Subsequent to rapid information and communication technology development, the scope of the definition of
Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts
including economic development, education, IT, business and personal usage. A review of academic
literature, trade publications and general information was undertaken to establish a hierarchy of
applications for the term ICT or ICTs.
Culture of Poverty in the Philippines [REPORT]Shooger
PRESENTATION CAN BE FOUND HERE:
https://www.slideshare.net/Shooger/culture-of-poverty-in-the-philippines
Presentation for IMG106(313) - Cross-Cultural Studies in Management (Kasem Bundit University) based on the Culture of Poverty in the Philippines
Assessing Criminology Students Knowledge on Disaster and Risk Managementijtsrd
The purpose of this research study is to examine the current level of knowledge among Criminology students in order to explore strengths and weaknesses to be used in the future disaster preparedness and response plans. Armed with the knowledge and capabilities, Criminology students will be able to develop and implement procedures in order to move forward in an efficient manner to preserve lives and properties in the event of disaster in our municipality. Results revealed that sixty five percent 65 of the respondents were very aware on actions that will contribute in polluting our air environment. Also, 46 are aware on actions that will contribute to the destruction of our land resources. 49 were very aware on the actions that will contribute to the destruction of our marine coastal resources. 33 were aware that serious threats to water resources is the degradation of ecosystems which often takes place through changes to landscapes. Majority or seventy nine percent 79 of the respondents had knowledge on disaster. Ninety eight percent 98 are very aware that natural disaster is a disaster caused by nature. Eighty percent 80 are very aware that human actions contribute to the occurrence of disaster. Also, Sixty six percent 66 are very aware on the effects of natural disaster. Forty six percent 46 of the respondents are aware as to their role on disaster risk management. Girlie N. Cañete | Harry Santiago P. Achas | Pamela N. Cañete "Assessing Criminology Students Knowledge on Disaster and Risk Management" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45181.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/social-science/45181/assessing-criminology-students-knowledge-on-disaster-and-risk-management/girlie-n-cañete
Culture of Poverty in the Philippines [REPORT]Shooger
PRESENTATION CAN BE FOUND HERE:
https://www.slideshare.net/Shooger/culture-of-poverty-in-the-philippines
Presentation for IMG106(313) - Cross-Cultural Studies in Management (Kasem Bundit University) based on the Culture of Poverty in the Philippines
Assessing Criminology Students Knowledge on Disaster and Risk Managementijtsrd
The purpose of this research study is to examine the current level of knowledge among Criminology students in order to explore strengths and weaknesses to be used in the future disaster preparedness and response plans. Armed with the knowledge and capabilities, Criminology students will be able to develop and implement procedures in order to move forward in an efficient manner to preserve lives and properties in the event of disaster in our municipality. Results revealed that sixty five percent 65 of the respondents were very aware on actions that will contribute in polluting our air environment. Also, 46 are aware on actions that will contribute to the destruction of our land resources. 49 were very aware on the actions that will contribute to the destruction of our marine coastal resources. 33 were aware that serious threats to water resources is the degradation of ecosystems which often takes place through changes to landscapes. Majority or seventy nine percent 79 of the respondents had knowledge on disaster. Ninety eight percent 98 are very aware that natural disaster is a disaster caused by nature. Eighty percent 80 are very aware that human actions contribute to the occurrence of disaster. Also, Sixty six percent 66 are very aware on the effects of natural disaster. Forty six percent 46 of the respondents are aware as to their role on disaster risk management. Girlie N. Cañete | Harry Santiago P. Achas | Pamela N. Cañete "Assessing Criminology Students Knowledge on Disaster and Risk Management" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd45181.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/social-science/45181/assessing-criminology-students-knowledge-on-disaster-and-risk-management/girlie-n-cañete
Focus on understanding social science theories. Some of the contents are:
Understanding theory
Theoretical concepts
Theoretical models
Using and evaluating a theory
Constraints in building theory
Presenting the paper written by Michael L. Tan entitled "Philippine Anthropology in a Post-Anthropology Age" for my anthropology theory graduate class at the University of the Philippines Diliman.
Focus on understanding social science theories. Some of the contents are:
Understanding theory
Theoretical concepts
Theoretical models
Using and evaluating a theory
Constraints in building theory
Presenting the paper written by Michael L. Tan entitled "Philippine Anthropology in a Post-Anthropology Age" for my anthropology theory graduate class at the University of the Philippines Diliman.
RELEVANCE OF COMPUTER APPRECIATION/ICT TO THE CURRICULUM OF CERTIFICATE IN AU...Muhammad Muhammad Suleiman
Being A Text of Paper To Be Presented At Its 4-Days Final Phase of ASW Curriculum Review and Adaptation Meeting Held At Tahir Guest Palace, Kano, Organized By Society For Family Health, Between 27th To 30th April 2021
INTEGRATION OF ICT WITH KNOWLEDGE MANAGEMENT TO FOSTER DIGITAL INNOVATION: TH...ijmpict
This paper explores how knowledge management (KM) through information and communication technologies (ICTs) can foster Internet-based digital innovation in the public sector in Bangladesh. A total of twelve semi-structured interviews were conducted with relevant persons in four government organizations. Findings reveal that there are huge unexplored areas where ICT can be utilized for the creation, storage and dissemination of knowledge. By reducing time, cost & movement ICT-utilized KM can
promote ICT-led innovation. The main barrier of ICT-led KM initiatives is the lack of awareness of the government officials. This study is an extension of the previous findings. It contributes significantly to a better understanding of ICT’s integration with KM and innovation. It suggests that one of the core functions of ICT in the public offices is to manage knowledge. The paper offers some insights into how in a digital environment, knowledge can be innovatively managed in the public sector organizations.
As in the real world, the digital economy has also thrown up its share of shifting buzzwords. From ‘e-Commerce’ and ‘dot.com’ at the turn of the century, the last couple of years have thrown up ‘ICT’ as the all encompassing technology and for business the newest buzz is undoubtedly ‘outsourcing’. Rarely has a single trend impacted global business and industry these last few years as much as outsourcing or ‘off-shoring’ as it is referred to in the US. Coming along with the compulsions of globalisation mandated by the WTO agreements it has helped develop new markets, improved bottom lines, expanded the range of goods and services and pulled the planet together into a tighter-knit community. This opportunity of outsourcing from the perspective of developing economies is ICT services export.
Appropriate ICT as a Tool to increase Effectiveness in ICT4D: Theoretical Con...Victor van R
The need to bridge the digital divide is no longer a point of discussion and therefore focus has shifted to the design and implementation of programs that have the potential to close the information and knowledge gap between the developing and developed nations. Unfortunately, the majority of these programs are small and mimic what has been successful in the developed world. It has become increasingly clear that these successes do not necessarily translate well in the context of developing nations. This paper develops the hypothesis that Information and Communication Technology (ICT) projects in developing countries will become successful only when they are adapted to local conditions. The general concept of Appropriate Technology (AT) will be explored for the field of ICT. AT has already been embraced by fields like architecture, building technology and agriculture, but has not yet been rooted in ICT.
The paper proposes a preliminary theory of Appropriate ICT along the lines of existing theories in AT and System development. The theory identifies Appropriate Technology principles at three levels: hardware, software and ICT change management. By means of real life mini cases in the ICT for Development context in Africa, the guiding principles for Appropriate ICT are illustrated. The paper will conclude with an agenda for further research in
the three identified levels. The research agenda targets academia, governments, NGO's and industry.
AI, IoMT and Blockchain in Healthcare.pdfrectified
The healthcare industry is adopting new technologies such as AI, IoMT, and blockchain to enhance patient outcomes, reduce costs, and improve operational efficiencies. These technologies can revolutionize healthcare by facilitating personalized patient-focused care, improving clinical outcomes, and reducing expenses. However, the implementation of these technologies requires collaboration between healthcare providers, technology companies, and regulatory bodies to ensure patient privacy and data security. This study explores the role of AI, IoMT, and blockchain in public healthcare and their current applications, obstacles, and future research areas. It emphasizes the advantages that these technologies bring to the IoT and the difficulties involved in their implementation.
Top 10 Cited Articles - International Journal of Managing Information Technol...IJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would mitigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would itigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in
correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction.
ASCERTAINING THE INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) MATURITY LEVE...ijait
Information and Communication Technology has indeed been the driving force in most economics of the
world owing to its versatility in integrating with most national sectors. Information and Communication
Technology (ICT) models have been developed with the sole aim of ascertaining the maturity level in
various economic sectors from the perspective of ICT. Due to the divergent impact of ICT in the Banking
sector in Nigeria; this research paper has attempted to ascertain the maturity level within the banking
sector using KochiKar Model: a Knowledge-driven ICT maturity model. The dataset for analysis was
obtained using structured interview approach spread across Ten (10) Nigeria banks, capturing 12
personnel’s each with an overall total of 120 respondents.The ICT maturity parameter indicators show
clearly that Application, Human Resource Infrastructure and Policy have varied ratio of: 65%, 46% , 30%
and 16%, respectively while the overall maturity index was captured at 0.40 (40%) falling into “BASIC”
level within the stages of Kochikar model measurement. These results have highlighted the need in
improving policies and infrastructures tremendously while applications and human resources can be
expanded gradually which will overall increase the maturity index level.
ASCERTAINING THE INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) MATURITY LEVE...ijait
Information and Communication Technology has indeed been the driving force in most economics of the world owing to its versatility in integrating with most national sectors. Information and Communication Technology (ICT) models have been developed with the sole aim of ascertaining the maturity level in various economic sectors from the perspective of ICT. Due to the divergent impact of ICT in the Banking sector in Nigeria; this research paper has attempted to ascertain the maturity level within the banking sector using KochiKar Model: a Knowledge-driven ICT maturity model. The dataset for analysis was obtained using structured interview approach spread across Ten (10) Nigeria banks, capturing 12 personnel’s each with an overall total of 120 respondents.The ICT maturity parameter indicators show clearly that Application, Human Resource Infrastructure and Policy have varied ratio of: 65%, 46% , 30% and 16%, respectively while the overall maturity index was captured at 0.40 (40%) falling into “BASIC” level within the stages of Kochikar model measurement. These results have highlighted the need in improving policies and infrastructures tremendously while applications and human resources can be expanded gradually which will overall increase the maturity index level.
Insight into IoT Applications and Common Practice Challengesijtsrd
IoT caused a revolution in the technological world. Not only is the IoT related to computers, people or cell phones but also to various sensors, actuators, vehicles, and other modern appliances. There are around 14 billion interconnected digital devices across the globe i.e. almost 2 devices per human being on earth. The IoT serves as a medium to connect non living things to the internet to transfer information from one point to another in their community network which automates processes and ultimately makes the life of human beings convenient. The subsequent result of amalgamating internet connectivity with powerful data analysis is a complete change in the way we humans work and live. The most vital characteristics of IoT include connectivity, active engagement, sensors, artificial intelligence, and small device use. All of this creates many challenges that need to be solved to keep this technology to continue expanding. In this paper, we have identified various applications of IoT based on recent technological and business trends and highlighted the existing challenges faced by IoT which need to be addressed considering the exponential acceptance of the concept globally and the way those challenges had been addressed in the past. We have also made a few comments on the way such challenges are being attempted to be resolved now. This paper presents the current status Internet of Things IoT in terms of technical details, and applications. Also, this paper opens a window for future work on the historical approach to study and address IoT challenges. Lubna Alazzawi | Jamal Alotaibi "Insight into IoT Applications and Common Practice Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30286.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30286/insight-into-iot-applications-and-common-practice-challenges/lubna-alazzawi
The Role of Appropriate ICT in Bridging the Digital Divide: Theoretical Consi...Victor van R
The importance of bridging the digital divide is no longer discussed; the focus has shifted to the design and implementation of programs that aim to close the information and knowledge gap between the developing and developed nations. Unfortunately, the majority of these programs mimic what has been successfully implemented in the developed world. It becomes increasingly clear that these successes do not necessarily translate to the context of developing nations. This chapter develops the hypothesis that information and communication technology (ICT) projects in developing countries will become more successful when they adapt to local conditions. The concept of Appropriate Technology (AT) is explored. This concept has already been embraced by fields like architecture, building technology, and agriculture, but has not yet rooted in the area of ICT.
This article proposes a preliminary theory of Appropriate ICT along the lines of existing theories in AT and system development. The theory identifies Appropriate Technology principles at three levels: hardware, software, and ICT change management. By examining real-life cases in Africa in the context of ICT for Development (ICT4D), the guiding principles of Appropriate ICT (A-ICT) are illustrated. This article will conclude with an agenda for further research in the three identified levels. The research agenda will target academia, governments, non-governmental organizations (NGOs), and industry.
Similar to DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY (20)
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG
risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG
risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through
R&D. The analysis also highlights the significance of network externality effects, with a specific focus on
Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies
towards F + ESG optimization.
The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of
amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth
and scalability, specifically its ability to grow and expand, is accelerating high-level research and
development by gaining the trust of stakeholders in the "synergy through R&D-driven ESG risk
mitigation."
Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the
transformation of Japan's management system.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
These days the security provided by the computer systems is a big issue as it always has the threats of
cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security
provided by the blue team operations tends to be costly if done in large firms as a large number of systems
need to be protected against these attacks. This leads these firms to turn to less costly security
configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services
provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS
attacks which are done on both physical and network layers. These attacks in turn result in loss of
extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it,
and taking appropriate action to not only stop the attack but also locate its source IP address. This whole
process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will
result in not only the detection of the attack but also the source IP address of the machine on which the
attack is initiated and completed. The end product of this research will result in sets of default rules for the
Snort tool which will not only be able to provide better security than its previous versions but also be able
to provide the user with the IP address of the attacker or the person conducting the attack. The system
involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata
which is another intrusion detection system capable of detecting all these types of attacks as mentioned.
Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to
be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for
traffic monitoring and incident response than any other of its alternatives in the market. Since this system
is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as
it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS
automation in its capability to capture and report the malicious packets found during the network scan. All
of this gives the IDS a capability of a low budget automated threat detection system. This paper gives
complete guidelines for authors submitting papers for the AIRCC Journals.
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
IT (Information and Communication Technology) companies are facing the dilemma of decreasing
productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being
considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to
the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and
to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A
leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is
utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long
period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate
performance. The results, using sports prosthetics as a case study and using patents as a proxy variable,
confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained
through M&A is effective for creating new innovations.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of information technology and management
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the
research framework using survey data from 210 respondents. The collected data has been analyzed using
Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively
related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude.
However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for
future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI.
The findings will benefit academic staff and university administrations.The study will also help academic
staff enhance their knowledge-sharing practices.
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
Cloud computing systems need to be reliable so that they can be accessed and used for computing at any
given point in time. The complex nature of cloud systems is the motivation to conduct research in novel
ways of ensuring that cloud systems are built with reliability in mind. In building cloud systems, it is
expected that the cloud system will be able to deal with high demands and unexpected events that affect the
reliability and performance of the system.
In this paper, chaos engineering is considered a heuristic method that can be used to build reliable cloud
systems. Chaos engineering is aimed at exposing weaknesses in systems that are in production. Chaos
engineering will help identify system weaknesses and strengths when a system is exposed to unexpected
knocks and shocks while it is in production.
Chaos engineering allows system developers and administrators to get insights into how the cloud system
will behave when it is exposed to unexpected occurrences.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
This paper will provide a novel empirical study for the relationship between network media attention and
green technology innovation and examine how network media attention can ease financing constraints. It
collected data from listed companies in China's heavy pollution industry and performed rigorous
regression analysis, in order to innovatively explore the environmental governance functions of the media.
It found that network media attention significantly promotes green technology innovation. By analyzing the
inner mechanism further, it found that network media attention can promote green innovation by easing
financing constraints. Besides, network media attention has a significant positive impact on green invention
patents while not affecting green utility model patents.
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
With an increasing number of extreme events and complexity, more alarms are being used to monitor
control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable
actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It
is important to have a rigid surveillance that should guarantee protection from any sought of hazard.
Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these
CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired
off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with
a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing
images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and
a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on
providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO
algorithm, it divides an image from the video into grid system and each grid detects an object within itself
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
DEFINING ICT IN A BOUNDARYLESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY
1. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
DOI : 10.5121/ijmit.2012.4302 13
DEFINING ICT IN A BOUNDARYLESS WORLD:
THE DEVELOPMENT OF A WORKING HIERARCHY
Colrain M. Zuppo
Marion Technical College (MTC)
zuppoc@mtc.edu
ABSTRACT
Subsequent to rapid information and communication technology development, the scope of the definition of
Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts
including economic development, education, IT, business and personal usage. A review of academic
literature, trade publications and general information was undertaken to establish a hierarchy of
applications for the term ICT or ICTs.
KEYWORDS
ICT, ICTs, education, economics, digital communication, hierarchy
1. INTRODUCTION
The challenge of defining ICT, in a universal sense, becomes apparent when one considers that
diverse applications of the term ICT exist within several contexts and treatments of the term. The
continuum of definitions and applications of ICT one may encounter are further divided as the
span of differences is represented in kinds rather than merely by degrees. Although the term ICT
is found within a variety of contexts, there has been an underdeveloped response to the
development of a framework for hierarchical classifications representing empirical definitions
and applications of the term.
The acronym ICT (or ICTs) is used differently in education including benchmarks of digital
literacy, economic sector definitions and regulations, information technology disciplines,
socioeconomic development, and governance. The span of definitions within each type of
application across the globe can vary widely however the primary definition of information and
communication technologies revolves around the devices and infrastructures that facilitate the
transfer of information through digital means.
Through the process of literature review, the researcher discovered the difficulty in finding
consensus with regard to the definition of ICT. The outcome of that review highlighted the fact
that there was a dearth of hierarchical structure in existence such that the researcher could easily
identify the type of ICT relevant to their study within such a framework. As many researches
have been conducted which focus upon ICT of all types, there was a fair amount of literature to
draw from. This research is intended to attempt to answer that gap through a working hierarchy
for classification of ICT which can be further developed as new developments in ICT occur. The
hierarchy is intended to answer the need for an understanding of how the term is utilized across
the globe.
2. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
14
1.1. Statement of the Problem
ICT is a common part of several bodies of knowledge which, in many cases, relies upon
somewhat of a tacit definition of the term and the various applications in which it is utilized.
1.2. Statement of the Purpose
The purpose of this research was to develop a hierarchy for the definitions and applications of the
term ICT (or ICTs). The focus of this research was to provide a broad perspective of ICT in order
that a common hierarchy could be developed.
1.3. Significance
This research provides a contribution to the literature in a multi-disciplinary approach through
development of a hierarchical framework that is relevant in a global sense. It was important to
further explore the concept of defining and categorizing the applications ICTs due to the dearth of
literature that has previously addressed the subject. Additionally, having a well-rounded view of
ICTs not only informs future scholarly researches, but also will inform global operations in
healthcare, disaster response, and business. The instant research also frames ICT from an
economic and social perspective that the intended and unintended consequences of such
technologies upon society as a whole.
Finally, providing a hierarchy for the term ICT will provide guidance for application of the span
of definitions and applications of the term such that one may perform more precise keyword
searches, resulting in more efficient and effective gathering of information relating to ICT.
1.4. Definitions
1.4.1. ICT
For purposes of this study, information and communication technologies (ICT) shall be
interchangeably referred to as either ICT or ICTs, based upon the wide variation of usage of the
term.
1.4.2. Hierarchy
For purposes of this study, a hierarchy or hierarchical classification refers to a framework for
classification of ICT that includes definition of the term, identification of devices/architectures,
nomenclature, and classification of definitions and applications.
2. METHOD
2.1. Research Questions
• What is ICT?
• What devices and/or infrastructures are considered ICT?
• How and in what settings are ICTs used?
• How do contexts of application of the term ICT differ between literatures and resources?
2.2. Literature Review
Internet searches were performed utilizing the keywords ICT and ICTs for an overview from
books, websites, relevant blogs, and government resources. Scholarly publications were scanned
utilizing the same keywords, searched with and without the additional keyword “definition”.
Business information repositories, including professional publications and magazines, were
searched similarly. Information technology (IT) resources and databases (e.g. ITIL and Gartner)
were also utilized.
3. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
15
3. RESULTS
3.1. ICT and socioeconomic development
In developed countries, technology represents wealth. Wireless technologies are ubiquitous in the
United States and several other locations around the globe. However, in developing countries
there is a disparity in coverage as it relates to mobile phone signals (e.g. sub-Saharan Africa) as
obstacles to ICT development and utilization stem from economic development barriers. The
International Telecommunication Union [1] stated that approximately 45 percent of Sub-Saharan
African villages were covered by a mobile signal in 2006” (p. 2) despite the lack of universal
access. The barriers to wide adoption of mobile and cellular phones include lack of electricity,
lack of income to spend on ICTs, difficult terrain, and lack of transportation [1]. In contrast to the
sub-Saharan African region is India, where access to cell phones is far greater than access to
toilets [2].
The ITU is a specialized agency of the United Nations whose mission is to connect everyone in
the world as a fundamental right to communicate. The ITU currently has a membership of over
192 countries and 700 private-sector entities and academic institutions [3]. The ITU coordinates
the world’s satellites which provide Internet connectivity, TV broadcasts, GPS navigation and
weather information. The ITU also develops protocols, standards and agreements for global
communication and facilitates support communication in the wake of disasters and emergencies.
The development of wireless connectivity, specifically in areas such as the sub-Saharan African
region, is essential as ICTs have been shown to be useful in emergency or disaster situations. ICT
development has also been presented as tools to assist villagers in accessing e-government
services, for which development began in 2005-2006.
The World Health Organization (WHO) has utilized ICT for public health surveillance, which is
the “continuous, systematic collection, analysis and interpretation of health-related data for
planning, implementation, and evaluation of public health practice” [4]. During a disaster, such as
an earthquake or tsunami, mobile phones with GPS capability can assist relief workers and
emergency responders in gathering information and locating those who need assistance. In 2006,
the WHO brought forth the proposal that ICT could potentially be useful in disaster response and
recovery [5]. Yang, Yang, Lou and Gong [6] also suggested that cellular phones with GPS
capabilities become a standard component of disaster preparedness plans in disaster-prone areas.
3.2. ICT as an economic sector
ICT has also been utilized as a definition of an economic sector. In 1998, the Organisation for
Economic Co-operation and Development (OECD) agreed upon a definition based upon an
international standard classification of activities rather than a classification of products. In 2002,
the OECD reconvened discussions regarding the definition of ICT and clearly delineated
manufacturing from services, removing some peripheral components of the previous definition
which included office equipment and supplies [7]. The resulting definition of the economic sector
included electronic displays, various types of cable, instruments for navigating and numerous
other types of electronic and wireless connectivity-related devices.
Angeleski, Mitrevski, and Janeska [8] explain that e-readiness is “the capacity of a nation to
participate in the digital economy or the ability of a nation to make connection with the rest of the
world” (p. 266). The authors further explain that e-readiness provides a measure of ICT adoption
levels as well as an indicator of “socio-economic functioning” (p. 266). Angeleski, et al, [8] argue
that all countries should understand their ICT capabilities from the statistical standpoint for
purposes of evaluation and improvement of their standing within the global digital economy.
Cohen, Garibaldi, and Scarpetta [9] point out that ICT can conceptually raise productivity growth
in ICT-manufacturing sectors, increase the amount of capital being invested in ICT, and/or realize
4. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
16
efficiency gains by ICT adoption. Despite the decrease in the cost of ICT and the increase of
availability, the authors point out that in many cases, the process of realizing the positive
outcomes of ICT, investment in worker up skilling and training is required which results in a
more protracted timeframe to realize those positive outcomes.
3.3. ICTs and education
ICTs are widely used in education in the United States and other countries. In 2007, the
International ICT Literacy Panel produced a special report entitled “Digital transformation: A
framework for ICT literacy”. The Panel was sponsored by the Educational Testing Service (ETS)
who defines ICT as a “continuum of skills and abilities” [10](p. 1). The report noted that “ICT is
being used increasingly by global industry, international media, and academics to reflect the
convergence between computer and communication technologies. Summarily, within the realm of
education, ICT can be viewed as a set of activities and technologies that fall into the union of IT
and telecommunications” (p. 2).
A number of education-related researches discuss the implementation and effectiveness of ICTs
in the classroom, however, the term ICT or ICTs are utilized in a broad manner that could include
PCs, desktops, laptops, handheld devices and other types of wireless or cable-connected
equipment. The emphasis in educational research appears to be on competency development as
can be seen in Jarnieson-Proctor, Watson, Finger, Grimbeek, and Burnett [11] and Clark,
Demont-Heinrich, and Webber [12].
In their study of adult learning in the digital age, Selwyn, Gorard, and Furlong [13] lament the
broad reference and usage of the term ICT. The authors state that “the umbrella term ‘ICT’ refers
to a range of different, albeit rapidly converging technologies [and] there is a tendency…to use
either too narrow a definition of ICT in terms of specific technologies or else too broad a
definition…as a homogenous concept” (p. 20).
3.4. ICTs and business
Zhang, Aikman and Sun [14] define ICTs as “technologies used by people and organizations for
their information processing and communication purposes” (p. 628). ITIL®
, “the most widely
accepted approach to IT service management in the world” [15], defines ICT as:
“The application of science to the processing of data according to programmed
instructions in order to derive results. In the widest sense, ICT includes all
communications, information and related technology. The term Information Technology
(IT) is used in a narrower sense, typically excluding telecommunications (voice)
technology while including data networks (although almost all networks today are
digital), as a reference to the systems that support information processing” [15].
Various professional resources such as CIO Magazine and TechTerms.com offer definitions that
are equally as broad including:
“ICT refers to technologies that provide access to information through
telecommunications. It is similar to Information Technology (IT), but focuses primarily
on communication technologies. This includes the Internet, wireless networks, cell
phones, and other communication mediums.
In the past few decades, information and communication technologies have provided
society with a vast array of new communication capabilities. For example, people can
communicate in real-time with others in different countries using technologies such as
instant messaging, voice over IP (VoIP), and video-conferencing. Social networking
websites like Facebook allow users from all over the world to remain in contact and
communicate on a regular basis.
5. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
17
Modern information and communication technologies have created a "global village," in
which people can communicate with others across the world as if they were living next
door. For this reason, ICT is often studied in the context of how modern communication
technologies affect society”[16].
3.4. Professional Bodies of Knowledge and ICT
In 2007, the European Commission for the Directorate, General Enterprise and Industry,
published a report outlining recommendations based upon research led by the Innovation Value
Institute at National University of Ireland Maynooth and the Council of European Professional
Informatics Societies [17]. The EU adopted the e-Skills for the 21st
Century which were designed
to set forth long term efforts to mature the ICT profession in Europe. The research was intended
to set in motion a collaborative effort between scholars and industry practitioners to not only
continue development on the framework of professional competencies and skills, but it was
intended to facilitate the addressing of skills gaps under a sustainable operating model for the
profession [17].
The Information Technology Certified Professional (ITCP) of New Zealand draws its body of
knowledge and certification standards from the Skills Framework for the Information Age (SFIA)
in the United Kingdom. The ITCP includes 86 specific skills broken into seven areas of
competency with three assessment domains. The stated goal of the certification is to assist in the
maturation of ICT as a profession and recognizes international growth of IT domains as well as
the need for standardization of knowledge, skills, and abilities [18]. ITCP’s efforts to advance
ICT as a profession are part of global programs coordinated by the IP3 Taskforce which is under
the umbrella of the International Federation for Information Processing (IFIP).
The Australian Computer Society (ACS) sets forth The ICT Profession Body of Knowledge as
sanctioned by their Professional Standards Board. The ACS provides a stakeholder list that
defines the breadth of the ICT profession as including “academic disciplinary bodies,
educationalists, government, industry, professional standards bodies, students, and community”
[19]. Similar to the ITCP, the certifications offered by the ACS are coordinated with the IFIP
through the IP3’s SFIA.
4. RESULTS
From the organizational perspective, the workplace has evolved from a discrete time-bound and
defined place to a timeless, wall-less and sometimes virtual existence. From the economic
development perspective, technology facilitates a reduction in the digital divide where ICT assists
disaster preparedness, response, and communication. In education, ICTs are a vehicle for teaching
and learning through active application. Moreover, those developing countries that do not have
ICT access are considered to be among the “digital poor” [20] (p. 32). An additional dynamic of
ICT classification is that the term is used to describe an economic sector that produces and
services devices and components within the classification of ICT.
The hierarchy represented below provides for distinctions between the classifications and
applications of ICT within a cross-disciplinary framework.
4.1 Hierarchy
Figure 1 represents the hierarchy developed from the review of literature.
6. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
18
Figure 1. ICT Hierarchy
Four classifications of applications and definitions of ICT are represented:
1. ICT
1.1 Economic Development
1.1.1. Mobile Signal/Towers/Satellites
1.1.1.1. Access
1.1.1.2. Availability
1.1.1.3. Crisis Management/Disease Management
1.1.2. Mobile Devices
1.1.2.1. Phones, pagers, tablets, other wireless devices
1.2 Economic Sector
1.2.1. Goods Produced/Manufactured
1.2.2. Related Services
1.2.3. Digital Economy Readiness Metric
1.3 Education
1.3.1. Skills and Competencies
1.3.2. Devices/Tools
1.3.2.1. Phones, pagers, tablets, other wireless devices including
computers
7. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
19
1.3.3. Pedagogies
1.4 Business/IT
1.4.1. Architectures
1.4.1.1. Networks
1.4.1.2. Support Systems
1.4.2. Phones, pagers, tablets, other wireless devices
4.2. Discussion
While there may be some commonality in the way ICT was defined or applied within each
decomposed level of the hierarchy, there remain distinct differences in the devices or contexts of
each application of the term. For example, referring to ICTs within the context of education
encompasses not only a reference to equipment (i.e. devices) but also to a group of skills or
competencies that teachers and students must possess in order to be considered having achieved a
certain level of competencies as it relates to ICTs.
Economic (or regional) development efforts relating to ICT overlap with ICT as an economic
sector; however the measurement of metrics such as digital readiness of a country is somewhat
dependent upon the strength of related economic sectors as well as the ability of that country to
successfully move beyond the barriers of rough terrain, lack of electricity, lack of funding, and
low likelihood of adoption. When one refers to ICT as an economic sector, the reference is in
regard to goods manufactured or produced (e.g. cell phones, wireless modems and access points,
etc.) or related services (e.g. repair, installation). In the economic development sense, support
from the economic sector of ICT is necessary and could not exist without the other, regardless of
indigenous availability for purchase.
Similarly, the definitions and application of ICTs within a business/IT context rely upon an
established economic sector in addition to a well-fortified regional, national and international ICT
infrastructure. Divergently, the term ICTs refers to devices and networks/systems related to the
support those devices which have become tools of inter/intra organizational communication to
facilitate conducting business in a globalized economy.
All levels of decomposition throughout the ICT hierarchy contain some degree of commonality in
that they are related to technologies that facilitate the transfer of information and various types of
electronically mediated communication. Not all levels of the ICT hierarchy involve voice
communications and only some levels of the hierarchy refer to methodologies associated with
ICTs (e.g. educational pedagogies or methodologies for teaching). Additionally, education seems
to encompass sets of competencies or skills as benchmarks for proficiencies. Certainly ICT
architecture and administration necessitate competencies and proficiencies, however, those
competencies are inherent to the work of the ICT/IT application. Business does not assess ICT
capabilities in order for one to send a text message to a co-worker in another time zone, across the
globe (though perhaps they should consider such things).
4.3. Limitations
This study was limited in that despite an exhaustive search of various types of literature and
reference materials, every dynamic and application of the term ICT (or ICTs) would have been
impossible to discover and include. Therefore, the researcher utilized a hierarchical classification
system based upon the most common definitions and applications of the term. The hierarchy
included economic development, economic sector(s), education tools, methods, and skills, and
business/IT applications. Based upon those results, a framework for a hierarchy was constructed
as a means for a starting point for a larger classification system relating to ICT.
8. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
20
4.4. Directions for Future Research
Future research could provide additional levels of decomposition of the ICT hierarchy that would
include a more detailed view of goods, services, applications, methodologies, infrastructures, and
competencies. The instant research serves as a beginning point for such endeavours and is
designed to inform the research of scholars and practitioners, as well as government officials,
health workers, and educators. Efforts to decompose the ICT hierarchy further could perhaps be
utilized to develop a full ICT taxonomy that may supply a universal view of the definitions and
applications of the term beyond the scope of this study.
5. CONCLUSION
ICT (or ICTs) have become synonymous with productivity and enabled communication within a
global context. As evidenced by the persistence of the digital divide between those who have
access to ICT and those who do not, it is important to understand the span of the effects of ICT
where ICTs are ubiquitous as much as where they are not due to economic development barriers.
Further, gleaning an understanding of ICT as a profession can inform socioeconomic
development and sustainable operating models for training and development.
To study ICT in any context, one must have at least a working definition within the context of the
application of interest. In order to define ICT (or ICTs), one must understand the scope of
appropriate definitions as well as the relevant applications of the term. Once an understanding of
the range of possibilities has been achieved, a more targeted search can be preformed and the
noise of unrelated or unproductive results can be set aside.
Based upon current trends in ICT, a broader understanding of the comprehensive term ICT is
timely and important such that diffusion of ICT can be broadened and adoption can assist society
in ways not previously imagined. One only has to think of the benefits of ICT during a disaster
such as the 2004 Phuket (Thailand) tsunami [21] or the 2011 Fukushima (Japan) earthquake [22]
to understand the power of communication during catastrophic events.
ACKNOWLEDGEMENTS
The author would like to thank Dr. Donna K. Trautman of Bowling Green State University for
expert guidance during the dissertation process that subsequently led to the publication of the
instant research. The author would also like to thank Esum Hcraeser for clarity and expansion of
this and related topics.
REFERENCES
[1] International Telecommunication Union. (2007). Measuring village ICT in sub-Saharan Africa.
Retrieved from http://www.itu.int/ITU-D/ict/statistics/material/Africa_Village_ICT_2007.pdf.
[2] United Nations University. (2010). Greater Access to Cell Phones than Toilets in India. Retrieved
from http://www.inweh.unu.edu/News/2010-04_UNU-INWEH_News-Release_Sanitation.pdf.
[3] International Telecommunication Union. (n.d.). Who we are. Retrieved from
http://www.itu.int/en/about/Pages/default.aspx.
[4] World Health Organization. (2011). 2011-last update: Information and communication technologies
for public health emergency management. Retrieved from
http://www.who.int/csr/ict4phem/en/index.html
9. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
21
[5] World Health Organization. (2006). Health aspects of disaster preparedness and response: Report
from a regional meeting of countries of South East Asia, Bangkok, Thailand, 21-23 November 2005.
Prehospital & Disaster Medicine, 21(5), 62-78.
[6] Yang, C., Yang, J., Luo, X., and Gong, P. (2009). Use of mobile phones in an emergency reporting
system for infectious disease surveillance after the Sichuan earthquake in China. Bulletin of the
World Health Organization, 87(8), 619-623.
[7] Organisation for Co-operation and Development (OECD). (2002). Retrieved from
http://www.oecd.org/dataoecd/63/60/1933354.pdf.
[8] Angeleski, M., Mitrevski, P., and Janeska, M. (2009). “Composite index of e-business strategy
readiness of the enterprises in the Republic of Macedonia” in ICT Innovations 2009, Davcev, D., and
Marx Gomex, J., (Eds.), p. 265-275. Springer-Verlag Berlin Heidelberg, Scientific Publishing
Services Pvt. Ltd.
[9] Cohen, D., Garibaldi, P., and Scarpetta, S., (Eds.). (2004). The ICT Revolution: Productivity,
Differences and the Digital Divide. Oxford University Press, University of Oxford.
[10] Educational Testing Service. (2007). Digital transformation: A framework for ICT literacy. A report
of the International ICT Literacy Panel. Retrieved from
http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pd
f.
[11] Jarnieson-Proctor, R., Watson, G., Finger, G., Grimbeek, P., & Burnett, P. C. (2007). Measuring the
use of Information and Communication Technologies (ICTs) in the classroom. Computers in the
Schools, 24(1/2), 167-184. doi:10.1300/J025v24n01̱11.
[12] Clark, L., Demont-Heinrich, C., & Webber, S. (2005). Parents, ICTs, and children's prospects for
success: Interviews along the digital “Access Rainbow”. Critical Studies in Media Communication,
22(5), 409-426. doi:10.1080/07393180500342985.
[13] Selwin, N., Gorard, S., & Furlong, J. (2006). Adult learning in the digital age: Information technology
and the learning society. Routledge, Taylor & Francis Group.
[14] Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes in ICT acceptance and use.
International Journal of Human Interaction, 24(7), 628-648. doi: 10.1080/10447310802335482.
[15] Information Technology Infrastructure Library [ITIL]. (n.d.). ITIL glossaries. Retrieved from
http://www.itil-officialsite.com/InternationalActivities/ITILGlossaries_2.aspx.
[16] TechTerms.com. (n.d.). Definition of ICT. Retrieved from http://www.techterms.com/definition/ict.
[17] Innovation Value Institute at National University of Ireland Maynooth. (n.d.). IVI and CEPIS develop
European Framework for ICT Professionalism. Retrieved from http://ivi.nuim.ie/news-events/ivi-and-
cepis-develop-european-framework-ict-professionalism
[18] Institute of IT Professionals, New Zealand. (n.d.). ITCP – IT Certified Professional. Retrieved from
http://www.itcp.org.nz/about
[19] Professional Standards Board, Australian Computer Society. (2012.). The ICT professional body of
knowledge. Retrieved from http://www.acs.org.au/__data/assets/pdf_file/0007/7792/The-ICT-
Profession-Body-of-Knowledge-July-2012.pdf
[20] Galperin, H., and Mariscal, J. (2007). Digital Poverty: Latin American and Caribbean Perspectives.
International Development Research Centre, Intermediate Technology Publications Ltd.
[21] National Geographic News. (2005). The deadliest tsumani in history? Retrieved from
http://news.nationalgeographic.com/news/2004/12/1227_041226_tsunami.html.
10. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
22
[22] The Telegraph. (2011). Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review.
Retrieved from http://www.telegraph.co.uk/news/worldnews/asia/japan/8953574/Japan-earthquake-
tsunami-and-Fukushima-nuclear-disaster-2011-review.html.
Author
Colrain M. Zuppo earned a PhD in Technology Management from Indiana
State University with a specialization in Human Resource Development and
Industrial Training. Cori’s dissertation research was entitled “Organizations as
consumers of human capital via technology: A policy study of information and
communication technologies”. Cori also holds an M.A.Ed. from The George
Washington University and a B.S. in Conflict Resolution from Ohio
University. Cori is a Professor in the Department of Business and Information
Technology at Marion Technical College (MTC) and served as part time
faculty and doctoral fellow at Bowling Green State University, conducting
research and teaching in the areas of technology management, academic
research and instructional design & delivery.