Building on a coincided in progress paper, this paper constructs and evaluate an information systems architecture (ISA) model for the Bahraini architecture, engineering and construction (AEC) sector, from the lens of enterprise architecture (EA). This model acts as an information and communication technology (ICT) barometer tool to identify and benchmark the ICT’s gaps, duplicative levels, and future investments. Following the design science research, this paper and throughout a utilization of a tailored version of the open group architectural framework (TOGAF), embedded into a rigorous case study approach, the construction, testing, and evaluation of the conceptual ISA model is approached to benchmark the ICT measurement. Empirically, the study revealed the appropriateness of the model and the ability to identify the availability of 28 groups of 38 individual ICT applications in the Bahraini AEC sector and benchmark them to score an average of 18.5% against 17 countries that scored an average of 18.6%.
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...IJERA Editor
Constructions is the second growing industry in KSA. The lion share of the national budget is directed to construction projects and this will be continue for at least 10 years or more.Ensuring the success of any construction project, many depend of success of its management. Therefore, recently, research on management of construction projects in KSA has grabbed the highest attention in both academic and industry domains. The main contribution of this paper is proposing of an Information System (IS) to handle the complication of managing construction projects in KSA. The paper starting by defining what is an IS to solve the conflict and misunderstanding between definitions of Information Communication Technology (ICT) and IS. Paper is proceed with exploring the reasons behind the complications of construction projects in KSA. These reasons will answer the question of why ICT is not enough to manage construction projects in KSA. Benefits and structure of using the proposed IS in managing construction projects in KSA have been defined.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would mitigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would itigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in
correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction.
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
ASCERTAINING THE INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) MATURITY LEVE...ijait
Information and Communication Technology has indeed been the driving force in most economics of the
world owing to its versatility in integrating with most national sectors. Information and Communication
Technology (ICT) models have been developed with the sole aim of ascertaining the maturity level in
various economic sectors from the perspective of ICT. Due to the divergent impact of ICT in the Banking
sector in Nigeria; this research paper has attempted to ascertain the maturity level within the banking
sector using KochiKar Model: a Knowledge-driven ICT maturity model. The dataset for analysis was
obtained using structured interview approach spread across Ten (10) Nigeria banks, capturing 12
personnel’s each with an overall total of 120 respondents.The ICT maturity parameter indicators show
clearly that Application, Human Resource Infrastructure and Policy have varied ratio of: 65%, 46% , 30%
and 16%, respectively while the overall maturity index was captured at 0.40 (40%) falling into “BASIC”
level within the stages of Kochikar model measurement. These results have highlighted the need in
improving policies and infrastructures tremendously while applications and human resources can be
expanded gradually which will overall increase the maturity index level.
ASCERTAINING THE INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) MATURITY LEVE...ijait
Information and Communication Technology has indeed been the driving force in most economics of the world owing to its versatility in integrating with most national sectors. Information and Communication Technology (ICT) models have been developed with the sole aim of ascertaining the maturity level in various economic sectors from the perspective of ICT. Due to the divergent impact of ICT in the Banking sector in Nigeria; this research paper has attempted to ascertain the maturity level within the banking sector using KochiKar Model: a Knowledge-driven ICT maturity model. The dataset for analysis was obtained using structured interview approach spread across Ten (10) Nigeria banks, capturing 12 personnel’s each with an overall total of 120 respondents.The ICT maturity parameter indicators show clearly that Application, Human Resource Infrastructure and Policy have varied ratio of: 65%, 46% , 30% and 16%, respectively while the overall maturity index was captured at 0.40 (40%) falling into “BASIC” level within the stages of Kochikar model measurement. These results have highlighted the need in improving policies and infrastructures tremendously while applications and human resources can be expanded gradually which will overall increase the maturity index level.
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...Khaled gharib
Building Information Modeling (BIM) is a powerful tool that
allows architects, engineers, and construction professionals to
create detailed 3D models of buildings, which contain a wealth
data about the physical characteristics and attributes of the
project, one of the key benefits that it allows stakeholders to
visualize the project in great detail, which can help identify
potential problems or inefficiencies before construction even
begins. However, BIM data is static and does not reflect
changes or updates that occur after construction is complete.
As the construction industry continues to modernize, Building
Information Modeling (BIM) has become a staple in the design
and construction phases of a project. The widespread adoption
of Building Information Modeling (BIM) and the recent
emergence of Internet of Things (IoT) applications offer several
new insights and decision-making capabilities throughout the
life cycle of the built environment. In recent years, the ability of
real-time connectivity to online sensors deployed in an
environment has led to the emergence of the concept of the
Digital Twin of the built environment. This is where the concept
of the digital twin has emerged to revolutionize the way
buildings are managed and operated throughout their entire
lifecycle. A digital twin is a virtual replica of a physical asset or
system that incorporates real-time data from sensors and other
sources, by connecting BIM models to IoT sensors and other
data sources, it is possible to create a dynamic digital twin that
can provide real-time insights into the performance and
condition of a building. Overall, the integration of BIM and IoT
into digital twins offers a powerful tool for designers, engineers,
and building managers to optimize the performance and
efficiency of buildings. This paper conduct a bibliometric review
over the evolution of BIM to DT, examining the benefits of each
technology and how Digital Twin expand on the capabilities of
BIM. The paper also will discuss Digital Twin and BIM in the
industry, discussing real-world applications and the tangible
benefits that organizations have experienced. Ultimately, this
paper highlights the importance of embracing new
technologies like Digital Twins to achieve optimal efficiency and
cost savings in the building industry
Investigating the Benefits of Using Information Systems in Saudi Arabia Const...IJERA Editor
Constructions is the second growing industry in KSA. The lion share of the national budget is directed to construction projects and this will be continue for at least 10 years or more.Ensuring the success of any construction project, many depend of success of its management. Therefore, recently, research on management of construction projects in KSA has grabbed the highest attention in both academic and industry domains. The main contribution of this paper is proposing of an Information System (IS) to handle the complication of managing construction projects in KSA. The paper starting by defining what is an IS to solve the conflict and misunderstanding between definitions of Information Communication Technology (ICT) and IS. Paper is proceed with exploring the reasons behind the complications of construction projects in KSA. These reasons will answer the question of why ICT is not enough to manage construction projects in KSA. Benefits and structure of using the proposed IS in managing construction projects in KSA have been defined.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would mitigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTIONIJMIT JOURNAL
A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would itigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in
correspondence to “Construction Tasks” in the construction industry over the past two decades (1996- 2016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction.
The future of software engineering: Visions of 2025 and beyond IJECEIAES
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
ASCERTAINING THE INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) MATURITY LEVE...ijait
Information and Communication Technology has indeed been the driving force in most economics of the
world owing to its versatility in integrating with most national sectors. Information and Communication
Technology (ICT) models have been developed with the sole aim of ascertaining the maturity level in
various economic sectors from the perspective of ICT. Due to the divergent impact of ICT in the Banking
sector in Nigeria; this research paper has attempted to ascertain the maturity level within the banking
sector using KochiKar Model: a Knowledge-driven ICT maturity model. The dataset for analysis was
obtained using structured interview approach spread across Ten (10) Nigeria banks, capturing 12
personnel’s each with an overall total of 120 respondents.The ICT maturity parameter indicators show
clearly that Application, Human Resource Infrastructure and Policy have varied ratio of: 65%, 46% , 30%
and 16%, respectively while the overall maturity index was captured at 0.40 (40%) falling into “BASIC”
level within the stages of Kochikar model measurement. These results have highlighted the need in
improving policies and infrastructures tremendously while applications and human resources can be
expanded gradually which will overall increase the maturity index level.
ASCERTAINING THE INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) MATURITY LEVE...ijait
Information and Communication Technology has indeed been the driving force in most economics of the world owing to its versatility in integrating with most national sectors. Information and Communication Technology (ICT) models have been developed with the sole aim of ascertaining the maturity level in various economic sectors from the perspective of ICT. Due to the divergent impact of ICT in the Banking sector in Nigeria; this research paper has attempted to ascertain the maturity level within the banking sector using KochiKar Model: a Knowledge-driven ICT maturity model. The dataset for analysis was obtained using structured interview approach spread across Ten (10) Nigeria banks, capturing 12 personnel’s each with an overall total of 120 respondents.The ICT maturity parameter indicators show clearly that Application, Human Resource Infrastructure and Policy have varied ratio of: 65%, 46% , 30% and 16%, respectively while the overall maturity index was captured at 0.40 (40%) falling into “BASIC” level within the stages of Kochikar model measurement. These results have highlighted the need in improving policies and infrastructures tremendously while applications and human resources can be expanded gradually which will overall increase the maturity index level.
A Bibliometric Review of the Evolution of Building Information Modeling (BIM)...Khaled gharib
Building Information Modeling (BIM) is a powerful tool that
allows architects, engineers, and construction professionals to
create detailed 3D models of buildings, which contain a wealth
data about the physical characteristics and attributes of the
project, one of the key benefits that it allows stakeholders to
visualize the project in great detail, which can help identify
potential problems or inefficiencies before construction even
begins. However, BIM data is static and does not reflect
changes or updates that occur after construction is complete.
As the construction industry continues to modernize, Building
Information Modeling (BIM) has become a staple in the design
and construction phases of a project. The widespread adoption
of Building Information Modeling (BIM) and the recent
emergence of Internet of Things (IoT) applications offer several
new insights and decision-making capabilities throughout the
life cycle of the built environment. In recent years, the ability of
real-time connectivity to online sensors deployed in an
environment has led to the emergence of the concept of the
Digital Twin of the built environment. This is where the concept
of the digital twin has emerged to revolutionize the way
buildings are managed and operated throughout their entire
lifecycle. A digital twin is a virtual replica of a physical asset or
system that incorporates real-time data from sensors and other
sources, by connecting BIM models to IoT sensors and other
data sources, it is possible to create a dynamic digital twin that
can provide real-time insights into the performance and
condition of a building. Overall, the integration of BIM and IoT
into digital twins offers a powerful tool for designers, engineers,
and building managers to optimize the performance and
efficiency of buildings. This paper conduct a bibliometric review
over the evolution of BIM to DT, examining the benefits of each
technology and how Digital Twin expand on the capabilities of
BIM. The paper also will discuss Digital Twin and BIM in the
industry, discussing real-world applications and the tangible
benefits that organizations have experienced. Ultimately, this
paper highlights the importance of embracing new
technologies like Digital Twins to achieve optimal efficiency and
cost savings in the building industry
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Big data represents one of the most profound and most pervasive evolutions in the digital world. Examples of big data come from Internet of Things (IoT) devices, as well as smart cars, but also the use of social networks, industries, and so on. The sources of data are numerous and continuously increasing, and, therefore, what characterizes big data is not only the volume but also the complexity due to the heterogeneity of information that can be obtained. The fastest growth in spending on big data technologies is happening within banking, healthcare, insurance, securities and investment services, and telecommunications. Remarkably, three of those industries lie within the financial sector, which has many particularly serviceable use cases for big data analytics, such as fraud detection, risk management, and customer service optimization. In fact, the definition of big data analysis refers to the process that encompasses the gathering and analysis of big data to obtain useful information for the business. This paper focuses on delivering a short review concerning the current technologies, future perspectives, and the evaluation of some use cased associated with the analysis of big data.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
Artificial Intelligence and the Internet of Things in Industry 4.0Petar Radanliev
This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspec- tive. First, literature published between 2010 and 2021 is reviewed, and compared with the results of a qualitative empirical study that correlates world leading Industry 4.0 frameworks. Second, the study establishes the present and future techniques for increased automation in cyber-physical systems. We present the cybersecurity requirements as they are changing with the integration of artificial intelligence and internet of things in cyber-physical systems. The grounded theory methodology is applied for analysis and modelling the connections and interdependencies between edge components and automation in cyber-physical systems. In addition, the hierarchical cascading methodology is used in combination with the taxonomic clas- sifications, to design a new integrated framework for future cyber-physical systems. The study looks at increased automation in cyber-physical systems from a technical and social level.
Role of Artificial Intelligence in Construction Industry of PakistanIJAEMSJORNAL
The quick development of technology, with a focus on Artificial Intelligence (AI), has resulted in significant changes on a worldwide level. The integration of AI across the full project lifecycle is still in its infancy in the construction sector. To improve the performance of the construction business, rising digital advances like AI must be embraced, although construction companies in developing countries have lagged slightly in doing so. The world has seen tremendous changes as a result of the quick development of technology, particularly Artificial Intelligence (AI). However, the adoption of new digital advances like AI in the construction industry, particularly in developing nations like Pakistan, is still in its early phases. The built sector's construction organizations in these nations have been sluggish to understand the value of integrating AI. This study tries to pinpoint the key organizational elements required to encourage AI adoption in Pakistani construction businesses. This research tries to identify the vital organizational elements that are crucial for promoting the use of AI in the construction industry. To do this, a quantitative survey strategy was used to collect data, using a snowball sampling technique to select industry experts as respondents. These professionals were polled on the issues surrounding the use of AI in building. In order to determine the crucial organizational elements that can accelerate the adoption of AI within the sector, an exploratory factor analysis (EFA) was subsequently conducted on the acquired data. Data from participants will be gathered using a quantitative survey methodology for the project. The relationship between these constructs will also be established via confirmatory factor analysis. The study suggests a number of elements, broken down into four categories, that influence organizational AI adoption: a creative organizational culture, competence-based training, group decision-making, and strategic analysis. Additionally, a confirmatory factor analysis (CFA) was used to provide more light on the connections between the discovered constructs. This study offers a thorough list of characteristics that are essential for promoting corporate AI adoption. Notably, this research presents organizational factors related to AI adoption in the construction and related industries using both exploratory factor analysis (EFA) and confirmatory factor analysis (CFA), a method that has not been frequently used in the articles identified in the systematic literature review (SLR). Prior studies have addressed organizational factors related to AI adoption in the construction and related industries. A deeper understanding of the underlying elements and how they interact within the context of AI adoption in the construction industry is made possible by the use of CFA, which increases the construct measurement's accuracy. The ultimate goal of this research is to improve knowledge of the underlying elements of t
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
For effective management and governance of education system, several efforts have been evolving
continuously by using Information Communication and Technology for Educational Management. The role
of the Information and Communication Technology (ICT) infrastructure particularly services require for
the data intensive and communication intensive application becomes more important. Further, due to the
massive growth of information, situation becomes difficult to manage these services. The present paper
discusses the related issues such as competence building, creation of appropriate ICT infrastructure, ICT
acceptance level etc. required for Information Technology for Educational Management(ITEM)
competence building framework, considered in an earlier approach for core competences for ITEM.
Therefore, it becomes essential to consider the global standard and relevant ICT infrastructure. This effort
will help in activities and resource management for effective implementation of the framework.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALijcsit
ABSTRACT
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
The most critical parameters that indicate the Wi-Fi network are throughput, delay, latency, and packet loss since they provide significant benefits, especially to the end-user. This research aims to investigate Wi-Fi performance in an indoor environment for light-of-sight (LOS) and nonlight-of-sight (NLOS) conditions. The effect of the surrounding obstacles and distance has also been reported in the paper. The parameters measured are packet loss, the packet sent, the packet received, throughput, and latency. Site measurement is done to obtain real-time and optimum results. The measured parameters are then validated using the EMCO ping monitor 8 software. The comparison results between the measurement and the simulation are well presented in this paper. Additionally, the measurement distance is done up to 30 meters and the results are reported in the paper as well. The results indicate that the throughput value decreases with an increasing distance, where the lowest throughput value is 24.64 Mbps and the highest throughput value is 70.83 Mbps. Next, the maximum latency value from the measurement is 79 ms, while the lowest latency value is 56.09 ms. Finally, this research verified that obstacles and distances are among the contributing factors affecting the throughput and latency performance of the Wi-Fi network.
Subarrays of phased-array antennas for multiple-input multiple-output radar a...IJICTJOURNAL
The subarray MIMO radar (SMIMO) is a multiple-input multiple-output (MIMO) radar with elements in the form of a sub-array that acts as a phased array (PAR), so it combines at the same time the key advantage of the PAR radar, which is high directional gain to increase target range, and the key advantage of the MIMO radar, i.e., high diversity gains to increase the maximum number of detected targets. Different schemes for the number of antenna elements in the transceiver zones, such as uniform and/or variable, overlapped and non-overlapped, significantly determine the performance of radars as virtual arrays (VARs), maximum number of detected targets, accuracy of target angle, detection resolution, SNR detection, and detection probability. Performance is also compared with the PAR, the MIMO, and the phased MIMO radars (PMIMO). The SMIMO radar offers great versatility for radar applications, being able to adapt to different shapes of the multiple targets to be detected and their environment. For example, for a transmit-receive with an antenna element number, i.e., M = N = 8, the range of the number of detected targets for the SMIMO radar is flexible compared to the other radars. On the other hand, the proposed radar's signal-to-noise ratio (SNR) detection performance and detection probability (K = 5, L = 3) are both 1,999 and above 90%, which are better than other radars.
More Related Content
Similar to Enterprise architecture-based ISA model development for ICT benchmarking in construction-case study
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Big data represents one of the most profound and most pervasive evolutions in the digital world. Examples of big data come from Internet of Things (IoT) devices, as well as smart cars, but also the use of social networks, industries, and so on. The sources of data are numerous and continuously increasing, and, therefore, what characterizes big data is not only the volume but also the complexity due to the heterogeneity of information that can be obtained. The fastest growth in spending on big data technologies is happening within banking, healthcare, insurance, securities and investment services, and telecommunications. Remarkably, three of those industries lie within the financial sector, which has many particularly serviceable use cases for big data analytics, such as fraud detection, risk management, and customer service optimization. In fact, the definition of big data analysis refers to the process that encompasses the gathering and analysis of big data to obtain useful information for the business. This paper focuses on delivering a short review concerning the current technologies, future perspectives, and the evaluation of some use cased associated with the analysis of big data.
A NOVEL SERVICE ORIENTED ARCHITECTURE (SOA) TO SECURE SERVICES IN E-CITYijsptm
Many cities in the world have moved toward being e-city using IT and there are some who have
implemented it and or seeking out to make it operational. However, experience shows that implementation
of e-city faces Challenges which the effectiveness of e-city, improvement of provided services and security
are the most important part of these challenges. Today, for realization of a perfect e-city, to overcome
faced challenges Such as security issues is an urgent need. Considering that e-city consists of multiple
information systems, it’s the most important challenge to create integration between these systems and
provide its security which service oriented architecture as a computational model and an approach for data
integration could largely overcome these problems. In this paper through studying challenges of
information systems in e-city layers and with concentrating on advantages of service oriented architecture,
a new architecture to improve the security of e-city’s systems and their provided services and also
overcoming the challenges of information systems has been proposed
Artificial Intelligence and the Internet of Things in Industry 4.0Petar Radanliev
This paper presents a new design for artificial intelligence in cyber-physical systems. We present a survey of principles, policies, design actions and key technologies for CPS, and discusses the state of art of the technology in a qualitative perspec- tive. First, literature published between 2010 and 2021 is reviewed, and compared with the results of a qualitative empirical study that correlates world leading Industry 4.0 frameworks. Second, the study establishes the present and future techniques for increased automation in cyber-physical systems. We present the cybersecurity requirements as they are changing with the integration of artificial intelligence and internet of things in cyber-physical systems. The grounded theory methodology is applied for analysis and modelling the connections and interdependencies between edge components and automation in cyber-physical systems. In addition, the hierarchical cascading methodology is used in combination with the taxonomic clas- sifications, to design a new integrated framework for future cyber-physical systems. The study looks at increased automation in cyber-physical systems from a technical and social level.
Role of Artificial Intelligence in Construction Industry of PakistanIJAEMSJORNAL
The quick development of technology, with a focus on Artificial Intelligence (AI), has resulted in significant changes on a worldwide level. The integration of AI across the full project lifecycle is still in its infancy in the construction sector. To improve the performance of the construction business, rising digital advances like AI must be embraced, although construction companies in developing countries have lagged slightly in doing so. The world has seen tremendous changes as a result of the quick development of technology, particularly Artificial Intelligence (AI). However, the adoption of new digital advances like AI in the construction industry, particularly in developing nations like Pakistan, is still in its early phases. The built sector's construction organizations in these nations have been sluggish to understand the value of integrating AI. This study tries to pinpoint the key organizational elements required to encourage AI adoption in Pakistani construction businesses. This research tries to identify the vital organizational elements that are crucial for promoting the use of AI in the construction industry. To do this, a quantitative survey strategy was used to collect data, using a snowball sampling technique to select industry experts as respondents. These professionals were polled on the issues surrounding the use of AI in building. In order to determine the crucial organizational elements that can accelerate the adoption of AI within the sector, an exploratory factor analysis (EFA) was subsequently conducted on the acquired data. Data from participants will be gathered using a quantitative survey methodology for the project. The relationship between these constructs will also be established via confirmatory factor analysis. The study suggests a number of elements, broken down into four categories, that influence organizational AI adoption: a creative organizational culture, competence-based training, group decision-making, and strategic analysis. Additionally, a confirmatory factor analysis (CFA) was used to provide more light on the connections between the discovered constructs. This study offers a thorough list of characteristics that are essential for promoting corporate AI adoption. Notably, this research presents organizational factors related to AI adoption in the construction and related industries using both exploratory factor analysis (EFA) and confirmatory factor analysis (CFA), a method that has not been frequently used in the articles identified in the systematic literature review (SLR). Prior studies have addressed organizational factors related to AI adoption in the construction and related industries. A deeper understanding of the underlying elements and how they interact within the context of AI adoption in the construction industry is made possible by the use of CFA, which increases the construct measurement's accuracy. The ultimate goal of this research is to improve knowledge of the underlying elements of t
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
For effective management and governance of education system, several efforts have been evolving
continuously by using Information Communication and Technology for Educational Management. The role
of the Information and Communication Technology (ICT) infrastructure particularly services require for
the data intensive and communication intensive application becomes more important. Further, due to the
massive growth of information, situation becomes difficult to manage these services. The present paper
discusses the related issues such as competence building, creation of appropriate ICT infrastructure, ICT
acceptance level etc. required for Information Technology for Educational Management(ITEM)
competence building framework, considered in an earlier approach for core competences for ITEM.
Therefore, it becomes essential to consider the global standard and relevant ICT infrastructure. This effort
will help in activities and resource management for effective implementation of the framework.
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALijcsit
ABSTRACT
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
The most critical parameters that indicate the Wi-Fi network are throughput, delay, latency, and packet loss since they provide significant benefits, especially to the end-user. This research aims to investigate Wi-Fi performance in an indoor environment for light-of-sight (LOS) and nonlight-of-sight (NLOS) conditions. The effect of the surrounding obstacles and distance has also been reported in the paper. The parameters measured are packet loss, the packet sent, the packet received, throughput, and latency. Site measurement is done to obtain real-time and optimum results. The measured parameters are then validated using the EMCO ping monitor 8 software. The comparison results between the measurement and the simulation are well presented in this paper. Additionally, the measurement distance is done up to 30 meters and the results are reported in the paper as well. The results indicate that the throughput value decreases with an increasing distance, where the lowest throughput value is 24.64 Mbps and the highest throughput value is 70.83 Mbps. Next, the maximum latency value from the measurement is 79 ms, while the lowest latency value is 56.09 ms. Finally, this research verified that obstacles and distances are among the contributing factors affecting the throughput and latency performance of the Wi-Fi network.
Subarrays of phased-array antennas for multiple-input multiple-output radar a...IJICTJOURNAL
The subarray MIMO radar (SMIMO) is a multiple-input multiple-output (MIMO) radar with elements in the form of a sub-array that acts as a phased array (PAR), so it combines at the same time the key advantage of the PAR radar, which is high directional gain to increase target range, and the key advantage of the MIMO radar, i.e., high diversity gains to increase the maximum number of detected targets. Different schemes for the number of antenna elements in the transceiver zones, such as uniform and/or variable, overlapped and non-overlapped, significantly determine the performance of radars as virtual arrays (VARs), maximum number of detected targets, accuracy of target angle, detection resolution, SNR detection, and detection probability. Performance is also compared with the PAR, the MIMO, and the phased MIMO radars (PMIMO). The SMIMO radar offers great versatility for radar applications, being able to adapt to different shapes of the multiple targets to be detected and their environment. For example, for a transmit-receive with an antenna element number, i.e., M = N = 8, the range of the number of detected targets for the SMIMO radar is flexible compared to the other radars. On the other hand, the proposed radar's signal-to-noise ratio (SNR) detection performance and detection probability (K = 5, L = 3) are both 1,999 and above 90%, which are better than other radars.
Statistical analysis of an orographic rainfall for eight north-east region of...IJICTJOURNAL
Autoregressive integrated moving average (ARIMA) models are used to predict the rain rate for orographic rainfall over a long period of time, from 1980 to 1918. As the orographic rainfall may cause landslides and other natural disaster issues, So, this study is very important for the analysis of rainfall prediction. In this research, statistical calculations have been done based on the rainfall data for twelve regions of India (Cherrapunji, Darjeling, Dawki, Ghum, Itanagar, Kamchenjunga, Mizoram, Nagaland, Pakyong, Saser Kangri, Slot Kangri, and Tripura) from the eight states, i.e., Sikkim, Meghalaya, West Bengal, Ladakh (Union Territory of India), Arunachal Pradesh, Mizoram, Tripura, and Nagaland) with varying altitude. The model's output is assessed using several error calculations. The model's performance is represented by the fit value, which is reliable for the northeast region of India with increasing altitude. The statistical dependability of the rainfall prediction is shown by the parameters. The lowest value of root mean square error (RMSE) indicates better prediction for orographic rainfall.
A broadband MIMO antenna's channel capacity for WLAN and WiMAX applicationsIJICTJOURNAL
This paper describes the findings of a research into the multiple input multiple output (MIMO) channel capacity of a broadband dual-element printed inverted F-antenna (PIFA) antenna array. The dual-element antenna array is made up of two PIFAs that are meant to fit on a teeny-tiny and small wireless communication device that runs at 5 GHz. The device's frequency range is between 3.5 and 4.5 GHz. These PIFAs are also loaded into the device during the installation process. In order to investigate the channel capacity, the ray tracing method is employed in two different kinds of circumstances. For the purpose of carrying out this analysis of the channel capacity, both the simulated and measured mutual couplings of the broadband MIMO antenna are utilized.
Satellite dish antenna control for distributed mobile telemedicine nodesIJICTJOURNAL
The positioning control of a dish antenna mounted on distributed mobile telemedicine nodes (DMTNs) within Nigeria communicating via NigComSat-1R has been presented. It was desired to improve the transient and steady performance of satellite dish antenna and reduce the effect of delay during satellite communication. In order to overcome this, the equations describing the dynamics of the antenna positioning system were obtained and transformed into state space variable equations. A full state feedback controller was developed with forward path gain and an observer. The proposed controller was introduced into the closed loop of the dish antenna positioning control system. The system was subjected to unit step forcing function in MATLAB/Simulink simulation environment considering three different cases so as to obtain time domain parameters that characterized the transient and steady state response performances. The simulation results obtained revealed that the introduction of the full state feedback controller provided improved position tracking to unit step input with a rise time of 0.42 s, settling time of 1.22 s and overshoot of 4.91%. With the addition of observer, the rise time achieved was 0.39 s, settling time of 1.31 s, and overshoot of 10.7%. The time domain performance comparison of the proposed system with existing systems revealed its superiority over them.
High accuracy sensor nodes for a peat swamp forest fire detection using ESP32...IJICTJOURNAL
The use of smoke sensors in high-precision and low-cost forest fire detection kits needs to be developed immediately to assist the authorities in monitoring forest fires especially in remote areas more efficiently and systematically. The implementation of automatic reclosing operation allows the fire detector kit to distinguish between real smoke and non-real smoke successfully. This has profitably reduced kit errors when detecting fires and in turn prevent the users from receiving incorrect messages. However, using a smoke sensor with automatic reclosing operation has not been able to optimize the accuracy of identifying the actual smoke due to the working sensor node situation is difficult to predict and sometimes unexpected such as the source of smoke received. Thus, to further improve the accuracy when detecting the presence of smoke, the system is equipped with two digital cameras that can capture and send pictures of fire smoke to the users. The system gives the users choice of three interesting options if they want the camera to capture and send pictures to them, namely request, smoke trigger and movement for security purposes. In all cases, users can request the system to send pictures at any time. The system equipped with this camera shows the accuracy of smoke detection by confirming the actual smoke that has been detected through images sent in the user’s Telegram channel and on the graphical user interface (GUI) display. As a comparison of the system before and after using this camera, it was found that the system that uses the camera gives advantage to the users in monitoring fire smoke more effectively and accurately.
Prediction analysis on the pre and post COVID outbreak assessment using machi...IJICTJOURNAL
In this time of a global urgency where people are losing lives each day in a large number, people are trying to develop ways/technology to solve the challenges of COVID-19. Machine learning (ML) and artificial intelligence (AI) tools have been employed previously as well to the times of pandemic where they have proven their worth by providing reliable results in varied fields this is why ML tools are being used extensively to fight this pandemic as well. This review describes the applications of ML in the post and pre COVID-19 conditions for contact tracing, vaccine development, prediction and diagnosis, risk management, and outbreak predictions to help the healthcare system to work efficiently. This review discusses the ongoing research on the pandemic virus where various ML models have been employed to a certain data set to produce outputs that can be used for risk or outbreak prediction of virus in the population, vaccine development, and contact tracing. Thus, the significance and the contribution of ML against COVID-19 are self-explanatory but what should not be compromised is the quality and accuracy based on which solutions/methods/policies adopted or produced from this analysis which will be implied in the real world to real people.
Meliorating usable document density for online event detectionIJICTJOURNAL
Online event detection (OED) has seen a rise in the research community as it can provide quick identification of possible events happening at times in the world. Through these systems, potential events can be indicated well before they are reported by the news media, by grouping similar documents shared over social media by users. Most OED systems use textual similarities for this purpose. Similar documents, that may indicate a potential event, are further strengthened by the replies made by other users, thereby improving the potentiality of the group. However, these documents are at times unusable as independent documents, as they may replace previously appeared noun phrases with pronouns, leading OED systems to fail while grouping these replies to their suitable clusters. In this paper, a pronoun resolution system that tries to replace pronouns with relevant nouns over social media data is proposed. Results show significant improvement in performance using the proposed system.
Performance analysis on self organization based clustering scheme for FANETs ...IJICTJOURNAL
With the fast-increasing development of wireless communication networks, unmanned aerial vehicle (UAV) has emerged as a flying platform for wireless communication with efficient coverage, capacity, reliability, and its network is called flying ad-hoc network (FANET); which keeps changing its topology due to its dynamic nature, causing inefficient communication, and therefore needs cluster formation. In this paper, we proposed a cluster formation, selection of cluster head and its members, connectivity and transmission with the base station using the K-means algorithm, and choice of an optimized path for transmission using firefly optimization algorithm for efficient communication. Evaluation of performance with experimental results are obtained and compared using the K-means algorithm and firefly optimization algorithm in cluster building time, cluster lifetime, energy consumption, and probability of delivery success. On comparison of firefly optimization algorithm with firefly optimization algorithm, i.e., K-means algorithm results proved than without firefly optimization algorithm, better in terms of cluster building time, energy consumption, cluster lifetime, and also the probability of delivery success.
A persuasive agent architecture for behavior change interventionIJICTJOURNAL
A persuasive agent makes use of persuasion attributions to ensure that its predefined objective(s) is achieved within its immediate environment. This is made possible based on the five unique features namely sociable, persuasive, autonomy, reactive, and proactive natures. However, there are limited successes recorded within the behavioural intervention and psychological reactance is responsible for these failures. Psychological reactance is the stage where rejection, negative response and frustration are felt by the users of the persuasive system. Thus, this study proposes a persuasive agent (PAT) architecture that limits the experience of psychological reactance to achieve an improved behavioural intervention. PAT architecture adopted the combination of the reactance model for behavior change and the persuasive design principle. The architecture is evaluated by conducting an experimental study using a user-centred approach. The evaluation reflected that there is a reduction in the number of users who experienced psychological reactance from 70 per cent to 3 per cent. The result is a better improvement compared with previous outcomes. The contribution made in this study would provide a design model and a steplike approach to software designers on how to limit the effect of psychological reactance on persuasive system applications and interventions.
Empirical studies on the effect of electromagnetic radiation from multiple so...IJICTJOURNAL
Just after the invention of electricity by Michael Faraday, there has been a revolution in the communication technology, which lead to the invention of radio, television, radar, satellite, and mobile. While these machines transformed our life high quality, safer and simpler, they have been associated with alarming probable health hazards owing to their electromagnetic radiation (EMR) emission. Couple of cases it has been reported by personals regarding various health related issues relating to exposure on electromagnetic field (EMF) and EMR. Although couple of persons showed light symptoms and respond by avoiding the electrical field (EF) and EMR fields as much as possible, some others are so much affected that they have changed their entire lifestyle. In this paper, empirical survey study has been carried out in the laboratories of Daffodil International University (DIU) main and permanent campus. It was found that some of the instrument had higher EMFs. The findings from this survey may be helpful for the students to take precautionary measurement who work for long duration in the various laboratories for their practical classes and for the users of the domestic appliances as well as office equipment and industrial instruments.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
An internet of things-based irrigation and tank monitoring systemIJICTJOURNAL
Agriculture plays a significant role in the development of a nation and provides the main source of food production, income, and employment to nations. It was the most practiced occupation in Nigeria and this formed the backbone of the economy in the early 1960s before the discovery of crude oil, which has led to the derail of sufficient food production, exportation, and the agricultural economy at large. Over time, the dry season has always been challenging with little or no rainfall and there are no irrigation facilities that incorporate different saving practices to adapt to these climate changes on their own. In this paper, a cost-effective internet of things irrigation system that is capable of reducing water wastage, manual labor, monitoring tank water level and that can be controlled remotely is designed. The system integrated Arduino UNO with a soil moisture sensor, HCSR04 ultrasonic sensor, and ESP8266 Wi-Fi module that gives the system capable of being controlled remotely via the internet, thus achieving optimal irrigation using the internet of things (IoT). Some of the challenges facing the existing irrigation system are water wastage, poor performance, and high cost of implementation. The design system helps to control water supply to crops when it is needed, and also monitors soil moisture, temperature, and water tank level. After carrying out the experiments for 15 days, the system saved approximately 49% of the water used in traditional irrigation method. The system is useful in large farming areas to minimize human effort and reduce the cost of hiring personnel.
About decentralized swarms of asynchronous distributed cellular automata usin...IJICTJOURNAL
This research describes the simple implementation of asynchronous distributed cellular automata and decentralized swarms of asynchronous distributed cellular automata built on top of inter-planetary file system’s publish-subscribe (IPFS PubSub) experimentation. Various publish-subscribe(PubSub) models are described. As an illustration, two distributed versions and a decentralized swarm version of a 2D elementary cellular automaton are thoroughly detailed to highlight the simplicity of implementation with IPFS and the inner workings of these kinds of cellular automata (CA). Both algorithms were implemented, and experiments were conducted throughout five datacenters of Grid’5000 testbed in France to obtain preliminary performance results in terms of network bandwidth usage. This work is prior to implementing a large-scale decentralized epidemic propagation modeling and prediction system based upon asynchronous distributed cellular automata with application to the current pandemic of SARSCoV-2 coronavirus disease 2019 (COVID-19).
A convolutional neural network for skin cancer classificationIJICTJOURNAL
Skin diseases can be seen clearly by oneself and others. Although this disease is visible on the skin, we fear that this skin disease is harmful. People who experience skin diseases immediately visit a dermatologist to have their complaints and symptoms checked. This skin protects the body, especially from the sun, so it can be lethal if something goes wrong. One example of deadly skin disease is skin cancer or skin tumors. In this research, we classified skin cancer into Benign and Malignant using the convolution neural network (CNN) algorithm. The purpose of this research is to develop the CNN architecture to help identify skin diseases. We used a dataset of 3,297 skin cancer images which are publicly available on the Kaggle website. We propose two CNN architectures that differ in the number of parameters. The first architecture has 6,427,745 parameters, and the second architecture has 2,797,665. The accuracy of the proposed models is 93% and 74% respectively. The first model with the number of parameters 6,427,745 was saved for use in the creation of the website. We created a web-based application with the Django framework for skin disease identification.
A review on notification sending methods to the recipients in different techn...IJICTJOURNAL
Women have progressed a lot in terms of social empowerment and economics. They are going for higher education, jobs, and many other similar endeavors, but harassment cases have also been on the rise. So, women’s safety is a big concern nowadays, especially in developing countries. Many previous studies and attempts were made to create a feasible safety solution for women. Out of various features to ensure women’s safety in critical situations, location tracking is a very common and key feature in most previously proposed solutions. This study found mechanisms of sending the location to different types of recipients in various women safety solutions. In addition, the advantages and drawbacks of location sending methods in women's safety solutions were analyzed.
Detection of myocardial infarction on recent dataset using machine learningIJICTJOURNAL
In developing countries such as India, with a large aging population and limited access to medical facilities, remote and timely diagnosis of myocardial infarction (MI) has the potential to save the life of many. An electrocardiogram is the primary clinical tool utilized in the onset or detection of a previous MI incident. Artificial intelligence has made a great impact on every area of research as well as in medical diagnosis. In medical diagnosis, the hypothesis might be doctors' experience which would be used as input to predict a disease that saves the life of mankind. It is been observed that a properly cleaned and pruned dataset provides far better accuracy than an unclean one with missing values. Selection of suitable techniques for data cleaning alongside proper classification algorithms will cause the event of prediction systems that give enhanced accuracy. In this proposal detection of myocardial infarction using new parameters is proposed with increased accuracy and efficiency of the existing model. Additional parameters are used to predict MI with more accuracy. The proposed model is used to predict an early diagnosis of MI with the help of expertise experiences and data gathered from hospitals.
Correcting optical character recognition result via a novel approachIJICTJOURNAL
Optical character recognition (OCR) is a recognition system used to recognize the substance of a checked picture. This system gives erroneous results, which necessitates a post-treatment, for the sentence correction. In this paper, we proposed a new method for syntactic and semantic correction of sentences it is based on the frequency of two correct words in the sentence and a recursive technique. This approach starts with the frequency calculation of each two words successive in the corpora, the words that have the greatest frequency build a correction center. We found 98% using our approach when we used the noisy channel. Further, we obtained 96% using the same corpus in the same conditions.
Multiple educational data mining approaches to discover patterns in universit...IJICTJOURNAL
This paper presented the utilization of pattern discovery techniques by using multiple relationships and clustering educational data mining approaches to establish a knowledge base that will aid in the prediction of ideal college program selection and enrollment forecasting for incoming freshmen. Results show a significant level of accuracy in predicting college programs for students by mining two years of student college admission and graduation final grade scholastic records. The results of educational predictive data mining methods can be applied in improving the services of the admission department of an educational institution, particularly in its course alignment, student mentoring, admission forecast, marketing, and enrollment preparedness.
A novel enhanced algorithm for efficient human trackingIJICTJOURNAL
Tracking moving objects has been an issue in recent years of computer vision and image processing and human tracking makes it a more significant challenge. This category has various aspects and wide applications, such as autonomous deriving, human-robot interactions, and human movement analysis. One of the issues that have always made tracking algorithms difficult is their interaction with goal recognition methods, the mutable appearance of variable aims, and simultaneous tracking of multiple goals. In this paper, a method with high efficiency and higher accuracy was compared to the previous methods for tracking just objects using imaging with the fixed camera is introduced. The proposed algorithm operates in four steps in such a way as to identify a fixed background and remove noise from that. This background is used to subtract from movable objects. After that, while the image is being filtered, the shadows and noises of the filmed image are removed, and finally, using the bubble routing method, the mobile object will be separated and tracked. Experimental results indicated that the proposed model for detecting and tracking mobile objects works well and can improve the motion and trajectory estimation of objects in terms of speed and accuracy to a desirable level up to in terms of accuracy compared with previous methods.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Enterprise architecture-based ISA model development for ICT benchmarking in construction-case study
1. International Journal of Informatics and Communication Technology (IJ-ICT)
Vol. 11, No. 2, August 2022, pp. 160~176
ISSN: 2252-8776, DOI: 10.11591/ijict.v11i2.pp160-176 160
Journal homepage: http://ijict.iaescore.com
Enterprise architecture-based ISA model development for ICT
benchmarking in construction-case study
Ehab Juma Adwan1
, Ali Al-Soufi2
1
Department of Information Systems, University of Bahrain, Zallaq, Bahrain
2
ICT Consultant, Information and eGovernment Authority of Bahrain, Muharraq, Bahrain
Article Info ABSTRACT
Article history:
Received Jan 29, 2022
Revised May 27, 2022
Accepted Jun 10, 2022
Building on a coincided in progress paper, this paper constructs and evaluate
an information systems architecture (ISA) model for the Bahraini
architecture, engineering and construction (AEC) sector, from the lens of
enterprise architecture (EA). This model acts as an information and
communication technology (ICT) barometer tool to identify and benchmark
the ICT’s gaps, duplicative levels, and future investments. Following the
design science research, this paper and throughout a utilization of a tailored
version of the open group architectural framework (TOGAF), embedded into
a rigorous case study approach, the construction, testing, and evaluation of
the conceptual ISA model is approached to benchmark the ICT
measurement. Empirically, the study revealed the appropriateness of the
model and the ability to identify the availability of 28 groups of 38
individual ICT applications in the Bahraini AEC sector and benchmark them
to score an average of 18.5% against 17 countries that scored an average
of 18.6%.
Keywords:
Architecture, engineering and
construction
Benchmark ICT penetration
Design science research
Development
Information system architecture
model
TOGAF case study
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ehab Juma Adwan
Department of Information Systems, University of Bahrain
Bahrain International Circuit, Zallaq, Bahrain
Email: eadwan@uob.edu.bh
1. INTRODUCTION
The AEC sector is a highly visible player in countries’ growth, considering that the effects of
changes in the construction sector impacts all levels of the economy. However, our reviewing revealed lack
of previous research endeavours on empirically grounded and exploratory information and communication
technology (ICT) approaches to benchmark the ICT applications in the architecture, engineering and
construction (AEC) enterprises. ICT benchmark research is focused on the structuring, standardizing and
generalizing of IT implementation within enterprises. However, initiatives to benchmark ICT applications in
AEC were found relatively limited, in comparison to other sectors and in several countries, at which Bahrain
is no exception. Moreover, the usage of IT-barometers to benchmark ICT diffusion in construction tends to
be ineffective as the AEC sector is yet not well defined, nor understood, and lacks common definition. This
paper is coincided with another in progress paper which develops a business model (BM) for AEC sector.
This paper commences by highlighting key findings from the other paper and building on it to develop and
evaluate an information system architecture model (ISA) to benchmark the ICT applications penetration
levels.
Enterprise architecture (EA) practice provides analysis of common core elements of a socio-
technical enterprise, their interrelationships within and out boundary in order to manage complexity. From
the lens of the EA and through a tailored the open group architecture framework (TOGAF) based
2. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
161
methodology, this study is aimed to achieve three objectives: firstly, construct an ISA model of the AEC
enterprises, secondly, benchmark the ICT applications, and thirdly, compare the resulting domestic
penetration levels to the Gulf Cooperation Council (GCC), Arab and regional countries, all throughout a
literature review and a case study to benchmark the domestic ICT applications. Findings of this paper
indicate the appropriateness of the ISA model to benchmark ICT applications, contextualized for AEC sector.
This approach should build on existing knowledge and findings from research into generic ICT applications
benchmark which should also be based on reference business models.
The paper is organized as follows: section 2 explains reviews related work to the problem at hand.
Section 3 introduces the design science research (DSR) methodology and executes the 1st phase until the 3nd
phase of the DSR. Section 4 elaborates on the initial constructed ISA model through case study analysis of
the 4th phase. Therefore, collected data is analysed, the empirical findings are pronounced, demonstrated,
evaluated and communicated according to the 4th, 5th and 6th phases of the design science research
methodology (DSRM). Section 5 concludes and provides future recommendations of the study workout.
2. LITERATURE REVIEW
2.1. Enterprise architecture and TOGAF
Hinkelmann et al. [1] defines EA as a blueprint that describes the elements and relationships of an
enterprise and organizes the business processes, organizations, data, and information technologies
accordingly. Furthermore, EA entails graphical models for the generation of architecture description artifacts
at which the architecture description is a tool that solves knowledge complexities in enterprises. The
representation of knowledge is interpreted either in a human graphical interpretation or in machine
interpretation. For the development of architectural model, an EA framework (EAF) is utilized to define and
describe the architectural artefacts and relationships. International organization for standardization [2] defines
EAF as ‘‘fundamental concepts or properties of an enterprise in its environment embodied in its elements,
relationships, and in the principles of design and evolution”. Reaserchers [3], [4] believe that EAF provides a
collection of processes, techniques, artefact, and reference models for the production and use of EA
description. Several EAFs were utilized in industries for different purposes. Department of defense
architecture framework (DODAF) was created for the defence sector [5]. The federal enterprise architecture
framework (FEAF) was created for the federal governments [6]. Zachman Framework represents the 12
perspectives of different stakeholders [7]. Alternatively, TOGAF acts as an iterative framework that provides
methods to assist the production, use, and maintenance of EA [8]. TOGAF categorizes enterprise levels into
architecture vision (AV), business architecture (BA), information systems architecture (ISA), encompassing
data, app, and technology architectures. BA considers the enterprise strategy, objectives, and stakeholders’
interests. The BA document and the architecture vision document are illustrated in Appendix 1 and
Appendix 2 consecutively. The ISA level, however, encompasses the application-level aspects which map the
information needs on the enterprise’s business needs.
2.2. ICT penetration in construction
Resulting from the SLR and meta-analysis approaches and based on the insights of [9], [10], the
current study collected the most common ICT apps in the AEC sector from 17 countries, Table 1 lists a set of
36 reviewed articles. Appendix 3 demonstrates the empirical availability findings of 38 individual ICT
applications at which they were mathematically measured and complement Table 1 findings. Other two
collected sources of technologies and applications spanning from 1996–2016 include two LR articles of [9],
[10]. The name discrepancy of the 38 ICT apps necessitated to group the ICT apps into 28 functional groups.
Figure 1 depicts the availability penetration levels of the functioanl ICT apps based on the 36 reviewed
articles at which the world’s avg penetration level represented 18.63%, while Table 2 demonstrates the
28 groups.
Figure 1. The ICT applications’ penetration in the AEC sector worldwide
3. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
162
Table 1. The ICT applications’ penetration in the construction sector worldwide
Author Country Year Publication title
1 Thomas et al. Australia 2001 Current state of IT usage by Australian subcontractors
2 Stewart et al. Australia 2002 Strategie implementation of IT/IS project in construction: a case study
3 Michaloski
and Costa
Brazil 2010 A survey of IT use by small and medium-sized construction companies in a
city in Brazil
4 Scheer et al. Brazil 2007 The scenario and trends in the Brazilian IT construction applications’
experience
5 Rivard Canada 2000 A survey on the impact of information technology on the Canadian
architecture, engineering and construction sector
6 ElMashaleh Jordan 2007 Benchmarking information technology utilization in the construction sector
in Jordan
7 Derman and
Salleh
Malaysia 2010 Literation review on information and communication technology (ICT)
system to support integration construction supply chain
8 Lim et al. Malaysia 2002 A survey of internet usage in the Malaysian construcion sector
9 Bjork NA 1997 INFOMATE: A framework for discussing information technology
applications in construction
10 Bjork NA 1999 Information technology in construction: domain definition and research
issues
11 Nourbaksh et
al.
NA 2012 Mobile application prototype for on-site information management in
construction sector
12 Davies New Zeeland 2010 IT Barometer New Zealand-A survey of computer usage and attitudes in the
New Zealand construction sector
13 Doherty New Zeeland 1997 A survey of computer use in the New Zealand building and construction
Sector
14 Wikinson New Zeeland 2012 An alaysis of the use of information technology for project management in
the New Zealand construction sector
15 Oladepo Nigeria 2007 An investigation into the use of ICT in the Nigerian construction sector
16 O’BRIEN and
Biqami
Saudi Arabia 1997 Survey of information technology and the structure of the Saudi Arabian
Construction sector
17 Howard et al. Scandinavia 1998 Survey of IT in the construction sector and the experience of IT barometer in
Scandinavia
18 Sorensen et al. Scandinavia 2008 Radio frequency identification in construction operation and maintenance-
contextual analysis of user needs
19 Samuelson Scandinavia 2002 IT barometer 2000. The use of IT om the Nordic construction sector
20 Samuelson Scandinavia 2008 The IT barometer-A decade’s development of IT use in the Swedish
construction sector
21 Hua Singapore 2005 IT barometer 2003: Survey of the Singapore construction sector and a
comparison of results
22 Arif and
Karam
South Africa 2005 Archicetural pratices and IT local vs international
23 Murray et al. South Africa 2001 The intergrated use information and communication technology in the
construction sector
24 Ozumba and
Shakantu
South Africa 2008 Improving site management process through ICT
25 Chien and
Barthorpe
Taiwan 2010 The current state of information and communication technology usage by
SME sized Taiwanese construction companies
26 Tan Taiwan 1996 Information technology and perceived competitive advantage: an empiricial
study of engineering consulting firms in Taiwan
27 Irlayici and
Tas
Turkey 2008 A role of the usage information technology in Turkish contractor firms
28 Sarshar and
Isikdah
Turkey 2004 A survey of ICT uses in the Turkish contractor sector
29 Mutesi and
Kyakula
Uganda 2009 Application of ICT in the contractor sector in Kampala
30 Bouchaghem
et al.
UK 1996 Virtual reality applications in the UK’s contractor sector
31 Clark et al. UK 1999 Benchmarking the use of IT to support supplier management in construction
32 Wong and
Sloan
UK 2004 Use of ICT for procurement in the UK contractor sector: A survet of SMEs
readiness
33 Craig &
Sommerville
UK 2006 Information management systems on construction projects: case reviewes
34 EIGhandour USA 2004 Survey of information technology applications in construction
35 Perkinson and
Ahmad
USA 2006 Computing techology usage in construction contractor organizations
36 Tatari et al. USA 2007 Current state of contractor enterprise information systems: survey research
4. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
163
Table 2. ICT percentage increase w.r.t. world’s average
G. No ICT group type G. No ICT group type
G01 Modeling software/architectural & engineering design
(CADnd, CAM, ACAD, AutoCAD LT, BIM)
G15 Email
G02 CorelDraw, Viso G16 Internet (WAN)
G03 Engineering Analysis MathCad, Microstran, Pframe),
(Turboframe and MathCAD)
G17 Internet (LAN)
G04 Animation/3D G18 Web portals
G05 3D MaX G19 Virtual reality
G06 Contouring software (QuickSurf and SurfMate) G20 Vidio conferencing
G07 Structure analysis: Prokon and Staad/NokiaN73/Earthworks
SW (Civil designer-survey and terrain)/Drainage SW (Civil
Designer-Storm CAD-Flowmeter-Culvertmaster-Pond Pack)
G21 Project management information systems-
Ms Project-Primavera-timeline-superproject
G08 Atmospheric analysis systems/ Structure analysis systems/
Fluid
G22 Project web
G09 Accounting systems (Solution 6) G23 Mobile technology-for on-site (mobile
CAD, data capture, project management
applications)-PDA-based
collection/construction
G10 Financial management system G24 Quantity surveying systems
G11 Enterprise resource planning (ERP)/construction ER G25 Cost estimating software:(CACE)
G12 EDMS (Project Extranet, Project Web, Project Bank, Project
Specific Website, DocPool, Porject Information Mgt System)
G26 Human resource management
G13 EDI G27 E-Bidding
G14 Word, Excel, Access, PowerPoint G28 E-Tendering
2.3. ISA as an ICT reference model
According to Cloutier et al. [11], reference models (RM) are abstract solution patterns to design
domain specific systems which provide generic solution patterns and mitigate the complexity of the ICT
landscape [12], constitute organization-specific configuration [13], form a representation of a homogeneous
group of components including, process, system, or area, and is developed for the analysis, improvement,
and/or replacement of the specified process [14], [15]. Also, RMs express “a point of reference for the
development of specific models” [16], facilitate cross agency analysis, and identify duplicative ICT
investments, gaps, and opportunities [17]. Previous studies on the development of EA based ISA models are
scarce in many industries including the AEC sector. In their discussion about ICT reference models, [17]
advocated that many architecture descriptions, labelled as a reference model, describe the technical
architecture. They compared between five ICT RMs including, performance RM, business RM, service
component RM, data RM and technical RM. Not an exception, Gammelgård [18] proposed an EA-based RM
software (SW), hardware (HW), and infrastructure, which was aimed to solve decision support difficulties for
IT management in EA. Also, Pesic and Aalst [19] identified two types of ICT RMs namely, best practice
RMs which elicit domain practices and system oriented RMs that elicit structure of systems. Oppositely,
Novotný [20] advocated that RMs are developed by SW developers then they developed a RM that maintains
detailed information about a real business enterprise’s informatics structure and management.
3. RESEARCH METHOD
DSR is one of the two paradigms that characterize most of the research in information systems
discipline aiming at creating new and innovative artifacts [21]. This study is directed by the DSR approach as
advocated by [22]. DSR is a six phased methodology which is widely used to solve several enterprises-based
issues, including ICT, by constructing and evaluating ICT artifacts. “Problem identification” is the 1st
phase
to deal with concepts and theories and significance of problem at hand, while “objective definition” is
concerned with the research gap as a 2nd
phase. “Design and development of the artifact”, “demonstration” of
the use of analysed artifact, “evaluation”, and “communication” of study findings are the following four
phases of DSR. Notably, Figure 2 depicts the six phases of current study at which the first two phases of DSR
are represented by one of two sub phases named “identification and definition”, while the construction phase
explains the design and development process of the artifact utilizing the case study approach. Evaluation of
the artifact is conducted by utilizing Delphi method while the communication phase comprises the
presentation and documentation of the results in the entire paper.
3.1. Problem identification and definition of objectives
Prior to the construction process of the ISA model, an appropriate method for ICT architectural
representation of enterprises was employed throughout the identification and tailoring of architectural phases
5. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
164
and core components to describe the baseline (as-is) of ICT elements throughout the alignment with the
actual adjacent core elements.
Figure 2. The architectural representation-based phases and processes
3.1.1. The architectural phases and core components
According to The Open Group [13], the ISA (Phase C) is preceded by an architecture vision (phase
A) and a business architecture (BA/Phase B). The architecture vision, demonstrated in Appendix 2, is aimed
to 1) ensure that the evolution of the architecture development cycle is supported by the management of the
enterprise, 2) validate the business principles, goals, and strategic business drivers of the enterprises, 3)
define and identify the scope of the components of the BA effort, 4) define the relevant stakeholders and their
concerns and objectives, 5) define and articulate the key business requirements, 6) articulate an architecture
vision that demonstrates a response to those requirements and constraints, and 7) secure formal approval to
proceed. The BA provides a comprehensive overview of an enterprise through the usage of several different
architectural views to depict how an enterprise executes business in line with its operating model. The core
components of an enterprise represent the holistic multi-dimensional views of business capabilities and ICT
capabilities. The former entails views of the strategic objective (SO), organization structure, including, units
(U), actor/role, processes (P), functions (F), and services (S). The follower entails several views; ICT
baseline applications, portfolio summary, and portfolio details. Figure 3 depicts the initial architectural
representation-based ISA model. The key data collected for the ICT baseline applications include app-id,
app-name, app-description, vendor, and origin. The key data collected for the ICT portfolio summary include
app-id, unit-id, function-id, owner, status, and description, while app-id, function-id, process-id, and service-
id, app-type, and primary user, all correspond to the ICT portfolio details.
Figure 3. The ISA model views and attributes
6. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
165
3.1.2. Core elements of the ISA model
The ISA core elements correspond to the ISA entities and processes. Based on the literature review
findings, a suggested ISA model should encompass business core elements such as, the business strategic
mission and vision SO, the business units U, the business stakeholders A/R, the business functions F, the
business processes P, and the business services S. However, such elements should first be justified and then
mapped to the core components [13]. However, Figure 4 depicts the conceptual model of the actual ISA
elements. The model focuses on the ICT applications and/or data considerations that support the BA views of
the enterprise, that is, defines the major kinds of ICT application systems (logical groups of capabilities)
necessary to process the data and support the business by presenting information to the human and computer
actors in the enterprise.
Figure 4. The ISA conceptual model
3.2. Construction of the ISA conceptual model
As a commonly used approach in information systems, this study builds an ISA model from a
qualitative case study strategy. For a successful case study design, [23] determined eight steps such as,
designing a protocol, determining research questions, performing case selection, identifying data collection
and analysis techniques, collecting data, evaluating and analyzing data, and writing the report. Therefore, a
single, exploratory, descriptive, and in-depth case study was found reasonable to the problem at hand.
3.2.1. Case study protocol
Based on the insights of Yin [23], Table 3 demonstrates the seven sections of case study protocol
design, while Appendix 4 ellaborates on the protocol document for the case study. The document is
composed of seven sections matrix. Respectively, the sections include an overview, field procedures,
research questions, data collection matrix, architectural vision template (I), BA template (II) and ISA
template (III).
Table 3. The protocol design of the case study
Section No. Topic Content
1 Overview A statement of the overall aims of the research
2 Field procedures How to gain access, capture data, and time plan for data colletion. for each case.
3 Research questions Specific research questions stated with clear links to the theory/literature.
4 Data collection matrix A matrix (table) for collected evidence, corresponding to the research questions.
5 Template (I) Architectural vision document templates
6 Template (II) Business architecture document templates
7 Template (III) Information systems architecture document templates
7. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
166
3.2.2. Case selection
The selected case study is a single precautionary and exploratory version that is activated prior to a
larger main study [23] determine 16 purposes for a such a case study of which the current single case study
tests the appropriateness of the research instruments, including the research protocol, the formulated research
questions and the subsequent research plan. Considering the insights of [23], [24], comp01 was found best
matching the predetermined criterions as the “criterion case” because it is located in Bahrain, A-grade having
standardized business functions and work processes, fast responsive to the interview request. comp01 was
founded in 1990 of 35 personnel, provided AEC services, was A-grade licensed. comp01 is an international
architectural engineering office, located in Manama, Bahrain, founded in 2002 and grants a grade-A
Engineering practicing licence from the Bahraini committee for organizing engineering professional practice
(COEPP).
3.2.3. Research questions formulation
Measuring the penetration levels of ICT applications necessitates answering one main question and
seven sub-questions as demonstrated in section 3 of Appendix 4. The main question was about identifying
the supporting ICT applications of the Bahraini AEC enterprise w.r.t the business views of comp01.
Q1.1–Q1.5 were meant to inform the domestic and worldwide measurement of the ICT applications
penetration, while Q1.6 was aimed to provide an enterprise modeling representation, that is, to graphically
express the interelationships of ICT applications. Q1.7 provided statistical measures to the comparative
penetration level (%) of comp01 ICT applications to the world (i.e., the average measured for the
17 countries).
3.2.4. Data collection of core elements
Based on the formulated questions, the structured interviews and document analysis were
respectively the two performed primary and secondary qualitative data collection techniques in this study. Th
triangulation was addressed to gain in rich data, to ensure rigorousness, to overcome the potential bias, and to
satisfy validity and reliability factors of the study [25]. Based on the recommendations of [26], the sample
size was determined based on who recommends three to five interviewees per case study. Three personal
interviews (i.e., face-to-face and telephone calls) were employed, each of which ranged between 2-3 hours
along with 3 phone call conversations of 10-15 minutes each. The interviewees consisted of the chief
architect, the managing director, the deputy general manager, a group of architects & draftsmen, and IT
manager. Performing document analysis required analysing the business case web pages, presentations,
brochures, strategic plan, and architecture projects along with the analysis of the ICT application manuals
and vendor specification sheets. The collected datasets were manually coded according to the matrix
predetermined themes (template I, II, III) in MS excel. Thematic analysis was conducted following the
suggestions of [27].
3.2.5. Testing of the case study design
Three tests (i.e., construct validity, external validity, and reliability) were performed to measure the
quality during the phases of the case study [23]. For the external validity test during research design and data
collection stages, the necessity to perfrom this study was drawn from the substancial lack of previous stuides
on the problem at hand. Recall that selecting comp01 was based on several criterions (i.e., A-Grade, located
in Bahrain, having standard business and ICT functions and work processes, and fast responsive to interview
request. Since the moment it was requested to participate in the interviews, com01 was the most welcoming
enterprise to get involved having their staff members available during the day time to answer face-face and
phone call questions. Research quality was a concern. Honesty was not questionable as the staff never faked
any piece of data. On contrary, they provided precise organizational structure, invoices and documentary
written materials. Also, during the data collection stage, a case study protocol was developed including
research objectives and questions, field procedures, details of all types of evidence besides the structure of
the final research, and a report writing that identified the audience, determined the best structure, and
organization of the written report. Moreover, construct validity for data collection and composition stages
was claimed by establishing precise operational measures for the study concepts by corresponding the data
collection questions and measures to the research questions and propositions, through using a chain of
evidence (Triangulation). Two primary sources of evidence included face-face interview and a non-
standardized interview by telephone along with two secondary sources including, organizational structure
and website documentary written material. A revision was conducted to the draft case study report during the
composition stage and in the middle and the end of the collection procedure. Reliability during the data
collection stage was claimed through developing a repository (i.e., business architecture templates) to the
case study to document the data collection procedures and finding. Thus, collected interviews findings,
8. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
167
memos and notes were transcribed, organized, and protected as per the request of the enterprise, at which the
enterprise name was replaced by a code no. Also, an electronic filing database was established to store a back
up to the transcripts at various stages in the process.
4. RESULTS AND DISCUSSION
4.1. Demonstration
The analysis work draws on the four based steps of analysis method framework that classifies and
organizes the datasets into themes, categories, and concepts in order to identify similarities and differences
between participants [27]. The analysis, for both the business and ICT apps sides, worked as follows: First,
data coding index was assigned to each identified concept during the interviews, in the format of A.0.0.0.0.
Subheadings were assigned to the concepts under each heading in the form of A.1.0, 0.0. The concept is
indexed in the format of A.0.1.0.0 with sub-concepts assigned as A.0.2.0.0. Numerical codes were recorded
in the transcripts. Second, resulting data was sorted to gather similar content text. Third, categorized data was
examined to determine the range of the content within the theme. Fourth, each theme was developed on a
thematic chart.
4.1.1. The ICT applications strategic objectives
This section answers the first question of the study at which the ICT applications and baseline
functionalities were not deployed as comp01 has not set ICT SO yet.
4.1.2. The ICT applications corresponding to units and actors (U&A/R)
This section answers the second question of the study at which the ICT applications and baseline
functionalities were deployed. Table 4 demonstrates 15 baseline ICT applications, for example, Auto
computer-aided design (AutoCAD) (App01), is a two-dimensional (2D) and three-dimensional (3D)
modelling and design application that is developed and marketed by Autodesk in USA. Furthermore, Table 5
lists the corresponding ICT applications w.r.t the business units and actors/roles.
Table 4. ICT baseline applications
App-id App name App description Vendor Origin
App01 AutoCAD 2D and 3D computer-aided design and drafting. Autodesk USA
App02 3d Max A 3D animation, modelling, and rendering software. Autodesk USA
App03 V-Rav Rendering plugin software for 3D computer graphics applications. V rav Bulgaria
App04 Adobe Photoshop Raster graphics editing software. Adobe Sys USA
App05 Adobe Acrobat Used to share and archive drawings, specifications and project info. Adobe USA
App06 STAAD/Pro Used for analysis and desingns of structures: buildings and bridges. Bentley Systems USA
App07 Orion 2D/3D structural analysis, design, drawings s/w. Trimble Finland
App08 Tally ERP Records and classifies the financial transcions. Tally Solutions India
App09 Ms Office Report writing & spreadsheets. Microsoft USA
App10 Windows 2008 Server OS. Microsoft USA
App11 Symantec Backup Makes copies of physical storage environments for disaster recovery. Microsoft USA
App12 Kaspersky Antivirus and online security program. Kaspersky Russia
App13 Trend Micro Antivirus and online security program. Trend USA
App14 Internet Internet service. Microsoft USA
App15 Email External mail application. Microsoft USA
Table 5. ICT applications w.r.t units & actor/role
App-id App name Unit id Unit name Unit parent Actor id Actor/Role
App01 AutoCAD U01 Proprietor or director Management A/R 01 Proprietor&director
App02 3d Max U02 G. deputy management Management A/R 02 General deputy manager
App03 V-Rav U03 Chief architecture Architecting A/R 03 Chief architect
App04 Adobe Photoshop U04 Senior/junior architecture Architecting A/R 04 Senior/Junior architect
App05 Adobe Acrobat U05 Drafting Engineering A/R 05 Draftsman
App06 STAAD/Pro U06 Structural engineering Engineering A/R 06 Structural engineer
App07 Orion U07 Mechanical engineering Engineering A/R 07 Mechanical engineer
App08 Tally ERP U08 Electrical engineering Engineering A/R 08 Electrical engineer
App09 Ms Office U09 Quantity surveing Q. surveying A/R 09 Quantity surveyor
App10 Windows 2008 U10 Tendering &contracting Tender & contract A/R 10 Plumber
App11 Symantec Backup U11 Municipal liaison Tendering & contract A/R 11 Municipal liaison officer
App12 Kaspersky antivirus U12 Project site engineering Supervision A/R 12 Project site engineer
App13 Trend Micro antivirus U13 Accounting & finance Supporting A/R 13 Accounting manager
App14 Internet U14 HR & administration Supporting A/R 14 HR & admin manager
App15 Email U15 IT Supporting A/R 15 General deputy manager
9. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
168
4.1.3. The ICT applications corresponding to functions (F)
This section answers the third question of the study at which the ICT applications and baseline
functionalities were deployed. Through traceability, 15 ICT applications were distributed w.r.t the function.
Table 6 explores the ICT portfolio summary at which 3dMax (App02), for example, is owned and used by
senior/junior architect actor (A/R04) in senior architecture unit (U04) to perform architecting function (F02).
Table 6. ICT applications w.r.t functions
App-id Function id Function name Function id Owner (actors/roles)
App01 F2, F3 Architecting, engineering U4, U5, U6, U7, U8, U9 A/R4, A/R5, A/R6, A/R7, A/R8, A/R9
App02 F2 Architecting U4 A/R4
App03 F2 Architecting U4 A/R4
App04 F2 Architecting U4 A/R4
App05 F1, F4 Managing, tendering &
contract
U3, U11 A/R3, A/R11
App06 F3 Engineering U4, U6, U9 A/R4, A/R6, A/R9
App07 F3 Engineering U6 A/R6
App08 F6 Supporting U13 A/R13
App09 F1, F2, F3, F4,
F5, F6
Managing-… Supporting U1, U2, U6, U7, U9,
U10, U13
A/R1, A/R2, A/R6, A/R7, A/R9, A/R10,
A/R13
App10 F1 Managing U1 A/R1
App11 F1 Managing U1 A/R1
App12 F1 Managing U1 A/R1
App13 F1 Managing U1 A/R1
App14 F1, F2, F3, F4,
F5, F6
Managing-… Supporting U1-U15 A/R1-A/R15
App15 F1, F2, F3, F4,
F5, F6
Managing-… Supporting U1-U15 A/R1-A/R15
4.1.4. The ICT applications corresponding to processes (P)
This section answers the fourth question of the study at which the ICT applications and baseline
functionalities were deployed. Through traceability, 15 ICT applications were deployed. Table 7 explores the
distribution of the ICT applications w.r.t. process view. Thus, Trend Micro antivirus (App13), for example, is
used to secure the scope of work process (P01) that is set by proprietor& managing director actor (A/R01)
who is working in management unit (U01) to perform management (F01).
Table 7. ICT applications w.r.t processes
App-id Process-id App-type Function id Owner (Actors/Roles
App01 P3, P4, P5, P7 COTS F2, F3 Svc2
App02 P5 COTS F2 Svc2
App03 P5 COTS F2 Svc2
App04 P5 COTS F2 Svc2
App05 P5, P6, P7 COTS F1, F4 Svc2, Svc3
App06 P5 COTS F3 Svc2
App07 P5, P7 COTS F3 Svc2
App08 P5, P6, P7, P8, P9 COTS F6 Svc4
App09 P1, P2, P3, P4, P5, P6, P7, P8, P9, P10 COTS F1, F2, F3, F4, F5, F6 Svc1, Svc2, Svc3, Svc4
App10 P3 COTS F1 Svc1
App11 P3 COTS F1 Svc1
App12 P3 COTS F1 Svc1
App13 P3 COTS F1 Svc1
App14 P1, P2, P3, P4, P5, P6, P7, P8, P9, P10 COTS F1, F2, F3, F4, F5, F6 Svc1, Svc2, Svc3, Svc4
App15 P1, P2, P3, P4, P5, P6, P7, P8, P9, P10 COTS F1, F2, F3, F4, F5, F6 Svc1, Svc2, Svc3, Svc4
4.1.5. The ICT applications corresponding to services (svc)
This section answers the fifth question of the study at which the ICT applications and baseline
functionalities were deployed. Apparently, 15 individual ICT applicappeations were deployed. Table 8
explores the distribution of the ICT applications w.r.t. services. Tally ERP (App08) is an accounting and
finance application that is executed by an accounting manager actor (A/R13) and is exploited in accounting
and finance unit (U13) which performs supporting function (F06) to provide supervision,
management&completion (Svc04) to clients.
10. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
169
Table 8. ICT applications w.r.t services
App-id Service id Unit id Actor/Role id Function id
App01 Svc2 U4, U5, U6, U7, U8, U9 A/R4, A/R5, A/R6, A/R7,
A/R8, A/R9
F02, F3
App02 Svc2 U4 A/R4 F2
App03 Svc3 U4 A/R4 F2
App04 Svc2 U4 A/R4 F2
App05 Svc2, Svc3 U3, U11 A/R3, A/R11 F2, F4
App06 Svc2 U4, U6, U9 A/R4, A/R6, A/R9 F3
App07 Svc2 U6 A/R6 F3
App08 Svc4 U13 A/R13 F6
App09 Svc1 U1, U2, U6, U7, U9,
U10, U13
A/R1, A/R2, A/R6, A/R7,
A/R9, A/R10, A/R13
F1, F2, F3, F4, F5, F6
App10 Svc1 U1 A/R1 F1
App11 Svc1 U1 A/R1 F1
App12 Svc1 U1 A/R1 F1
App13 Svc1 U1 A/R1 F1
App14 Svc1 U1-U15 A/R1-A/R15 F1, F2, F3, F4, F5, F6
App15 Svc1, Svc2, Svc3, Svc4 U1-U15 A/R1-A/R15 F1, F2, F3, F4, F5, F6
4.1.6. The graphical representation of relationships
This section answers the sixth question of the study. Figure 5 depicts the penetration of the ICT
applications within the business elements; unit & actor/role, function, process, and service.
Figure 5. Penetration of the ICT applications within the business elements
4.1.7. Benchmark of ICT penetration level
This section answers the seventh question of the study. Measuring the penetration level (%) of
individual ICT applications for com01 was performed as follows. For P=penetration; x=No of rows; y=No of
columns; N=0/1 where 𝑃𝑥 refers to the application order in the table, 𝑃1 = 𝐴𝑝𝑝1, 𝑃2 = 𝐴𝑝𝑝16, 𝑃3 = 𝐴𝑝𝑝17, ....,
𝑃38 = 𝐴𝑝𝑝10
𝑃𝑆,𝑥%
(∑ 𝑁𝑥,𝑦
4
𝑦=1 )
4
𝑥 100% (1)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 (%) 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐰. 𝐫. 𝐭 𝐬𝐞𝐫𝐯𝐢𝐜𝐞 =
𝑆𝑢𝑚 𝑜𝑓 𝑎𝑣𝑎𝑖𝑙𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑜𝑓 𝑠𝑒𝑟𝑣𝑖𝑠𝑒 𝑜𝑓 𝑒𝑎𝑐ℎ 𝑎𝑝𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑜𝑛
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑠𝑒𝑟𝑣𝑖𝑐𝑒𝑠
𝑥 100%
𝑃𝐹,𝑥%
(∑ 𝑁𝑥,𝑦
6
𝑦=1 )
6
𝑥 100% (2)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 (%) 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐰. 𝐫. 𝐭 𝐟𝐮𝐧𝐜𝐭𝐢𝐨𝐧 =
𝑆𝑢𝑚 𝑜𝑓 𝑎𝑣𝑎𝑖𝑙𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑜𝑓 𝑓𝑢𝑐𝑡𝑖𝑜𝑛 𝑜𝑓 𝑒𝑎𝑐ℎ 𝑎𝑝𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑜𝑛
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑓𝑢𝑛𝑐𝑡𝑖𝑜𝑛𝑠
𝑥 100%
11. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
170
𝑃𝑃,𝑥%
(∑ 𝑁𝑥,𝑦
10
𝑦=1 )
10
𝑥 100% (3)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 (%) 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐰. 𝐫. 𝐭 𝐩𝐫𝐨𝐜𝐞𝐬𝐬 =
𝑆𝑢𝑚 𝑜𝑓 𝑎𝑣𝑎𝑖𝑙𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑜𝑓 𝑝𝑟𝑜𝑐𝑒𝑠𝑠 𝑜𝑓 𝑒𝑎𝑐ℎ 𝑎𝑝𝑝𝑙𝑖𝑐𝑎𝑡𝑖𝑜𝑛
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑝𝑟𝑜𝑐𝑒𝑠𝑠𝑒𝑠
𝑥 100%
𝑃𝑥%
(∑ 𝑁𝑥,𝑦
20
𝑦=1 )
20
𝑥 100% (4)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 (%) 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 =
Sum of availability of service, function, & process of each application
Total number of service, function, & process
𝑥 100%
𝐴𝑝𝑝%
(∑ 𝑃𝑥
𝑁𝑜
𝑥=1 )
20
𝑥 100% (5)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐨𝐟 𝐚𝐥𝐥 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐢𝐧 𝐞𝐚𝐜𝐡 𝐜𝐨𝐦𝐩𝐚𝐧𝐲 (%) =
Sum of percentages of each company
Number of applications in each company
𝑃𝑥%
(∑ 𝑁𝑥,𝑦
6
𝑦=1 )
6
𝑥 100% (6)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 (%) =
Sum of availability of companies
Total number of companies
𝑥 100%
𝐶𝑦%
(∑ 𝑁𝑥,𝑦
38
𝑥=1 )
38
𝑥 100% (7)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐜𝐨𝐦𝐩𝐚𝐧𝐲 (%) =
Sum of availability of applications
Total number of applications
𝑥 100%
𝐺𝑀%
(∑ 𝑁𝑥,𝑦
𝑥=38
𝑦=11
𝑥=1
𝑦=1
)
38
𝑥 100% (8)
𝐈𝐂𝐓 𝐩𝐞𝐧𝐞𝐭𝐫𝐚𝐭𝐢𝐨𝐧 𝐨𝐟 𝐞𝐚𝐜𝐡 𝐠𝐫𝐨𝐮𝐩 (%) =
Sum of availability of applications in each group
Total number of applications
𝑥 100%
However, the formulas (6-8) illustrate the measurement results of individual/group of ICT
applications penetration levels of the entire Bahraini sector as follows: For x=number of rows; y=number of
columns; N=(0 or 1); M=A, B, ..., K; 𝑃𝑥=the application order as appears in the table. Resulting from the
formulas, Figure 6 demonstrates the scoring of 47.4% w.r.t. functions, 42.3% w.r.t processes, 51.9% w.r.t
services, and an overall score of 49.7%.
Figure 6. ICT application penetration levels
Recall from section 2 that by the meta-analysis technique, the study determined the presence of 38
individual ICT applications of the construction industry in 17 countries. Compared to the world’s avg
penetration, Table 9 depicts the penetration levels of the 28 groups of ICT apps of comp01 w.r.t. functions,
while processes and services were excluded due to the unavilability of a worldwide BA model for the AEC
sector. As a representative of the Bahraini AEC sector, comp01 scored 18.5% against Saudi Arabia of 8.3%,
Jordan of 10.7%, Turkey of 22.6%, and below the worldwide average by 0.1%.
12. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
171
Table 9. ICT applications penetration levels of comp01
F01 F02 F03 F04 F05 F06
Applications
1 0 1 1 0 0 0
Avg (%)
2 0 0 0 0 0 0
3 0 0 0 0 0 0
4 0 1 1 0 0 0
5 0 1 1 0 0 0
6 0 0 0 0 0 0
7 0 1 1 0 0 0
8 0 1 1 0 0 0
9 0 0 0 0 0 1
10 0 0 0 0 0 1
11 0 0 0 0 0 0
12 0 0 0 0 0 0
13 0 0 0 0 0 0
14 1 1 1 1 1 1
15 1 1 1 1 1 1
16 1 1 1 1 1 1
17 0 0 0 0 0 0
18 0 0 0 0 0 0
19 0 0 0 0 0 0
20 0 0 0 0 0 0
21 0 0 0 0 0 0
22 0 0 0 0 0 0
23 0 0 0 0 0 0
24 0 0 0 0 0 0
25 0 0 0 0 0 0
26 0 0 0 0 0 0
27 0 0 0 0 0 0
28 0 0 0 0 0 0
14.30% 28.60% 28.60% 10.70% 10.70% 17.9 18.50%
4.2. Evaluation and communication
Two criterions oblige the evaluation of developed model, theoretical soundness, and the modelling
taxonomy. Through several rounds, Delphi technique was applied to collect experts’ opinions on specific
questions and produce quality argument about the constructed model. Habibi et al. [28] suggest at least two
rounds for the feedback collection. According to Iden et al. [29], the selection of the expert panel and the
number of rounds form the success factors of Delphi technique. Consequently, 2 rounds were set for the
evaluation while 4 experts were selected from the Bahraini information & e-government authority and the
Comp1 to evaluate the ISA model design and the benchmark of ICT application efforts based on
11 parameters/criterions. The comments were then collected, grouped, synthesized until the final model
development [30]. The quality criterions under which the ISA model was evaluated in 2 rounds based on a
5-point likert scale (S.Agree=5–S.Disagree=1) questionnaire as listed in Table 10, all along with the average
values to achieve an a 64% of ISA RM appropriateness.
Table 10. The evaluation findings of the ISA RM
Criterions Description
Round 1 (%) Round 2 (%) Total rounds avg (%)
S.Ag Agree Neut D.A SDis S.Ag Agree Neut D.A SDis S.Ag Ag Neut D.A SDis
Clarity Easily understandable 100 0 0 0 0 100 0 0 0 0 100 0 0 0 0
Simplicity Quickly understandable 100 0 0 0 0 100 0 0 0 0 100 0 0 0 0
Expressiveness Describes reality thoroughly 25 75 0 0 0 25 50 25 0 0 25 63 13 0 0
Minimality Contain no redundant
concepts
0 0 50 50 0 25 0 50 25 0 13 0 50 38 0
Completeness Describes particular app
domain
0 100 0 0 0 75 25 0 0 0 38 63 0 0 0
Accuracy Complied to reality 25 75 0 0 0 0 75 25 0 0 13 75 13 0 0
Abstraction Provides highly abstract
concept
25 25 50 0 0 25 25 50 0 0 25 25 50 0 0
Consistency Provides standardized
diagrams
0 50 50 0 0 0 75 25 0 0 0 63 38 0 0
Unambiguity Provides clear linking to
units
50 0 50 0 0 50 0 50 0 0 50 0 50 0 0
Testability Provides testable hypothesis 25 25 50 0 0 50 0 50 0 0 38 13 50 0 0
Reproducibility Provides computerized
analysis
0 0 25 75 0 0 0 100 0 0 0 0 63 38 0
Average 32 32 25 11 0 41 23 34 2 0 36 27 30 7 0
13. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
172
Communication refers to the importance and effectiveness of the artifact to the researcher at which
the identified problem and the proposed solution should be documented for publication excluding any
restricted or sensitive information of the enterprise. All aspects of the problem and the designed artifact
arecommunicated to the relevant stakeholders and academic audience throughout this paper publication.
5. CONCLUSION
In order to benchmark the ICT applications’ penetration levels of the Bahraini AEC’s sector, this
study analysed 36 article representing 17 countries, benchmarked 38 individual (28 groups) applications,
constructed a representative ISA RM to the Bahraini sector, and conducted an exploratory Case study to act
as startup case to evaluate the appropriateness of the research instruments for conducting a potential multiple
case study, design the adequacy of a research protocol, determine resources, and formulate research
questions. The benchmark is based on the construction of ISA RM from a Bahraini AEC enterprise and the
evaluation reveals 64% appropriatness.
APPENDIX
Appendix 1-The business architecture (BA)
a. The business units of comp01
Unit id Unit name Unit parent Description
U01 Proprietor or managing
director
Management Setting the tone for enterprise’s management and operations
U02 General deputy
management
Management Running of enterprise’s management and operations
U03 Chief architecture Architecting Designing focusing on all project activities
U04 Senior/junior architecture Architecting Design focus of specific project activities
U05 Drafting Engineering Sktching detailed technical drawings for buidings by a software
U06 Structural engineering Engineering Performing of stability and strength of built structure for buildings
U07 Mechanical engineering Engineering Performing HVAC, piping, and water supply
U08 Electrical engineering Engineering Surveying the site and managing the design of electrical systems
U09 Quantity surveing Quantity
surveying
Performing construction costs and contracts
U10 Tendering Tendering &
contract
Working through tender process and const & maintenance contracts
U11 Municipal liaison Tendering &
contract
A mediation process between the office and the municipality
U12 Project site engineering Supervision Setting out the works in accordance with drawings and specification
U13 Accounting & finance Supporting Control of enterprise’s financial operations and employee relations
U14 HR & administration Supporting Management of human resources within the organization
U15 IT Supporting
(virtual)
Instalation, execution, upgrading, and maintenance of software apps
b. The business actors/roles of comp01
Actor id Actor/Role Description
A/R 01 Proprietor or Managing
Director
An owner/CEO who set the tone for enerprise’s management and operations
A/R 02 General Deputy
Management
An executive person acting in emergency of the CEO unavailabilty
A/R 03 Chief Architect A senior licensed architect having a design focus of all project activities
A/R 04 Senior/junior architect A licensed/non licensed architect having a design focus of specific project activities
A/R 05 Draftsman A person making detailed technical drawings for buildings by utilizing S/W sketches
A/R 06 Structural engineer A trained engineer who calculates the stability and strength of built structures for buildings
A/R 07 Mechanical engineer A specialist in HVAC, piping, and water supply besides acting in middle of other disciplines
A/R 08 Electrical engineer A person who designs high voltage equipment (wiring systems, lighting systems &
generators)
A/R 09 Quantity surveyor A person having an expertise in construction costs and conracts
A/R 10 Plumber A person who coordinates plumbing systems in construction projects
A/R 11 Municipal liaison officier A mediator between the architecture office and the municipality
A/R 12 Project site engineer A person who perfoms technical, organizational, and supervisory role on construction
projects
A/R 13 Accounting Manager A person who supervises and controls enterprise’s financial operations and employee
relations
A/R 14 HR & admin Manager A person who performs time keeping, recruitment, records maintenance, and administration
A/R 15 General Deputy Manager An executive person acting in emergency of the CEO unavailability
14. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
173
c. The business functions of comp01
Process id Process name Description
P01 Scope of work Client and architect define general description of the work, WBS and
scope of services
P02 Agreement Client & architect estimate cost and write agreement
P03 Conceptual design Prepare site plan
P04 Schematic design Develop of master plan
P05 Design development Develop drawings for building permit, Prelim structruralcalc, design of
M.E.P and load calculations
P06 Application of building permit Drawings upload to municipality and preparation of invoice
P07 Detailed design development Develop complete construction drawings and invoice
P08 Tender documents preparation Seek tenders (offers) and design drawings and specifications
P09 Tender & contract awarding Analysis of Tender documents and Selection of contractors baser on
BOQ and schedule
P10 Project site supervision, mgt Planning, monitoring, project controlling, quality control and contract
administration.
d. The business processes of comp01
Func id Function name Description
P01 Managing Budget administration, decision making & meeting with onsultants, clients, engineers
P02 Architecting Designing of building & working with clients to set (objectives, budget & requirements)
P03 Engineering Preforming MEP and quantity surveying roles of construction projects
P04 Tendering & conract award Preforming tendering and award biddings
P05 Supervising Supervision of construction projects
P06 Supporting Accounting & finance, HR & administration, and IT related tasks.
The business services of comp01
Svc id Service name Description
Svc01 Project planning Strategic definition and preparation and brief
Svc02 Architectural design provision Concept, schematic, design development, apply of building
permit and detailed design
Svc03 Tendering & conract admin Tender doc preparation & contract warding
Svc04 Project management, supervision Project site management & project hand over
Appendix 2-The architecture vision document
Steps Tasks Performed
1 Establish the architecture project Enterprise-Specific Procedures:
Explained in Section 2 of Appendix (5)
2 Identify stakeholders, concerns,
and business requirenments
a. Stakeholders:
Based on the formal structure of comp01, the list of stakeholders included the Cief
architect, the Managing director, the Deputy general manager, Architects and
Draftsme. Also, the deputy general manager acting as an IT specialist.
b. Stakeholder Concerns, Issues, and Cultural factors of the architecture:
There were no particular concerns and/or cultural factors that affect the BA.
There were no particular concerns and/or cultural factors that affect the BA.
c. Key business requirements to be addressed in the architecture engagement:
There were no particular requirements that affect the BA.
There were no particular requirements that affect the ISA.
3 Confirm and elaborate business
goals, business drivers, and
constraints
d. Business Goals and Strategic drivers of the organization:
Be a full private enterprise so it gets rid of any governmental bureaucracy.
Seek quality service aside from any official restrictions.
e. Business Constrains of the prganization:
Service Private sector, Target the upper-market segment, Customer’ full payment at
beginning. Recruit less no. of highly qualified staff, has no documented ICT strategy.
4 Evaluate business capabilities f. What baseline capabilities will be needed to fulfil the business goals and drivers:
Managing, Architecting, Engineering: (Drafting, Structure, MEP, Quantity
Surveying), Tendering & Contract Award, Supervision, and Supporting
5 Assess readiness for business
transformation
g. Perform Business Transformation Readiness Assessment:
We don’t intened to evaluate the organization’s readiness to undergo a charge,
6 Define scope h. Define what is inside and what is outside the scope of the Baseline architecture:
− Target scope is excluded.
− Functions, Units, Actors/Roles, Processes and Services are all included.
− Cultural considerations are excluded.
− The Vision and Bussines architecture are the two included architecture domains
7 Confirm and elaboratr architecture
principles, including
Confirmed.
15. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
174
Appendix 3-The worldwide ICT applications in EAC sector
Appendix 4–The protocol document
Sec Topic Content
1 Overview This research aims to collect ICT Application’s corresponding data of the selected AEC (comp01).
2 Field
procedures
1. Selecting an Architectural enterprise (AEC, Grade (A), Welcoming.
2. Requesting for a first visit // by phone calls and emails.
3. Meeting with a representative to explain our research parameters.
3 Research
questions
Q1. What are the ICT applications supporting the Bahraini AEC?
Q1.1 What are the ICT SO supporting the comp01?
Q1.2 What are the ICT applications supporting the Units & Actors/Roles?
Q1.3 What are the ICT applications supporting the Functions?
Q1.4 What are the ICT applications supporting the Processes?
Q1.5 What are the ICT applications supporting the Services?
Q1.6 How to graphically express the relationships?
Q1.7 What is the comparable ICT applications penetration level of comp01 to the world?
4 Data
collection
matrix
Q
#
Research questions Evidence (tools)
Data collection
technique
1 What are the ICT apps supporting the Bahraini AEC Primary Sources:
1) Face-face
interview Qs.
2) Telephone
interview
Secondary
Sources:
1) Literature
Review
2) Documentary
(structure, app)
3) Websites
materials
1.1 What is the ICT S.Obj supporting the comp01? Temp II (A), Apped(2)
1.2 What are ICT apps supporting the Unit & Actors? Temp II (B), Temp III
1.3 What are the ICT apps supporting the Functions? Temp II (C), Temp III
1.4 What are the ICT apps supporting the Processes? Temp II (F), Temp III
1.5 What are the ICT apps supporting the Services? Temp II (E), Temp III
1.6 How to graphically express the relationships?
1.7 What is comparable penetration level to the world? Appendix 1, Appedix 3
5 Template (I) A. Enterprise details table
Ent_id Name Date of collection Interview positions Interviewer
comp01 - Month, Year CEO/owner, Architects, Civil engineers,
PMs
-
16. Int J Inf & Commun Technol ISSN: 2252-8776
Enterprise architecture-based ISA model development for ICT benchmarking in … (Ehab Juma Adwan)
175
Appendix 4–The protocol document (Continued)
Sec Topic Content
6 Template
(II)
A. Organizational SO
Business Obj_id Business objectives IT objectives id IT objectives
BSO 01 ITSO 01
B. Organizational structure and units
Unit _id Unit name U_Parent Unit description Actor/Role ID Actor/Role
U01
C. Business functions
Unit id Fun_id Fun_Name Fun_Description Fun_Classification S. Objective_id
U01 F01 Core / Non-Core
D. Functional decomposition
Unit_id Business Sub-Function_id Business sub-function name Sub-Fun Description
F01 F01-01
E. Business services
Srv_id Service Name Service description Function-ID
SVC01
F. Business processes
Proc-id Proc-name
Proc
description
Proc
class
Proc I/P
Supplier of
i/p
Process o/p
P01
G. Business function to business process matrix
Unit id Business function(s) id Contract Process id
U01 F01 Realizes/owns P01
7 Template
(III)
A1. Baseline applications
Application id Application name Application version Application description Vendor
App 01
B1. Application portfolio summary
Application id Unit id Function id App name App des Bus owner App status
App 01 F01
C1. Application portfolio details
Function id Process id App id Functional component Primary user App type
F01
REFERENCES
[1] K. Hinkelmann, A. Gerber, D. Karagiannis, B. Thoenssen, A. Van Der Merwe, and R. Woitsch, “A new paradigm for the
continuous alignment of business and IT: Combining enterprise architecture modelling and enterprise ontology,” Computers in
Industry, vol. 79, pp. 77–86, Jun. 2016, doi: 10.1016/j.compind.2015.07.009.
[2] ISO, “ISO/IEC/IEEE 42010:2011,” International Organization for Standardization. 2011, Accessed: Jul. 05, 2021. [Online].
Available: https://www.iso.org/standard/50508.html.
[3] M. Alaeddini and S. Salekfard, “Investigating the role of an enterprise architecture project in the business-IT alignment in Iran,”
Information Systems Frontiers, vol. 15, no. 1, pp. 67–88, Oct. 2013, doi: 10.1007/s10796-011-9332-y.
[4] A. M. Clark, B. L. Atkin, M. P. Betts, and D. A. Smith, “Benchmarking the use of IT to support supplier management in
construction,” Electronic Journal of Information Technology in Construction, vol. 4, pp. 1–16, 1999.
[5] Department of Defense, “DODAF - DOD Architecture Framework Version 2.02 - DOD Deputy Chief Information Officer.” 2015,
Accessed: Jul. 05, 2021. [Online]. Available: https://dodcio.defense.gov/Library/DoD-Architecture-
Framework/dodaf20_background/%0Ahttp://dodcio.defense.gov/Library/DoDArchitectureFramework.aspx.
[6] “Federal Enterprise Architecture Framework,” the White House President Barack Obama, 2021.
https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/egov_docs/fea_v2.pdf (accessed Jul. 05, 2021).
[7] J. A. Zachman, “A framework for information systems architecture,” IBM Systems Journal, vol. 26, no. 3, pp. 276–292, 2010, doi:
10.1147/sj.263.0276.
[8] J. L. G. Dietz et al., “The discipline of enterprise engineering,” International Journal of Organisational Design and Engineering,
vol. 3, no. 1, p. 86, 2013, doi: 10.1504/IJODE.2013.053669.
[9] E. J.Adwan and A. Al-Soufi, “A Review of ICT Technology In Construction,” International Journal of Managing Information
Technology, vol. 8, no. 3/4, pp. 01–21, Nov. 2016, doi: 10.5121/ijmit.2016.8401.
[10] E. J.adwan and A. Al-Soufi, “A review of ict applications in construction,” International Journal on Informatics Visualization,
vol. 2, no. 4, pp. 279–285, Aug. 2018, doi: 10.30630/joiv.2.4.163.
[11] R. Cloutier, G. Muller, D. Verma, R. Nilchiani, E. Hole, and M. Bone, “The Concept of Reference Architectures,” Systems
Engineering, p. n/a--n/a, 2009, doi: 10.1002/sys.20129.
[12] K. D. Niemann, “Enterprise Architecture Management and its Role in IT Governance and IT Investment Planning,” in
Information Resources Management, {IGI} Global, 2011, pp. 996–1026.
[13] T. O. Group, “The TOGAF® Standard, 10th Edition,” The Open Group, 2021. https://www.opengroup.org/togaf (accessed Jul.
05, 2021).
[14] S. H. Spewak, Enterprise Architecture Planning, vol. 2, no. 8. John Wiley & Sons: John Wiley & Sons, 1997.
[15] M. R. Dube and S. K. Dixit, “Comprehensive measurement framework for enterprise architectures,” Designing Enterprise
Architecture Frameworks: Integrating Business Processes with IT Infrastructure, vol. 3, no. 4, pp. 1–32, Aug. 2016, doi:
10.5121/ijcsit.2011.3406.
[16] R. O. Thomas, “Understanding the term reference model in information systems research: History, literature analysis and
explanation,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture
Notes in Bioinformatics), vol. 3812 LNCS, Springer Berlin Heidelberg, 2005, pp. 484–496.
[17] A. R. A. Ahmadi, F. Soltani, and M. Gheitasi, “An ICT technical reference model for Iran Universities,” in Proceedings -
International Conference on Information Technology-New Generations, ITNG 2007, Apr. 2007, pp. 537–542, doi:
10.1109/ITNG.2007.33.
17. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 11, No. 2, August 2022: 160-176
176
[18] M. Gammelgård, Å. Lindström, and M. Simonsson, “A reference model for IT management responsibilities,” Oct. 2006, doi:
10.1109/EDOCW.2006.13.
[19] M. Pesic and W. M. van der Aalst, “Towards a reference model for work distribution in workflow management systems,” in
Business Process Reference Models, 2005, p. 30, [Online]. Available:
http://www.researchgate.net/profile/Jan_Recker/publication/27464929_On_the_syntax_of_reference_model_configuration_Trans
forming_the_C-EPC_into_lawful_EPC_models/links/00b4952a9216f58327000000.pdf#page=37.
[20] O. Novotný, “KIT IS/ICT Management Reference Model,” 2007, [Online]. Available:
http://www.cssi.cz/cssi/system/files/all/novotny.pdf.
[21] A. R. Hevner, S. T. March, J. Park, and S. Ram, “Design science in information systems research,” MIS Quarterly: Management
Information Systems, vol. 28, no. 1, pp. 75–105, 2004, doi: 10.2307/25148625.
[22] K. Peffers, T. Tuunanen, M. A. Rothenberger, and S. Chatterjee, “A design science research methodology for information systems
research,” Journal of Management Information Systems, vol. 24, no. 3, pp. 45–77, Dec. 2007, doi: 10.2753/MIS0742-
1222240302.
[23] R. K.Yin, “Case study research and applications: Design and methods,” Journal of Hospitality & Tourism Research, vol. 53, no.
5. pp. 277–278, Jun. 2018, [Online]. Available: https://us.sagepub.com/en-us/nam/case-study-research-and-
applications/book250150.
[24] M. Shakir, “The selection of case studies: Strategies and their applications to IS implementation cases studies. Maha Shakir,”
Research Letters in the Information and Mathematical Sciences, vol. 3, no. 3, pp. 191–198, 2002, [Online]. Available:
http://hdl.handle.net/10179/4373.
[25] A. Bryman, Social Research Methods, Fifth Edit. London: Oxford University Press, 2016.
[26] J. W. Creswell, Qualitative Inquiry & Research Design: choosing among five approaches, vol. 2. 2007.
[27] J. Ritchie, J. Lewis, C. M. Nicholls, and R. Ormston, “Qualitative research practice: a guide for social science students and
researchers,” Choice Reviews Online, vol. 41, no. 03, pp. 41-1319-41–1319, Nov. 2003, doi: 10.5860/CHOICE.41-1319.
[28] A. Habibi, A. Sarafrazi, and S. Izadyar, “Delphi technique theoretical framework in qualitative research,” The International
Journal Of Engineering And Science (IJES), vol. 3, no. 4, pp. 8–13, 2014.
[29] J. Iden, B. Tessem, and T. Päivärinta, “Problems in the interplay of development and IT operations in system development
projects: A Delphi study of Norwegian IT experts,” Information and Software Technology, vol. 53, no. 4, pp. 394–406, Apr. 2011,
doi: 10.1016/j.infsof.2010.12.002.
[30] N. Elangovan and R. Rajendran, “Conceptual model: A framework for institutionalizing the vigor in business research,” Indian
Business Management, no. 4, pp. 1–32, 2015, [Online]. Available:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3515944Jun2.
BIOGRAPHIES OF AUTHORS
Ehab Juma Adwan is an Assistant professor of Information Systems at the
University of Bahrain. He earned a Ph.D. in Computer Science & Engineering,2016 from the
University of Bahrain (UOB), with advanced PG degree from George Mason University,
USA. He earned a PG.D. in computing,2008, from the University of York, UK. He earned an
M.Sc. in Computer Science, 2004, University of Bahrain (UOB), and earned his B.Sc. in
Electronics & Computer Science in 1996 from The American University in Cairo (AUC). His
research is focused on Enterprise Architecture, IS Architecture, SW Architecture, Systems
Eng, and Systems Analysis & Design. Currently, most of his postgraduate supervision
emphasis is on ICT in Smart City, Cloud computing, ICT in Construction, and Mobile app
development. He can be contacted at email: eadwan@uob.edu.bh.
Ali Al-Soufi is an x-Associate professor of Information Systems at University of
Bahrain. He has earned his PhD in computer science in 1994 from Nottingham University,
UK. Worked for Bahrain Telecom Co for 8 years as a Senior Manager Application
Programme, where he overlooked number of mega IS Application projects. Worked at Arab
Open University as Director of IT program & Assistant Director for Business Development
during 2007-2010. He is a PT consultant in Bahrain Information and e-Government Authority
(iGA) in the area of Enterprise Architecture and Strategic Planning. He is an active member of
the Bahrain National ICT Governance Committee. His specializations are Strategic IT
Planning and Governance, IT project management, Enterprise Architecture and Information
Systems in Organization. He can be contacted at email: ali.alsoufi@gmail.com.