review a collection of twenty-one papers that are classified according to the Artifact framework of Hevner, et al. and within the Process Mining framework of Van der Aalst. In the reviewed papers, the authors conducted a variety of techniques to establish the event log, which is then used to perform the process mining analysis. Eight of the reviewed papers focus on the definition of concepts or measures. Five of the papers describe models and other abstractions that are used as a theoretical basis for process mining in the context of supply chains. The majority twenty of papers describe some kind of informal method or formal algorithm to perform process mining analysis. Nine of the papers that propose a formal algorithm also present an accompanying software implementation. Eight papers discuss the data preparation challenges and twelve papers discuss process discovery techniques.
Higher education institutions now a days are operating in an increasingly complex and
competitive environment. The application of innovation is a must for sustaining its competitive advantage.
Institution leaders are using data management and analytics to question the status quo and develop effective
solutions. Achieving these insights and information requires not a single report from a single system, but
rather the ability to access, share, and explore institution-wide data that can be transformed into meaningful
insights at every level of the institution. Consequently, institutions are facing problems in providing necessary
information technology support for fulfilling excellence in performance. More specifically, the best practices
of big data management and analytics need to be considered within higher education institutions. Therefore,
the study aimed at investigating big data and analytics, in terms of: (1) definition; (2) its most important
principles; (3) models; and (4) benefits of its use to fulfill performance excellence in higher education
institutions. This involves shedding light on big data and analytics models and the possibility of its use in
higher education institutions, and exploring the effect of using big data and analytics in achieving performance
excellence. To reach these objectives, the researcher employed a qualitative research methodology for
collecting and analyzing data. The study concluded the most important result, that there is a significant
relationship between big data and analytics and excellence of performance as big data management and
analytics mainly aims at achieving tasks quickly with the least effort and cost. These positive results support
the use of big data and analytics in institutions and improving knowledge in this field and providing a practical
guide adaptable to the institution structure. This paper also identifies the role of big data and analytics in
institutions of higher education worldwide and outlines the implementation challenges and opportunities in the
education industry.
This study is an initial attempt, to investigate the factors that are responsible in driving the growth of Project Management Education in India. For more info visits http://www.pmi.org.in/reports.asp
09 9241 it co-citation network investigation (edit ari)IAESIJEECS
This paper reports a co-citation network investigation (bibliometric investigation) of 10 journals in the management of technology (MOT) field. And also presenting different bibliometric thoughts, organize investigation devices recognize and investigate the ideas secured by the field and their between connections. Particular outcomes from various levels of investigation demonstrate the diverse measurements of technology administration: Co-word terms recognize subjects, Journal co-reference arrange: connecting to different controls, Co-citation network indicate groupings of topics. The examination demonstrates that MOT has a connecting part in coordinating thoughts from a few particular orders. This recommends administration and technique are vital to MOT which basically identifies with the firm as opposed to arrangement. Additionally we have a double concentrate on abilities, however can see inconspicuous contrasts by the way we see these thoughts, either through an inwards looking focal point to perceive how associations capacity, or all the more outward to comprehend setting and change in landscapes.
This study is an initial attempt, to investigate the factors that are responsible in driving the growth of Project Management Education in India. The study throws light on specific factors that emerge after studying the available literature on the subject as well as the responses compiled from a cross-section of the primary stakeholders namely the Government, Academic Institutions, Practising Executives and Human Resource Managers connected with project management education and training.
For more info visit http://www.pmi.org.in/reports.asp
This study focuses on determining a working ‘selection criteria model’ that will help Information
Technology (IT) companies choose the right candidates to work on their IT projects in areas such as system
design, requirement gathering and management,
ow-a-days data volumes are growing rapidly in several domains. Many factors have contributed to this growth, including inter alia proliferation of observational devices, miniaturization of various sensors ,improved logging and tracking of systems, and improvements in the quality and capacity of both disk storage and networks .Analyzing such data provides insights that can be used to guide decision making. To be effective, analysis must be timely and cope with data scales. The scale of the data and the rates at which they arrive make manual inspection infeasible. As an educational management tool, predictive analytics can help and improve the quality of education by letting decision makers address critical issues such as enrollment management and curriculum Development. This paper presents an analytical study of this approach’s prospects for education planning. The goals of predictive analytics are to produce relevant information, actionable insight, better outcomes, and smarter decisions, and to predict future events by analyzing the volume, veracity, velocity, variety, value of large amounts of data and interactive exploration.
Management is a process or mechanism to manage any facet or things; where the things or facet may be tangible or may be intangible in nature. In other sense, management is an art of techniques to manage the asset. The study and academic domain of management is called as Management Science. Practically management is applicable in all most all the sector or place or academic domain. In computer science, medical science and even sociology there is a full-fledged role and importance may be seen as far as management is concerned. Practically in Information Science also management deal a lead role. Traditional Information Science or computational Information Science, Management may be applied in several places. This paper is talks about management, its requirement; role of management in information science both the traditional and contemporary and future potential.
Impact of education on innovation performance: evidence from Azerbaijan const...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Knowledge Management: A Literature ReviewOlivia Moran
Is technology the key critical factor, which determines the success or failure of a
Knowledge Management (KM) implementation initiative? Are there other factors,
which contribute to its success or failure?
KM is concerned with sharing and managing information. People need to be seen as
the primary key to its success, as they play a very crucial role. People hold substantial
amounts of information and they need to be encouraged to share it. Technology is
available to support knowledge sharing, but this does not mean that people will
automatically give it up.
This paper examines the human element of knowledge management
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This study is an initial attempt, to investigate the factors that are responsible in driving the growth of Project Management Education in India. For more info visits http://www.pmi.org.in/reports.asp
09 9241 it co-citation network investigation (edit ari)IAESIJEECS
This paper reports a co-citation network investigation (bibliometric investigation) of 10 journals in the management of technology (MOT) field. And also presenting different bibliometric thoughts, organize investigation devices recognize and investigate the ideas secured by the field and their between connections. Particular outcomes from various levels of investigation demonstrate the diverse measurements of technology administration: Co-word terms recognize subjects, Journal co-reference arrange: connecting to different controls, Co-citation network indicate groupings of topics. The examination demonstrates that MOT has a connecting part in coordinating thoughts from a few particular orders. This recommends administration and technique are vital to MOT which basically identifies with the firm as opposed to arrangement. Additionally we have a double concentrate on abilities, however can see inconspicuous contrasts by the way we see these thoughts, either through an inwards looking focal point to perceive how associations capacity, or all the more outward to comprehend setting and change in landscapes.
This study is an initial attempt, to investigate the factors that are responsible in driving the growth of Project Management Education in India. The study throws light on specific factors that emerge after studying the available literature on the subject as well as the responses compiled from a cross-section of the primary stakeholders namely the Government, Academic Institutions, Practising Executives and Human Resource Managers connected with project management education and training.
For more info visit http://www.pmi.org.in/reports.asp
This study focuses on determining a working ‘selection criteria model’ that will help Information
Technology (IT) companies choose the right candidates to work on their IT projects in areas such as system
design, requirement gathering and management,
ow-a-days data volumes are growing rapidly in several domains. Many factors have contributed to this growth, including inter alia proliferation of observational devices, miniaturization of various sensors ,improved logging and tracking of systems, and improvements in the quality and capacity of both disk storage and networks .Analyzing such data provides insights that can be used to guide decision making. To be effective, analysis must be timely and cope with data scales. The scale of the data and the rates at which they arrive make manual inspection infeasible. As an educational management tool, predictive analytics can help and improve the quality of education by letting decision makers address critical issues such as enrollment management and curriculum Development. This paper presents an analytical study of this approach’s prospects for education planning. The goals of predictive analytics are to produce relevant information, actionable insight, better outcomes, and smarter decisions, and to predict future events by analyzing the volume, veracity, velocity, variety, value of large amounts of data and interactive exploration.
Management is a process or mechanism to manage any facet or things; where the things or facet may be tangible or may be intangible in nature. In other sense, management is an art of techniques to manage the asset. The study and academic domain of management is called as Management Science. Practically management is applicable in all most all the sector or place or academic domain. In computer science, medical science and even sociology there is a full-fledged role and importance may be seen as far as management is concerned. Practically in Information Science also management deal a lead role. Traditional Information Science or computational Information Science, Management may be applied in several places. This paper is talks about management, its requirement; role of management in information science both the traditional and contemporary and future potential.
Impact of education on innovation performance: evidence from Azerbaijan const...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Knowledge Management: A Literature ReviewOlivia Moran
Is technology the key critical factor, which determines the success or failure of a
Knowledge Management (KM) implementation initiative? Are there other factors,
which contribute to its success or failure?
KM is concerned with sharing and managing information. People need to be seen as
the primary key to its success, as they play a very crucial role. People hold substantial
amounts of information and they need to be encouraged to share it. Technology is
available to support knowledge sharing, but this does not mean that people will
automatically give it up.
This paper examines the human element of knowledge management
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Mapping the Intellectual Structure of Contemporary Technology Management Rese...Che-Wei Lee
This study uses bibliometric and social network analysis techniques to map the intellectual structure of technology management research in the 21st century. It identifies the most important publications and the most influential scholars as well as the correlations among these scholar’s publications. By analyzing 10,061 citations of 482 articles published in Science Citation Index (SCI) and Social Science Citation Index (SSCI) journals in the field of technology management research between 2002 and 2006, this study maps an invisible network of knowledge of technology management studies. The results of the mapping can help identify the direction of technology management research and provide a tool to help researchers access and contribute to the literature in this area.
Keywords: technology management, intellectual structure, bibliometric techniques, social network analysis, invisible network of knowledge
ORIGINAL ARTICLEBig data analytics capabilities a systema.docxaman341480
ORIGINAL ARTICLE
Big data analytics capabilities: a systematic literature
review and research agenda
Patrick Mikalef1 • Ilias O. Pappas1 • John Krogstie1 •
Michail Giannakos1
Received: 15 November 2016 / Revised: 3 July 2017 / Accepted: 12 July 2017 /
Published online: 15 July 2017
� Springer-Verlag GmbH Germany 2017
Abstract With big data growing rapidly in importance over the past few years,
academics and practitioners have been considering the means through which they
can incorporate the shifts these technologies bring into their competitive strategies.
To date, emphasis has been on the technical aspects of big data, with limited
attention paid to the organizational changes they entail and how they should be
leveraged strategically. As with any novel technology, it is important to understand
the mechanisms and processes through which big data can add business value to
companies, and to have a clear picture of the different elements and their interde-
pendencies. To this end, the present paper aims to provide a systematic literature
review that can help to explain the mechanisms through which big data analytics
(BDA) lead to competitive performance gains. The research framework is grounded
on past empirical work on IT business value research, and builds on the resource-
based view and dynamic capabilities view of the firm. By identifying the main areas
of focus for BDA and explaining the mechanisms through which they should be
leveraged, this paper attempts to add to literature on how big data should be
examined as a source of competitive advantage. To this end, we identify gaps in the
extant literature and propose six future research themes.
Keywords Big data � Dynamic capabilities � Resource-based view � Competitive
performance � IT strategy
& Patrick Mikalef
[email protected]
1
Norwegian University of Science and Technology, Trondheim, Norway
123
Inf Syst E-Bus Manage (2018) 16:547–578
https://doi.org/10.1007/s10257-017-0362-y
http://crossmark.crossref.org/dialog/?doi=10.1007/s10257-017-0362-y&domain=pdf
http://crossmark.crossref.org/dialog/?doi=10.1007/s10257-017-0362-y&domain=pdf
https://doi.org/10.1007/s10257-017-0362-y
1 Introduction
The application of big data in driving organizational decision making has attracted
much attention over the past few years. A growing number of firms are focusing
their investments on big data analytics (BDA) with the aim of deriving important
insights that can ultimately provide them with a competitive edge (Constantiou and
Kallinikos 2015). The need to leverage the full potential of the rapidly expanding
data volume, velocity, and variety has seen a significant evolution of techniques and
technologies for data storage, analysis, and visualization. However, there has been
considerably less research attention on how organizations need to change in order to
embrace these technological innovations, as well as on the business shifts they entail
(McAfee et al. .
ORIGINAL ARTICLEBig data analytics capabilities a systema.docxvannagoforth
ORIGINAL ARTICLE
Big data analytics capabilities: a systematic literature
review and research agenda
Patrick Mikalef1 • Ilias O. Pappas1 • John Krogstie1 •
Michail Giannakos1
Received: 15 November 2016 / Revised: 3 July 2017 / Accepted: 12 July 2017 /
Published online: 15 July 2017
� Springer-Verlag GmbH Germany 2017
Abstract With big data growing rapidly in importance over the past few years,
academics and practitioners have been considering the means through which they
can incorporate the shifts these technologies bring into their competitive strategies.
To date, emphasis has been on the technical aspects of big data, with limited
attention paid to the organizational changes they entail and how they should be
leveraged strategically. As with any novel technology, it is important to understand
the mechanisms and processes through which big data can add business value to
companies, and to have a clear picture of the different elements and their interde-
pendencies. To this end, the present paper aims to provide a systematic literature
review that can help to explain the mechanisms through which big data analytics
(BDA) lead to competitive performance gains. The research framework is grounded
on past empirical work on IT business value research, and builds on the resource-
based view and dynamic capabilities view of the firm. By identifying the main areas
of focus for BDA and explaining the mechanisms through which they should be
leveraged, this paper attempts to add to literature on how big data should be
examined as a source of competitive advantage. To this end, we identify gaps in the
extant literature and propose six future research themes.
Keywords Big data � Dynamic capabilities � Resource-based view � Competitive
performance � IT strategy
& Patrick Mikalef
[email protected]
1
Norwegian University of Science and Technology, Trondheim, Norway
123
Inf Syst E-Bus Manage (2018) 16:547–578
https://doi.org/10.1007/s10257-017-0362-y
http://crossmark.crossref.org/dialog/?doi=10.1007/s10257-017-0362-y&domain=pdf
http://crossmark.crossref.org/dialog/?doi=10.1007/s10257-017-0362-y&domain=pdf
https://doi.org/10.1007/s10257-017-0362-y
1 Introduction
The application of big data in driving organizational decision making has attracted
much attention over the past few years. A growing number of firms are focusing
their investments on big data analytics (BDA) with the aim of deriving important
insights that can ultimately provide them with a competitive edge (Constantiou and
Kallinikos 2015). The need to leverage the full potential of the rapidly expanding
data volume, velocity, and variety has seen a significant evolution of techniques and
technologies for data storage, analysis, and visualization. However, there has been
considerably less research attention on how organizations need to change in order to
embrace these technological innovations, as well as on the business shifts they entail
(McAfee et al. ...
Identification and Ranking of Factors in Successful Implementation of Knowled...IOSRJBM
Many organizations focus on knowledge management and make huge investments in information technology. The purpose of this study was to identify and rank the driving factors in successful implementation of knowledge management in EghtesadNovin (EN) Bank of Iran using the AHP technique. 128 employees of the EN Bank participated in the study. Data were collectedusing a researcher-made questionnaire with a Cronbach’s alpha of 0.873. AHP was used in Expert Choice to rank knowledge management success factors. The results indicated that strategy, senior management support, human resource management, organizational infrastructure, culture, incentives, administrative processes, and employee involvement were respectively the most important factors in successful implementation of knowledge management in EN Bank.
Social media-based systems: an emerging area of information systems research ...Nurhazman Abdul Aziz
This article presents a review of the social media-based systems; an emerging
area of information system research, design, and practice shaped by social media phenomenon. Social media-based system (SMS) is the application of a wider range of social software and social media phenomenon in organizational and non-organization context to facilitate every day interactions. To characterize SMS, a total of 274 articles (published during 2003–2011) were analyzed that were classified as computer science information system related in the Web of Science data base and had at least one social media phenomenon related keyword—social media; social network analysis; social network; social network site; and social network system. As a result, we found four main research streams in SMS research dealing with: (1) organizational aspect of SMS, (2) non-organizational aspect of SMS, (3) technical aspect of SMS, and (4) social as a tool. The results indicates that SMS research is fragmented and has not yet found way into the core IS journals, however, it is diverse and interdisciplinary in nature. We also proposed that unlike the
conventional and socio-technical IS where information is bureaucratic, formal, bounded within the intranet, and tightly controlled by organizations; in the SMS context, information is social, informal, boundary-less (i.e. boundary is within the internet), has less control, and more sharing of information may lead to higher value/impact.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 8, Issue 11 (October 2013), PP. 09-16
Citation Analysis of Technology Management Texts in
Selected Databases: A Comparison between 2002-2006
and 2007-2011
Chin-Hsiu Tai1, Che-Wei Lee2, Yender Lee3
1
Graduate School of Business and Operations Management, Chang Jung Christian University, No. 396, Sec. 1,
Changrong Rd., Guiren District, Tainan County 711, Taiwan (ROC).
2
Institute for International Studies in Education, University of Pittsburgh, 5708 Wesley W. Posvar Hall,
Pittsburgh, PA 15260, USA.
3
Graduate School of Business and Operations Management, Chang Jung Christian University, No. 396, Sec. 1,
Changrong Rd., Guiren District, Tainan City 71101, Taiwan (ROC).
Abstract:- In recent years, both academic and commercial sectors have recognized the importance of
Technology Management, which has seen significant progress under the efforts of relevant organizations. To
obtain quantified data to demonstrate the development of technology management, this study explored the
intellectual structure of Technology Management research over the last decade by identifying the most
important publications, the most influential scholars, and the correlations among the publications in which these
scholars appeared. We employed techniques based on bibliometry and social network analysis to identify the
intellectual literary pillars in the field of technology management. Our analysis included 29,572 citations in
1,167 articles published in SCI and SSCI journals between 2002 and 2011. We used our results to map a
knowledge network of studies related to Technology Management in order to reveal current trends and provide a
valuable resource for researchers seeking to access literature in this area. We hope that the results of our
research will enable more scholars of technology management to publish their research in international journals.
Keywords:- citation analysis, co-citation analysis, technology management, intellectual structure, bibliometric
techniques, social network analysis
I.
INTRODUCTION
Technology management is a process that involves planning, directing, controlling, coordinating,
establishing and implementing technological capacity for the purpose of contributing to organizational strategy
and realizing business goals. The increasing popularity of wireless portable devices (laptop computers, PDAs,
and wireless telephones), has highlighted the importance of Technology Management in today’s society [1].
According to Sanchez Quiros, Isabel and Garcia-Tenorio Ronda, Jesus, the model used in Canadian
Biotechnology companies was investigated to reveal the process of innovation according to the following: (1)
identification of the most appropriate competitive strategy; (2) the mediating role of developments in
Technology Management; (3) the decisive role of Technology Management in the development of
organizational commitment; and, finally, (4) the effect of organizational commitment on organizational results
[2]. Gholifar et al. applied structural equation modeling to investigate the factors influencing the psychological
empowerment of faculty members regarding access to human resource development in colleges in Iran.
Technology Management has been described as a dynamic, distributed system of wireless nodes that move
independently from one another.
Technology management is firmly established as an academic discipline. Technology is continually
developing and global markets frequently see change in response to technological growth. Proper technology
management is highly beneficial in this unpredictable environment. The success or failure of an organization
depends on its ability to respond to reform. However, this process has been slow. One reason is that researchers
prefer to publish their best work in established journals, despite the fact that many of the newer publications are
more closely related to their field of study. Another major obstacle to its development lies in the unusually high
degree of interaction with other disciplines, which tends to blur the boundaries regarding what Technology
Management actually refers to. As a result, the theoretical models and analytical tools developed in this area
tend to be attributed to other fields. With limited resources for the further development of Technology
Management, the cross-fertilization of ideas between scholars in this area will be increasingly difficult to
promote. Thus, numerous questions remain regarding the characteristics that differentiate Technology
Management from other fields, the effectiveness of research in this area, and the future prospects and needs of
individuals actively engaged in this field of study.
9
2. Citation Analysis of Technology Management Texts in Selected…
The objective of this study was to provide researchers in Technology Management a unique map with which to
navigate related publications as well as a systematic, objective overview of various themes and concepts that are
driving further developments in this area. We also sought to identify the linkage among various publications and
confirm their status and position with regard to the development of this field. We employed citation and cocitation analysis, social network analysis, and factor analysis to identify the invisible network of knowledge
generation underlying the literature related to Technology Management.
II.
DEFINITION AND CHARACTERISTICS OF TECHNOLOGY MANAGEMENT
Definition of Technology Management
Technology management is a recently emerged discipline in the fields of education and research.
Although scholars have varying interpretations of what falls under “technology”, technology management can
be briefly defined as follows: Technology management integrates knowledge from the fields of technology,
engineering and management into the planning, development and operation of technological products in order to
achieve organizational objectives. The scope of technology management covers improvement to R&D
efficiency, acceleration of product development, technical strategy, industry policy, technology policy,
intellectual property rights, technological development and humanistic society.
A.
Characteristics of Technology Management
The high-tech industry is continually changing and exhibits such characteristics as short product
lifespan, rapid technological development and high operational risk. In response to changing technology and
resources, an increasing number of businesses are moving toward strategic alliances in which they hope to
utilize their respective advantages for mutual benefit which will strengthen the position of each organization in
its own area of specialization.
B.
III.
THE STUDY OF ACADEMIC LITERATURE
Literature reviews are commonly used to study a body of literature; however, this approach tends to be
somewhat subjective. Recently, quantifiable techniques have gained popularity, due to the growing availability
of online databases. The objectivity of this approach makes these techniques particularly attractive [3].
A number of previous studies have explored the literature of management research using bibliometric
techniques. In an examination of the intellectual structure of information systems research, Dillon, Taylor, and
van Wingen noted that the discipline has shifted from fragmented adhocracy to a polycentric state, which is
particularly appropriate to an applied discipline [4]. Zhao and Wang used co-citation analysis to identify the
most influential authors and studies in the field of pervasive and ubiquitous computing [5]. Chen, Zhang, and Li
transformed the original paper-reference matrix into a tool for visual analyses in their exploration of new
approaches to reveal co-citation relationships [6].
Lin, Kuo, and McLee appear to have conducted the only current study in Technology Management,
when they applied factorial analysis techniques to examine the research paradigms of web services [7]. To gain
a deeper understanding of the literature gap in this area, we applied citation and co-citation analysis to recent
studies in Technology Management, as cited from the Science Citation Index (SCI) and Social Sciences Citation
Index (SSCI), covering more than 9,000 journal titles.
IV.
METHODOLOGY
This study cited the following data: authors, journal articles, publication outlets, cited references, and
publication dates. According to the objectives of this study, we included only those authors who explored the
intellectual structure of Technology Management between 2002 and 2011. We selected this time period because
studies over the last five years represent the most important research in this field. We employed citation and cocitation analysis as the research methodology. In the first stage, we identified publications related to Technology
Management from databases. We then developed techniques to collect and analyze data related to authors,
topics, and journals in this field.
Second, we analyzed and systematized the data through screening, ranking, sorting, summing, and subtotaling. Key nodes in the invisible network of knowledge were identified prior to developing the structure.
After several iterations, we produced a map outlining the knowledge distribution process in the field of
Technology Management.
We opted not to use data from journals selected by peer researchers [8]. We conducted analysis using
only data obtained from SCI and SSCI for the period from 2002 to 2011. We used the following key words to
collect data: “Technology Management”. This search returned 1,167 journal articles with citations from 29,572
publications. Books and journal articles were both cited as references.
10
3. Citation Analysis of Technology Management Texts in Selected…
V.
RESULTS
Citation Analysis
Excel was used to tabulate the source documents and references in order to identify scholars in the field
of Technology Management. Our background statistics obtained through citation analysis are as follows. As
shown in Table 1, the most commonly cited journals in Technology Management over the last decade are
STRATEGIC MANAGE J MIS QUART and MANAGE SCI.
We discovered that no journals dedicated to the field of Technology Management ranked higher than
No. 14 in the area of “INT J TECHNOL MANAGE”, indicating that most researches in this area still prefer to
publish in journals that are not specific to this field of research. This indicates that Technology Management has
yet to develop into a fully-fledged field, due to a lack of specific systems for the generation and dissemination
knowledge. According to a cluster of titles focusing on information systems, we determined that the general
pattern among researchers in Technology Management is to cite journals specific to information systems and
computers.
A.
TABLE I: MOST FREQUENTLY CITED JOURNAL: 2002-2011
Journals
Total Citations
STRATEGIC MANAGE J
307
MIS QUART
264
MANAGE SCI
242
HARVARD BUS REV
179
ORGAN SCI
177
TECHNOVATION
171
ACAD MANAGE REV
162
RES POLICY
157
ACAD MANAGE J
148
JAMA-J AM MED ASSOC
148
ADMIN SCI QUART
135
DIABETES CARE
133
J MARKETING
128
INT J TECHNOL MANAGE
120
NEW ENGL J MED
105
R&D MANAGE
104
COMMUN ACM
102
We then identified the most influential scholars and the most influential documents according to the
number of citations found in the selected journal articles. As shown in Table 2, the most commonly cited
publications related to Technology Management between 2002 and 2006 were KNOWLEDGE CREATING C,
STRATEGIC MANAGE J and ADMIN SCI QUART. As shown in Table 3, between 2007 and 2011, the three
most commonly cited publications were KNOWLEDGE CREATING C , J MANAGE, and MIS QUART.
Total Citations
16
9
8
8
7
7
6
6
6
TABLE II: MOST COMMONLY CITED DOCUMENTS: 2002-2006
Full Citation Index For Document
Nonaka I., 1995, KNOWLEDGE CREATING C
Teece DJ, 1997, STRATEGIC MANAGE J, V18, P509
COHEN WM, 1990, ADMIN SCI QUART, V35, P128
Davenport T. H., 1998, WORKING KNOWLEDGE
Alavi M, 2001, MIS QUART, V25, P107
Grant RM, 1996, STRATEGIC MANAGE J, V17, P109
Leonard-Barton D., 1995, WELLSPRINGS KNOWLEDG
Norberg A. L., 2005, COMPUTERS COMMERCE S
PRAHALAD CK, 1990, HARVARD BUS REV, V68, P79
The five most commonly cited scholars between 2002 and 2006 were RANKY P.G., KARWOWSKI
W., MACMILLAN K.L., Nonaka I., and Teece D.J. (see Table 4), after combining journal articles and books.
Between 2007 and 2011, the status changed to DAVIS F.D., DAVENPORT T.H., Nonaka I., Teece D.J., and
Venkatesh V. (see Table 5). These authors represent the researchers with the greatest influence in the promotion
11
4. Citation Analysis of Technology Management Texts in Selected…
of Technology Management. Their contributions are the focus of most research in this field and an indication of
the historical value as well as popularity of various topics in the field of Technology Management.
TABLE III: MOST COMMONLY CITED DOCUMENTS: 2007-2011
Total Citations
Full Citation Index For Document
17
Nonaka I., 1995, KNOWLEDGE CREATING C
14
BARNEY J, 1991, J MANAGE, V17, P99
13
Alavi M, 2001, MIS QUART, V25, P107
13
DAVIS FD, 1989, MIS QUART, V13, P319
12
Rogers E.M., 1995, DIFFUSION INNOVATION
COHEN WM, 1990, ADMIN SCI QUART, V35,
10
P128
FORNELL C, 1981, J MARKETING RES, V18,
10
P39
9
Bharadwaj AS, 2000, MIS QUART, V24, P169
EISENHARDT KM, 1989, ACAD MANAGE
9
REV, V14, P532
8
DAVIS FD, 1989, MANAGE SCI, V35, P982
By means of the citation analysis, we do not eliminate the bias against younger scholars who places
more emphasis on the quality (as opposed to the quantity) of the documents produced by a given scholar than a
ranking of authors based on the frequencies with which a particular author has been cited (as in Table 4 and 5), a
paper-based ranking (as in Table 2 and 3). These results further indicate that a high number of citations can
influence what is termed field-defining titles, laying the ground work for an understanding of Technology
Management as a distinct phenomenon. We compared Table 2 with Table 3 to identify patterns in the first five
years with patterns in the second five years. To begin with, the two most influential publications in the last five
years indicate that their dominant status for the past five years on Technology Management researches.
TABLE IV: MOST COMMONLY CITED AUTHORS: 2002-2006
Author
Frequency
Author
Frequency
RANKY P.G .
26
AMASAKA K.
16
KARWOWSKI W.
20
NOAH L.
16
MACMILLAN K.L.
20
GRANT R.M.
15
Nonaka I.
20
Granstrand O.
13
Teece D.J.
19
Nonaka I.
13
TABLE V: HIGHLY CITED AUTHORS: 2007-2011
Author
DAVIS F.D.
DAVENPORT T.H.
Nonaka I.
Teece D.J.
Venkatesh V.
Frequency
25
24
23
23
23
Author
EISENHARDT K.M.
ORLIKOWSKI W.J.
Linton J.D.
Rogers E.M.
Alavi M.
Frequency
21
21
19
18
17
As show in the table, the total number of citations is gradually increasing, which indicates that
Technology Management is increasingly recognized as an academic field and gaining increased recognition in
the literature. Few differences were observed between the most influential papers in the first five years and those
in the last five years. In fact, four of the top five most cited publications remained the same, despite slight
differences in ranking. Of particular note is the fact that the publications of RANKY P.G., KARWOWSKI W.,
MACMILLAN K.L., Nonaka I., and Teece D.J. are in the top five most cited publications in the first five years
as well as the last five years. This result indicates that a small number of influential authors still dominate the
field of Technology Management and more theoretical breakthroughs will be required to further develop this
area of study.
Co-citation Analysis
We further employed bibliometric techniques to perform data mapping in order to reveal the
intellectual structure of current research in the field of Technology Management. We counted documents
B.
12
5. Citation Analysis of Technology Management Texts in Selected…
selected from paired or co-cited documents in matrix form to capture statistical snapshots at distinct points in
time [9].
Co-citation analysis for each of the source documents was tabulated using Excel. This proved difficult
because many of the authors had very few co-citations which meant that they were unlikely to have had a
significant impact on the development of the field. In addition, their co-citations may also have been too new to
have had an impact on the literature. To improve the efficacy of analysis, we required that the authors selected
in the final set had at least 30 citations during the first five years and 30 during the last five years. The top
scholars were identified according to the total number of citations in the selected journals.
Four factors were extracted from the data in the first five years, the sum of which explained over 74.8%of the
variance in the correlation matrix. Table 6 lists the four most important factors along with the authors that had a
factor loading of at least 0.5. As is common in this type of analysis, authors with less than a 0.5 loading or with
cross-loadings were dropped from the final results [10].
We tentatively assigned names to the factors on the basis of our own interpretation. Our interpretation
of the results led us to conclude that research in Technology Management during this period comprised at least
three sub-fields: Agency theory, management systems, and biomedical innovation (Fig. 1). Due to their small
eigenvalues, we made no attempt to interpret the remaining factors and excluded them from Table 6.
Over the last five years, studies in Technology Management also clustered around various research themes, the
sum of which explained over 84.8% of the variance in the correlation matrix. Table 7 lists the four most
important factors along with the authors that had a factor loading of at least 0.5. Our interpretation of the results
led us to conclude that research in Technology Management during this period comprised at least four sub-fields:
dynamically-competitive, field studies , infrastructure, and information technology (Fig. 2).
Table 6 presents the clustering of the most influential authors in Technology Management from 2002 to
2006. The main research focused on Agency theory, two dynamic routing protocols for ad hoc networks
Dynamic Source Routing protocol [11], and information technology and much of this research was performed
by Das, Perkins, and Royer [12].
Interestingly, the common characteristic of Dynamic Source Routing protocol and information
technology is that both initiate routing activities on an on-demand basis. The reactive nature of these protocols
demonstrates how these differ from traditional proactive protocols [11]. Studies on information technology and
Dynamic Source Routing protocol found a route to the destination using the flooding method, such that the
number of rebroadcasts of route request packets is proportional to the number of nodes [13].
Fig.1: key research themes in technology management (2002-2006)
Fig.2: key research themes in technology management (2007-2011)
13
6. Citation Analysis of Technology Management Texts in Selected…
Authors dealing with Multipath routing in the second group are also shown in Table 6. In these studies,
multiple paths are established to obtain direct control over each path, thereby increasing reliability, performance,
and security.
The authors in the third group dealt with grid location service (GLS) combined with geographic
forwarding that allows scaling to a larger number of nodes than possible with previous solutions [14]. Broch et
al. provide overviews of these ad hoc routing techniques, along with comparative measurements using 30-50
nodes simulations [15]. GLS can be used as a location service in a routing protocol to considerably improve the
scaling properties of mobile networks.
As shown in Table 7, over the second five years, the most influential authors clustered together around
On-demand Routing. Toh presented routing protocols for ad hoc networks, mobility, and power conservation,
including DSR and Associativity based routing (ABR) that initiate routing activities on an on-demand basis [16].
The authors in the second group dealt with Secure Technology Management. Zhang and Lee claimed that
intrusion detection can complement intrusion prevention techniques to improve network security [17]. Zhou
identified the absence of a fixed infrastructure as the single most important feature of security services [18].
The authors in the third group dealt with Multipath Routing. Lee and Gerla claimed that Multipath routing can
be useful in improving the effective bandwidth of communication pairs, dealing with bursty traffic, responding
to congestion, and increasing delivery reliability [19].
TABLE VI: AUTHOR FACTOR LOADINGS: 2002-2006
Factor 1
Factor 2
Agency theory
57.30%
management systems
11.30%
Eisenhardt K.M.
0.983
Alavi M.
0.834
Grant R.M.
0.982
Karwowski W.
0.649
Kogut B.
0.974
Grover V.
0.625
Teece D.J.
0.964
Davenport T.H.
0.558
Porter M.E.
0.963
Factor 3
Cohen W.M.
0.959
biomedical innovation 6.20%
Prahalad C.K.
0.956
Noah L.
0.613
Dyer J.H.
0.952
Brown J.S.
0.606
Nonaka I.
0.88
Rogers E.M.
0.878
Granstrand O.
0.867
Hamel G.
0.777
Drejer A.
0.74
Davenport T.H.
0.687
Choi T.Y.
0.655
Grover V.
0.629
Lemley M.A.
0.545
dynamicallycompetitive
Grant R.M.
Cohen W.M.
Barney J.
Eisenhardt K.M.
Teece D.J.
Christensen C.M.
Nonaka I.
Linton J.D.
Siegel D.S.
Davenport T.H.
Brynjolfsson E.
Clemons E.K.
TABLE VII: AUTHOR FACTOR LOADINGS: 2007-2011
Factor 1
Factor
2
39.60%
field studies
15.40%
Technology
Management
0.915
Venkatesh V.
0.866
Bond C.A.
0.911
Rogers E.M.
0.845
Glasgow R.E.
0.908
Davis F.D.
0.844
Zhu K.
0.907
Pilkington A.
Factor
3
0.894
infrastructure
9.90%
Lancioni G.E.
0.894
Kim S.
0.709
Khan Z.R.
0.85
Pilkington A.
0.699
0.784
Zhu K.
0.698
Information
Technology
0.781
Glasgow R.E.
0.562
Benaroch M.
0.774
Clemons E.K.
0.75
0.743
Biology management
14
Factor 4
9.70%
0.699
0.626
0.541
0.53
0.504
0.5
Factor 5
6.50%
0.839
0.608
Factor 6
3.70%
7. Citation Analysis of Technology Management Texts in Selected…
Orlikowski W.J.
Podsakoff P.M.
Alavi M.
Fornell C.
0.717
0.654
0.606
0.54
Khan Z.R.
Lancioni G.E.
0.622
0.541
VI.
CONCLUSION
There has been extensive research in the field of Technology Management over the past decade. This
study investigates this research using citation and co-citation data published in SCI and SSCI between 2002 and
2011. This study used factor analysis of co-citation data to create a study map of the intellectual structure of
research in Technology Management. Our findings suggest suggests that the contemporary Technology
management research in this field is organized along different concentrations of interestscentered around the
following topics: dynamically-competitive, field studiesTechnology management, and infrastructure. It appears
that Technology Management has created its own literature and gained a reputation as a legitimate academic
field. Journals specific to Technology Management, such as STRATEGIC MANAGE J, MIS QUART, and
MANAGE SCI, have gained the status required for an independent field of research. Technology Management
is still in its infancy and our analysis shows that it has an evolving structure. When we better understand the
current paradigms and key research themes in Technology Management, it is believed that publications in this
field will gain popularity and prestige. This will increase the available resources and talent with a positive
influence on the cross-fertilization of ideas specific to this area of research in turn.
REFERENCES
[1].
[2].
[3].
[4].
[5].
[6].
[7].
[8].
[9].
[10].
[11].
[12].
[13].
[14].
[15].
J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, “A performance comparison of multihop wireless ad hoc network routing protocols,” Proceedings of the 4th Annual ACM/IEEE
International Conference on Mobile Computing and Networking, pp. 85-98, 1998.
S. R. Das, C. E. Perkins, and E. M. Royer, “Performance comparison of two on-demand routing
protocols for ad hoc networks,” Proceedings of INFOCOM 2000 9th Annual Joint Conference of the
IEEE Computer and Communications Societies, vol. 1, pp. 3-12, 2000.
E. Gholifar, S. Y. Hedjazi, S. M. Hoseini, and A. Rezaei, “Human resource development: Faculty
members' psychological empowerment in Iran's colleges,” African Journal of Business Management,
pp. 12249-12255, 2011.
S. J. Lee and M. Gerla, “Split multipath routing with maximally disjoint paths in ad hoc networks,”
ICC 2002 IEEE International Conference on Communications, vol. 10, pp. 3201-3205, 2002.
J. Li, J. Jannotti, D. S. J. De Couto, D. R. Karger, and R. Morris, “A scalable location service for
geographic ad hoc routing,” Proceedings of the 6th Annual International Conference on Mobile
Computing and Networking, pp. 120-130, 2000.
C. C. Lin, Y. McLee, and J. H. Kuo, “Web services: Themes, concepts and relationships,” International
Journal of Machine Learning and Computing, vol. 1, no. 2, pp. 199-204, 2011.
C. Perkins and E. Royer, “Ad hoc on-demand distance vector routing,” Proceedings of the 2nd IEEE
Workshop on Mobile Computing Systems and Applications, pp. 90-100, 1999.
8. I. Sanchez Quiros and J.G.T. Ronda, “The relationship among innovation strategy, Technology
Management practices and commitment generation in the biotechnology sector,” African Journal of
Business Management, pp. 13159-13168, 2011.
H. G. Small, “Macro-level changes in the structure of co-citation clusters: 1983-1989,” Scientometrics,
vol. 26, pp. 5-20, 1993.
J. H. Song, V. W. S. Wong, and V. C. M. Leung, “Efficient on-demand Routing for mobile ad hoc
wireless access networks,” IEEE Journal of Selected areas in Communication, vol. 22, no. 7, pp. 13741383, 2004.
C. K. Toh, “Associativity-based routing for ad hoc mobile networks,” Wireless Personal
Communications, vol. 4, no. 2, pp. 103-139, 1997.
K. A. Walstrom and L. Leonard, “Citation classics from the information systems literature,”
Information & Management, vol. 38, pp. 59-72, 2000.
C. H. Wang, Y. McLee, and J. H. Kuo, “Mapping the intellectual structure of digital divide,”
International Journal of Social Science Humanity, vol. 1, no. 1, pp. 49-54, 2011.
D. H. White and K. W. McCain, “Visualizing a discipline: An author co-citation analysis of
information science,” Journal of the American Society for Information Science, vol. 49, pp. 327-355,
1995.
H. White and B. Griffith, “Author co-citation: A literature measure of intellectual structure,” Journal of
the American Society for Information Science, vol. 32, no. 3, pp. 163-171, 1981.
15
8. Citation Analysis of Technology Management Texts in Selected…
[16].
[17].
[18].
[19].
J. Zang, C. M. Chen, and J. X. Li, “Visualizing the intellectual structure with paper reference
matrices,” IEEE Transactions on Visualization and Computer Graphics, vol.15, no. 6, pp. 1153-1160,
2009.
Y. Zhang and W. Lee, “Intrusion detection in wireless ad hoc networks,” Proceedings of the 6th
Annual International Conference of Mobile Computing and Networking, pp. 275-284, 2000.
R. Y. Zhao and J. Wang, “Visualizing the research on pervasive and ubiquitous computing,”
Scientometrics, vol. 86, no. 3, pp. 593-612, 2011.
C.-H.Wang, C.-C. Lin, Y. Lee, and J.-H. Kuo, “Mapping the intellectual structure of mobile Ad Hoc
Networks,” Advances in Information Sciences & Service Sciences, Vol. 4, no. 1, pp. 432, 2012.
16