Literature Review on Social Networking in Supply chainSujoy Bag
This document provides a literature review on social networking in supply chains. It begins with an introduction discussing how social media influences purchase decisions and how products gain popularity through social influence. The objective is to reduce uncertainty and delay to maximize profit and utility. The literature review then summarizes several academic papers from 2008-2016 addressing topics like influence maximization in networks, learning to coordinate in social networks, competing over networks, and using social networks to optimize demand forecasting and pricing. References are provided at the end.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
An improvised model for identifying influential nodes in multi parameter soci...csandit
Influence Maximization is one of the major tasks in the field of viral marketing and community
detection. Based on the observation that social networks in general are multi-parameter graphs
and viral marketing or Influence Maximization is based on few parameters, we propose to
convert the general social networks into “interest graphs”. We have proposed an improvised
model for identifying influential nodes in multi-parameter social networks using these “interest
graphs”. The experiments conducted on these interest graphs have shown better results than the
method proposed in [8].
This document discusses e-recruitment practices in Malaysia. It begins with an introduction to e-recruitment and how it has been adopted by government agencies in Malaysia. It then discusses traditional recruitment methods and compares them to e-recruitment. The pros of e-recruitment include reaching a large target audience, being cost effective, and saving time. However, the cons include possible discrimination of groups without computer access and difficulties recruiting executive-level positions. The document provides examples of e-recruitment systems used by the Malaysian government.
This document discusses different approaches for analyzing social media data to gain customer insights:
1) Channel reporting tools provide overviews of specific social media platforms but lack deeper insights.
2) Scorecard systems aggregate data across sources but users cannot enhance the data.
3) Text mining analyzes sentiment but network analysis examines relationships; each technique has limitations alone.
4) The document proposes combining text mining, network analysis, and other techniques using a predictive analytics platform to generate new insights, as was done successfully for a major European telecom company.
It provides examples analyzing publicly available Slashdot data to identify influencers and show how sentiment relates to influence.
Protecting big data mining association rules using fuzzy systemTELKOMNIKA JOURNAL
Recently, big data is granted to be the solution to opening the subsequent large fluctuations of
increase in fertility. Along with the growth, it is facing some of the challenges. One of the significant
problems is data security. While people use data mining methods to identify valuable information following
massive database, people further hold the necessary to maintain any knowledge so while not to be worked
out, like delicate common itemsets, practices, taxonomy tree and the like Association rule mining can
make a possible warning approaching the secrecy of information. So, association rule hiding methods are
applied to evade the hazard of delicate information misuse. Various kinds of investigation already prepared
on association rule protecting. However, maximum of them concentrate on introducing methods with a
limited view outcome for inactive databases (with only existing information), while presently
the researchers facing the problem with continuous information. Moreover, in the era of big data, this is
essential to optimize current systems to be suited concerning the big data. This paper proposes
the framework is achieving the data anonymization by using fuzzy logic by supporting big data mining.
The fuzzy logic grouping the sensitivity of the association rules with a suitable association level. Moreover,
parallelization methods which are inserted in the present framework will support fast data mining process.
Designing Cybersecurity Policies with Field ExperimentsGene Moo Lee
This document summarizes Gene Moo Lee's research on using randomized field experiments to evaluate the effectiveness of cybersecurity policies at the organizational level. The research aims to set up an independent institution to monitor organizations' cybersecurity levels and evaluate how information disclosure impacts behavior. The experiment involved randomly assigning over 7,900 US organizations to control, private disclosure, or public disclosure treatment groups. Preliminary results found that private disclosure did not change behavior but public disclosure via a website reduced spam volumes, especially for organizations that initially had large spam volumes or less competition. Further analysis of the effects is ongoing.
Survey of data mining techniques for socialFiras Husseini
This document summarizes data mining techniques that have been used for social network analysis. It discusses how social networks generate massive amounts of data that present computational challenges due to their size, noise, and dynamism. It then reviews both traditional and recent unsupervised, semi-supervised, and supervised data mining techniques that have been applied to social network analysis to handle these challenges and discover useful knowledge from social network data, including graph theoretic techniques, tools for analyzing opinions and sentiment, and techniques for topic detection and tracking.
Literature Review on Social Networking in Supply chainSujoy Bag
This document provides a literature review on social networking in supply chains. It begins with an introduction discussing how social media influences purchase decisions and how products gain popularity through social influence. The objective is to reduce uncertainty and delay to maximize profit and utility. The literature review then summarizes several academic papers from 2008-2016 addressing topics like influence maximization in networks, learning to coordinate in social networks, competing over networks, and using social networks to optimize demand forecasting and pricing. References are provided at the end.
Heterogeneity and the Dynamics of Technology AdoptionVideoguy
This paper analyzes heterogeneity in technology adoption using data on the adoption of videoconferencing software within a large bank. The bank took a hands-off approach to adoption, allowing employees to choose whether and when to adopt the technology. The paper develops a dynamic model of adoption and network use, allowing for heterogeneity across employees. It estimates the model and finds significant heterogeneity - different employee types have different adoption costs and network benefits. Targeting a specific employee type for early adoption leads to faster overall diffusion than uniform adoption. Heterogeneity is important for understanding technology adoption and optimal policies.
An improvised model for identifying influential nodes in multi parameter soci...csandit
Influence Maximization is one of the major tasks in the field of viral marketing and community
detection. Based on the observation that social networks in general are multi-parameter graphs
and viral marketing or Influence Maximization is based on few parameters, we propose to
convert the general social networks into “interest graphs”. We have proposed an improvised
model for identifying influential nodes in multi-parameter social networks using these “interest
graphs”. The experiments conducted on these interest graphs have shown better results than the
method proposed in [8].
This document discusses e-recruitment practices in Malaysia. It begins with an introduction to e-recruitment and how it has been adopted by government agencies in Malaysia. It then discusses traditional recruitment methods and compares them to e-recruitment. The pros of e-recruitment include reaching a large target audience, being cost effective, and saving time. However, the cons include possible discrimination of groups without computer access and difficulties recruiting executive-level positions. The document provides examples of e-recruitment systems used by the Malaysian government.
This document discusses different approaches for analyzing social media data to gain customer insights:
1) Channel reporting tools provide overviews of specific social media platforms but lack deeper insights.
2) Scorecard systems aggregate data across sources but users cannot enhance the data.
3) Text mining analyzes sentiment but network analysis examines relationships; each technique has limitations alone.
4) The document proposes combining text mining, network analysis, and other techniques using a predictive analytics platform to generate new insights, as was done successfully for a major European telecom company.
It provides examples analyzing publicly available Slashdot data to identify influencers and show how sentiment relates to influence.
Protecting big data mining association rules using fuzzy systemTELKOMNIKA JOURNAL
Recently, big data is granted to be the solution to opening the subsequent large fluctuations of
increase in fertility. Along with the growth, it is facing some of the challenges. One of the significant
problems is data security. While people use data mining methods to identify valuable information following
massive database, people further hold the necessary to maintain any knowledge so while not to be worked
out, like delicate common itemsets, practices, taxonomy tree and the like Association rule mining can
make a possible warning approaching the secrecy of information. So, association rule hiding methods are
applied to evade the hazard of delicate information misuse. Various kinds of investigation already prepared
on association rule protecting. However, maximum of them concentrate on introducing methods with a
limited view outcome for inactive databases (with only existing information), while presently
the researchers facing the problem with continuous information. Moreover, in the era of big data, this is
essential to optimize current systems to be suited concerning the big data. This paper proposes
the framework is achieving the data anonymization by using fuzzy logic by supporting big data mining.
The fuzzy logic grouping the sensitivity of the association rules with a suitable association level. Moreover,
parallelization methods which are inserted in the present framework will support fast data mining process.
Designing Cybersecurity Policies with Field ExperimentsGene Moo Lee
This document summarizes Gene Moo Lee's research on using randomized field experiments to evaluate the effectiveness of cybersecurity policies at the organizational level. The research aims to set up an independent institution to monitor organizations' cybersecurity levels and evaluate how information disclosure impacts behavior. The experiment involved randomly assigning over 7,900 US organizations to control, private disclosure, or public disclosure treatment groups. Preliminary results found that private disclosure did not change behavior but public disclosure via a website reduced spam volumes, especially for organizations that initially had large spam volumes or less competition. Further analysis of the effects is ongoing.
Survey of data mining techniques for socialFiras Husseini
This document summarizes data mining techniques that have been used for social network analysis. It discusses how social networks generate massive amounts of data that present computational challenges due to their size, noise, and dynamism. It then reviews both traditional and recent unsupervised, semi-supervised, and supervised data mining techniques that have been applied to social network analysis to handle these challenges and discover useful knowledge from social network data, including graph theoretic techniques, tools for analyzing opinions and sentiment, and techniques for topic detection and tracking.
Strategic Network Formation in a Location-Based Social NetworkGene Moo Lee
This document summarizes Gene Moo Lee's presentation on strategic network formation in location-based social networks. It introduces three research questions about how mobile users form friendships and measures user similarity. It then provides an overview of Lee's structural model of network formation, approach to measuring user similarity using topic models, and empirical analysis using a large LBSN dataset to examine how different factors influence friendship links.
1. The document discusses the potential uses of social media analytics in local government. It identifies four main purposes: communication, public relations, customer services, and public consultation/engagement.
2. It details a research project with two UK city councils that included a workshop introducing social media analytics tools and interviews. The workshop aimed to demonstrate tools and generate reflection on their value.
3. Interview findings suggested analytics could provide insights supplementing existing knowledge of public networks and discussions. Tools were seen as potentially valuable across different council departments.
Framework for Securing Educational E-Government Serviceijcisjournal
Enhancement in technology is leading to a change in the way governments, individuals, institutions and
business entities provide quality services to the citizen. Today's education system plays crucial role for
developing cognizance in society so e-government service is obliged to integrate with educational system.
In this work we proposed a novel framework for integrating educational service within e-government
services. One of the main tasks of this paper is to explore or propose a Secure Examination Management
System (SEMS). The system has been designed using cryptographic primitives, which enables students to
take the exam from anywhere. The student is allowed to take the exam after he gives his necessary
authentication details. In SEMS, it is important to exclude false students while ensuring the privacy for the
honest students. It allows evaluators to share student examination papers for evaluation with proper
authentication. This is done using digital signatures, authentication and confidentiality provided by public
key cryptographic system.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
A LINK-BASED APPROACH TO ENTITY RESOLUTION IN SOCIAL NETWORKScsandit
Social networks initially had been places for people to contact each other, find friends or new
acquaintances. As such they ever proved interesting for machine aided analysis. Recent
developments, however, pivoted social networks to being among the main fields of information
exchange, opinion expression and debate. As a result there is growing interest in both analyzing
and integrating social network services. In this environment efficient information retrieval is
hindered by the vast amount and varying quality of the user-generated content. Guiding users to
relevant information is a valuable service and also a difficult task, where a crucial part of the
process is accurately resolving duplicate entities to real-world ones. In this paper we propose a
novel approach that utilizes the principles of link mining to successfully extend the methodology
of entity resolution to multitype problems. The proposed method is presented using an
illustrative social network-based real-world example and validated by comprehensive
evaluation of the results.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
The document discusses sampling techniques for online social networks. It proposes using an outlier indexing algorithm to sample large datasets from social networks. The key advantages of this approach are that random samples can be used for a wide range of analytical tasks and outlier detection. The paper also reviews related literature on estimating search tree sizes and sampling nodes in social networks. It then presents the proposed outlier indexing sampling algorithm for compressing social network structure and interest correlations across users.
The document analyzes actor networks involved in climate change adaptation in Bhutan. It finds that while national actors are relatively well embedded in top-down networks, both top-down and bottom-up networks suffer from fragmentation. The analysis also finds evidence of clustering by actor type, with national actors forming the core network. The document recommends a hybrid "polycentric" governance approach to increase local actor inclusion, vertical and horizontal collaboration, and reduce fragmentation between actor networks.
IRJET- Review on Different Recommendation Techniques for GRS in Online Social...IRJET Journal
This document reviews different recommendation techniques for group recommender systems (GRS) in online social networks. It discusses traditional recommender approaches like content-based filtering and collaborative filtering. It also reviews related work applying opinion dynamics models and weight matrices to GRS. The document concludes that using a smart weights matrix to consider relationships between group members' preferences in a recommendation process improves aggregation and ensures consensus, providing the best way to recommend items to a complete group.
Policy resolution of shared data in online social networks IJECEIAES
Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...IAEME Publication
The present study explores the Information literacy competencies and skills among
the faculty members of engineering colleges in vijayapura. A survey method of
research was used for the present study where in structured questionnaire was
designed for the purpose of data collection. 150 questionnaires were distributed
among the faculty of engineering colleges of BLDE and SECAB faculty members. The
present paper aims to highlight the knowledge about skills of the information literacy
that allows faculty to searching and locating and evaluation, and uses the information
.The study found that majority of the faculty have better knowledge and skills about
uses different types of sources and resources and different kind of tools and services
respects in their fields
PERSONALIZED INFLUENTIAL TOPIC SEARCH VIA SOCIAL NETWORK SUMMARIZATIONNexgen Technology
This document discusses personalized influential topic search via social network summarization. It proposes extracting representative users from a social network as a social summarization for a given topic, to measure topics' influence at a similar scale. Two random walk based approaches are developed for effective topic-aware social summarization: random clustering and an L-length random walk. This social summarization can then be used to efficiently find the top-k most influential topics related to a user's query. The approaches are evaluated on real-world datasets and shown to be effective and efficient for personalized influential topic search in social networks.
Big Data Analytics : A Social Network ApproachAndry Alamsyah
This document discusses using social network analysis approaches for big data analytics. It begins by introducing social network metrics like centrality and modularity that can be applied to large social network datasets. It then provides examples of how social network analysis has been used to detect terrorist cells and identify research communities. Finally, it outlines the author's research interests and publications in areas like sentiment analysis on social media and using social networks to analyze industries.
IRJET- Android Application for Service by using Bidding and Ratings in nearby...IRJET Journal
This document describes an Android application that allows users to search for and request services from nearby service providers using a bidding system. The application displays service providers with their ratings to help users identify the most reliable options. Users can view the service providers' cost estimates and select the best option for their needs. After a service is completed, the user can provide a rating for that service provider. The goal is to provide a more efficient way for users to find and compare local service providers based on both price and quality.
This report examines the Internet's impact on India's economy. It finds that 120 million Indians currently use the Internet, the third largest user base worldwide. However, Internet penetration remains low in India, at only 10 users per 100 people, compared to 34 users in other aspiring developing countries. The report estimates that the Internet currently contributes around $30 billion to India's GDP, or about 1.6% of GDP. It also explores how various groups in India like businesses, government, and consumers are using and being transformed by the Internet. It concludes by discussing opportunities for India to further increase Internet access and capture more of its economic and social benefits.
IRJET- Shopping Mall Experience using Beacon TechnologyIRJET Journal
The document proposes a system that uses beacon technology to track customers in retail shops and provide personalized discounts based on their shopping patterns. Beacons set up in shops would detect customers' locations via Bluetooth signals from their smartphones. This information would be sent to a server to analyze customers' purchase histories and send personalized offers. The system aims to improve customers' shopping experiences and increase retailers' sales by offering targeted discounts to customers based on their identified preferences and shopping behaviors.
E business an appraisal in enhancing accountability in service delivery and e...Alexander Decker
1) The document discusses the impacts of e-business on accountability in service delivery, productivity, and economic growth. It reviews previous literature that has examined both the positive and negative environmental effects of e-commerce.
2) The literature review finds that e-business can increase productivity and efficiency within companies by up to 60%, and that it has the potential to reduce waste, inventory needs, and the use of paper. However, e-commerce may also increase transportation and packaging waste from shipping.
3) The document examines how e-business impacts accountability in service delivery through identity management and proposes requirements for identity services to provide accountability, such as properly assessing identity data and maintaining identity information over long periods of time.
This document discusses Micro, Small, and Medium Enterprises (MSMEs) in India. It defines MSMEs based on the number of employees and investment levels. In India, MSMEs are defined by investment levels in plant/machinery or equipment, with micro enterprises having less than 25 lakh investment, small between 25 lakh to 5 crore, and medium more than 5 crore to 10 crore. MSMEs make up 13 million units employing over 42 million people and contribute significantly to manufacturing, exports, and GDP. The government supports MSMEs through various schemes for credit, technology, marketing, exports, and cluster development.
The document summarizes the key aspects of the Micro, Small and Medium Enterprises Development Act passed by the Government of India in 2006. Some highlights include expanded definitions and limits for micro, small and medium enterprises based on plant and machinery investment, classification of micro and small enterprises under priority sector lending, guidelines around loan applications, security aspects, and methodologies for calculating working capital and term loan financing.
Strategic Network Formation in a Location-Based Social NetworkGene Moo Lee
This document summarizes Gene Moo Lee's presentation on strategic network formation in location-based social networks. It introduces three research questions about how mobile users form friendships and measures user similarity. It then provides an overview of Lee's structural model of network formation, approach to measuring user similarity using topic models, and empirical analysis using a large LBSN dataset to examine how different factors influence friendship links.
1. The document discusses the potential uses of social media analytics in local government. It identifies four main purposes: communication, public relations, customer services, and public consultation/engagement.
2. It details a research project with two UK city councils that included a workshop introducing social media analytics tools and interviews. The workshop aimed to demonstrate tools and generate reflection on their value.
3. Interview findings suggested analytics could provide insights supplementing existing knowledge of public networks and discussions. Tools were seen as potentially valuable across different council departments.
Framework for Securing Educational E-Government Serviceijcisjournal
Enhancement in technology is leading to a change in the way governments, individuals, institutions and
business entities provide quality services to the citizen. Today's education system plays crucial role for
developing cognizance in society so e-government service is obliged to integrate with educational system.
In this work we proposed a novel framework for integrating educational service within e-government
services. One of the main tasks of this paper is to explore or propose a Secure Examination Management
System (SEMS). The system has been designed using cryptographic primitives, which enables students to
take the exam from anywhere. The student is allowed to take the exam after he gives his necessary
authentication details. In SEMS, it is important to exclude false students while ensuring the privacy for the
honest students. It allows evaluators to share student examination papers for evaluation with proper
authentication. This is done using digital signatures, authentication and confidentiality provided by public
key cryptographic system.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
A LINK-BASED APPROACH TO ENTITY RESOLUTION IN SOCIAL NETWORKScsandit
Social networks initially had been places for people to contact each other, find friends or new
acquaintances. As such they ever proved interesting for machine aided analysis. Recent
developments, however, pivoted social networks to being among the main fields of information
exchange, opinion expression and debate. As a result there is growing interest in both analyzing
and integrating social network services. In this environment efficient information retrieval is
hindered by the vast amount and varying quality of the user-generated content. Guiding users to
relevant information is a valuable service and also a difficult task, where a crucial part of the
process is accurately resolving duplicate entities to real-world ones. In this paper we propose a
novel approach that utilizes the principles of link mining to successfully extend the methodology
of entity resolution to multitype problems. The proposed method is presented using an
illustrative social network-based real-world example and validated by comprehensive
evaluation of the results.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
The document discusses sampling techniques for online social networks. It proposes using an outlier indexing algorithm to sample large datasets from social networks. The key advantages of this approach are that random samples can be used for a wide range of analytical tasks and outlier detection. The paper also reviews related literature on estimating search tree sizes and sampling nodes in social networks. It then presents the proposed outlier indexing sampling algorithm for compressing social network structure and interest correlations across users.
The document analyzes actor networks involved in climate change adaptation in Bhutan. It finds that while national actors are relatively well embedded in top-down networks, both top-down and bottom-up networks suffer from fragmentation. The analysis also finds evidence of clustering by actor type, with national actors forming the core network. The document recommends a hybrid "polycentric" governance approach to increase local actor inclusion, vertical and horizontal collaboration, and reduce fragmentation between actor networks.
IRJET- Review on Different Recommendation Techniques for GRS in Online Social...IRJET Journal
This document reviews different recommendation techniques for group recommender systems (GRS) in online social networks. It discusses traditional recommender approaches like content-based filtering and collaborative filtering. It also reviews related work applying opinion dynamics models and weight matrices to GRS. The document concludes that using a smart weights matrix to consider relationships between group members' preferences in a recommendation process improves aggregation and ensures consensus, providing the best way to recommend items to a complete group.
Policy resolution of shared data in online social networks IJECEIAES
Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.
INFORMATION LITERACY COMPETENCE AND SKILLS AMONG FACULTY MEMBERS OF BLDE AND ...IAEME Publication
The present study explores the Information literacy competencies and skills among
the faculty members of engineering colleges in vijayapura. A survey method of
research was used for the present study where in structured questionnaire was
designed for the purpose of data collection. 150 questionnaires were distributed
among the faculty of engineering colleges of BLDE and SECAB faculty members. The
present paper aims to highlight the knowledge about skills of the information literacy
that allows faculty to searching and locating and evaluation, and uses the information
.The study found that majority of the faculty have better knowledge and skills about
uses different types of sources and resources and different kind of tools and services
respects in their fields
PERSONALIZED INFLUENTIAL TOPIC SEARCH VIA SOCIAL NETWORK SUMMARIZATIONNexgen Technology
This document discusses personalized influential topic search via social network summarization. It proposes extracting representative users from a social network as a social summarization for a given topic, to measure topics' influence at a similar scale. Two random walk based approaches are developed for effective topic-aware social summarization: random clustering and an L-length random walk. This social summarization can then be used to efficiently find the top-k most influential topics related to a user's query. The approaches are evaluated on real-world datasets and shown to be effective and efficient for personalized influential topic search in social networks.
Big Data Analytics : A Social Network ApproachAndry Alamsyah
This document discusses using social network analysis approaches for big data analytics. It begins by introducing social network metrics like centrality and modularity that can be applied to large social network datasets. It then provides examples of how social network analysis has been used to detect terrorist cells and identify research communities. Finally, it outlines the author's research interests and publications in areas like sentiment analysis on social media and using social networks to analyze industries.
IRJET- Android Application for Service by using Bidding and Ratings in nearby...IRJET Journal
This document describes an Android application that allows users to search for and request services from nearby service providers using a bidding system. The application displays service providers with their ratings to help users identify the most reliable options. Users can view the service providers' cost estimates and select the best option for their needs. After a service is completed, the user can provide a rating for that service provider. The goal is to provide a more efficient way for users to find and compare local service providers based on both price and quality.
This report examines the Internet's impact on India's economy. It finds that 120 million Indians currently use the Internet, the third largest user base worldwide. However, Internet penetration remains low in India, at only 10 users per 100 people, compared to 34 users in other aspiring developing countries. The report estimates that the Internet currently contributes around $30 billion to India's GDP, or about 1.6% of GDP. It also explores how various groups in India like businesses, government, and consumers are using and being transformed by the Internet. It concludes by discussing opportunities for India to further increase Internet access and capture more of its economic and social benefits.
IRJET- Shopping Mall Experience using Beacon TechnologyIRJET Journal
The document proposes a system that uses beacon technology to track customers in retail shops and provide personalized discounts based on their shopping patterns. Beacons set up in shops would detect customers' locations via Bluetooth signals from their smartphones. This information would be sent to a server to analyze customers' purchase histories and send personalized offers. The system aims to improve customers' shopping experiences and increase retailers' sales by offering targeted discounts to customers based on their identified preferences and shopping behaviors.
E business an appraisal in enhancing accountability in service delivery and e...Alexander Decker
1) The document discusses the impacts of e-business on accountability in service delivery, productivity, and economic growth. It reviews previous literature that has examined both the positive and negative environmental effects of e-commerce.
2) The literature review finds that e-business can increase productivity and efficiency within companies by up to 60%, and that it has the potential to reduce waste, inventory needs, and the use of paper. However, e-commerce may also increase transportation and packaging waste from shipping.
3) The document examines how e-business impacts accountability in service delivery through identity management and proposes requirements for identity services to provide accountability, such as properly assessing identity data and maintaining identity information over long periods of time.
This document discusses Micro, Small, and Medium Enterprises (MSMEs) in India. It defines MSMEs based on the number of employees and investment levels. In India, MSMEs are defined by investment levels in plant/machinery or equipment, with micro enterprises having less than 25 lakh investment, small between 25 lakh to 5 crore, and medium more than 5 crore to 10 crore. MSMEs make up 13 million units employing over 42 million people and contribute significantly to manufacturing, exports, and GDP. The government supports MSMEs through various schemes for credit, technology, marketing, exports, and cluster development.
The document summarizes the key aspects of the Micro, Small and Medium Enterprises Development Act passed by the Government of India in 2006. Some highlights include expanded definitions and limits for micro, small and medium enterprises based on plant and machinery investment, classification of micro and small enterprises under priority sector lending, guidelines around loan applications, security aspects, and methodologies for calculating working capital and term loan financing.
This presentation gives an overview of the Micro, Small & Medium Enterprise sector in the state of Gujarat as well as India. While detailing the various incentives & schemes given by the government to different MSMEs, the presentation makes a strong case for growth of MSMEs in the state through the assistance provided by the government under Industrial policy 2015
Facilitated diffusion is the passive transport of molecules across a cell membrane using carrier proteins. There are two main types of carrier proteins: carrier proteins that bind to specific molecules and undergo a conformational change to transport them across the membrane, and ion channels that have pores lined with charged groups to transport ions. Facilitated diffusion is saturated at high concentration differences because there are a limited number of carrier proteins.
Spurring Small Business Use of Technology and Driving BenefitsAnn Treacy
This document summarizes a presentation by Strategic Networks Group (SNG) about spurring small business use of technology. SNG measures broadband use and its economic impacts. Their research shows that while broadband availability is important, utilization is what drives economic growth. Increasing a business's utilization of internet applications by 10% can increase revenues by 24% and decrease costs by 7%. SNG works with clients to develop strategies to increase broadband utilization and deliver economic benefits through a program that provides businesses with assessments of their technology use and recommendations.
In today's sales world, technology is your friend. Without it, life is short, brutish and nasty as it was for the neanderthals!
Learn how to combine those tried and true sales tools with today's technology based tools to get the most out of all your sales activities.
There is no magic bullet, but there is a very straight path to successful sales results for those who learn to work multiple sales techniques.
Dr. John Blakemore argues that Australia needs to focus on innovation and technology to drive growth and address its economic challenges. He discusses how innovation saved his eyesight and could help solve other problems. Blakemore advocates for engineers and scientists to think differently and challenge the status quo by applying their skills to issues in other fields to develop new solutions and industries for Australia.
This study investigated the role of mutations outside of the embB306 codon in conferring resistance to the first-line antituberculosis drug ethambutol (EMB). Through in vitro selection and allelic exchange techniques, the authors generated EMB-resistant Mycobacterium tuberculosis isolates with mutations in embB, embC and embA genes. They found that individual mutations conferred low to moderate increases in EMB minimum inhibitory concentrations. Specifically, isogenic mutants with embB497 and embB406 mutations showed 6-fold and 3- to 3.5-fold increases in EMB MICs, respectively. However, high-level EMB resistance likely requires mutations in additional unknown loci. This demonstrates that non-emb
The Use of Information and Communication Technology (ICT) and Business Manage...Dr. Nazrul Islam
Information and Communication Technology (ICT) is an integral part of business management now-a-day. It is inevitable for the smooth running of business irrespective of size and complexity all over the world. Due to the rapid development of ICT and its huge use in all spheres of our lives, businesses are also influenced by it. Now, businesses are managing their resources by using ICT support that is helping them to perform their tasks faster and accurate than before. But the developing countries like Bangladesh are still struggling to introduce ICT supports in all areas of businesses. But due to a very strong culture at work place, this effort is hindered substantially. Therefore, this paper aims at identifying the present status of the use of ICT in business management and its challenges it faces. Secondary data have been primarily used for conducting this study which was collected from the different business reports and the journal papers. An experience survey was also conducted among the senior administrators of the business houses were also included in the study. Results show that the use of ICT is very low in the small and medium business enterprises while the large businesses houses are using ICT supports. Results also show that the use of ICT primarily depends on the complexity and the nature of the business. The entrepreneurs who have ICT literacy, they are mostly using ICT supports in the management of their businesses. This study suggests that the business houses in Bangladesh should use ICT support in order to increase the efficiency at their work. But this is often depends on the ICT infrastructure of the country as a whole.
ROLE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IN THE SURVIVAL OF SMA...ijmpict
This study is to examine the role of ICT in the survival of selected SMEsin Koforidua, Ghana The study employed descriptive technique to conduct the survey. Using a sample of 100 SMEs, an accidental sampling of a non-probability technique was used to gathered data and information. The study argues out that majority of the SMEs operators do use at least one ICT tool in supporting their operations within the New Juaben Municipality. The study revealed that ICT is good and helps business survival in difficult times and become competitive in support of literature reviewed. The study suggested that periodic training in the form of workshops and sensitization programs on the benefits and the use ICT resources in business growth strategies should be organized by National Board for Small-Scale Industries (NBSSI). SME operators, can also outsource their ICT delivery systems by engaging ICT consultants in order to avoid the problem of funding relating to the setting up of their own ICT system which usually requires huge initial capital outlay.The primary policy recommendation arising out of this is that applications for SMEs need to be developed using mobile phones.
ROLE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IN THE SURVIVAL OF SMA...ijmpict
This study is to examine the role of ICT in the survival of selected SMEsin Koforidua, Ghana The study employed descriptive technique to conduct the survey. Using a sample of 100 SMEs, an accidental sampling of a non-probability technique was used to gathered data and information. The study argues out that majority of the SMEs operators do use at least one ICT tool in supporting their operations within the New Juaben Municipality. The study revealed that ICT is good and helps business survival in difficult times and become competitive in support of literature reviewed. The study suggested that periodic training in the form of workshops and sensitization programs on the benefits and the use ICT resources in business growth strategies should be organized by National Board for Small-Scale Industries (NBSSI). SME operators, can also outsource their ICT delivery systems by engaging ICT consultants in order to avoid the problem of funding relating to the setting up of their own ICT system which usually requires huge initial capital outlay.The primary policy recommendation arising out of this is that applications for SMEs need to be developed using mobile phones.
This document summarizes an article that discusses the untapped opportunities for small and medium enterprises (SMEs) in Zanzibar to utilize information and communication technologies (ICT). It finds that while ICT use has become important for businesses, SMEs in Zanzibar have yet to fully take advantage of ICT opportunities. The article reviews literature on the roles and importance of SMEs, current ICT practices in Zanzibar, and the opportunities at operational, tactical, and strategic levels that adopting ICT could provide SMEs, such as improved communication, decision making, marketing and competitiveness. It concludes that greater ICT adoption by SMEs could significantly contribute to Zanzibar's
A comparative analysis of cost and benefit of using information technology in...Alexander Decker
This document summarizes a research study on analyzing the costs and benefits of using information technology in corporate institutions. The study used surveys of 120 IT employees from various sectors to collect data on the costs and benefits of IT use. The key costs identified include hiring and training IT staff, maintaining equipment, staff compensation, utility bills for IT equipment, and royalties. The main benefits included improved communication, increased production speed, faster service delivery, improved marketing avenues, better customer access, higher productivity, and increased market share. The study aimed to quantify these costs and benefits to determine the overall financial impact of IT use and identify how organizations can measure this impact.
Information and Communication Technology (ICT) is an integral part of business management now-a-day. It is inevitable for the smooth running of business irrespective of size and complexity. Due to the rapid development of ICT and its huge use in all spheres of our lives, businesses are also substantially influenced by it. Now, the resources of the businesses are primarily managed by using ICT supports that helps perform tasks faster and more accurate than before. But the developing countries are still struggling to introduce ICT supports in all areas of business management processes as the effort is substantially hindered by a strong but ineffective work culture. Therefore, to use ICT in business management we need to know the issues and challenges of it.
Information and communication technology (ICT) brings numerous benefits to small and medium enterprises (SMEs) by helping tasks be performed faster and more accurately. However, SMEs in developing countries face challenges in fully utilizing ICT due to issues like a lack of necessary internal skills, high costs of implementation, and insufficient telecommunication infrastructure and access to relevant ICT advice. Addressing these challenges by improving ICT education and infrastructure would help SMEs better integrate ICT into management and gain greater efficiencies.
The document discusses the relevance of information technology in the effective management of small and medium enterprises (SMEs) in Lagos, Nigeria. It finds that the use of information technology by SME managements can help improve productivity, market shares, and management effectiveness. However, SMEs in Nigeria have yet to fully harness the benefits of information technology for functions like efficient management, customer service, and business operations. The study recommends education and training to increase awareness and literacy of information technology among SME managers and employees.
Can ICT Reduce Poverty and Unemployment and Elevate Development Integrating M...Dr. Amarjeet Singh
Information and Communication Technology
(ICT) can boost the performance of people and improve
overall human capital for the alleviation of poverty in a
society. Today, ICT is considered as one of the major
sources of driving force for the overall economic
development integrating with Micro, Small and Medium
Enterprises (MSMEs). The e-Commerce has a great role in
achieving business performance in the emerging Asian
countries. However, MSMEs are experiencing more
challenges that prevent them from further increasing their
business. The earlier studies question to which extent
MSMEs have benefited from these businesses. Therefore,
the main purpose of this study is to demonstrate the
importance of ICT in developing MSMEs based on the
success stories of emerging Asian countries. This study
based on subjective/argumentative i.e., idea generation in
Information Systems (IS). The findings of the study reveal
that the MSMEs utilizing ICT can alleviate poverty and
unemployment. It also reveals that MSMEs with ICT and
e-Commerce can enhance employment and new job
creation that can contribute to the overall economic
development. This study is expected to extend for further
an empirical investigation broadly on the same issue to
validate the research results.
Top Cited Articles International Journal of Managing Information Technology (...IJMIT JOURNAL
International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
This document summarizes a study that analyzed the use of information and communication technologies (ICTs) among small and medium enterprises (SMEs) operating in the Adum Central Business District of Kumasi, Ghana. The study found that while awareness of ICTs was high, only 23% of SMEs used computers and 49% used mobile phones to support their businesses. Additionally, 54% of the SMEs did not have internet access. The study recommended that Ghanaian government agencies and other stakeholders help educate business owners on the benefits of using ICTs to gain a competitive advantage. It also suggested improving access to hardware, software, and ICT infrastructure to help SMEs better exploit technology.
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
The power point presentation reviewed a mater's thesis as written by AHMAD SOBHANI. LULEÅ UNIVERSITY OF TECHNOLOGY, 2008. and reviewed by VICTOR JOHN UKAM
The document discusses factors affecting ICT use among agro-based SMEs in Selangor, Malaysia. It notes that prior research has found factors like firm size, skills/training, and government policies influence ICT adoption. A study of agro SMEs in Selangor found their ICT adoption level is low, with key factors being system support/readiness and perceived benefits. The document outlines several research questions and objectives to determine the level of ICT use among agro SMEs and relationships between use and factors like performance/effort expectations, with moderation by age, gender, experience.
Adaptation and barriers of e commerce in tanzania small and medium enterprisesAlexander Decker
This document discusses barriers to e-commerce adoption among small and medium enterprises (SMEs) in Tanzania. It identifies six categories of barriers: technical, organizational, social, legal/regulatory, skills/knowledge, and infrastructure. A survey was conducted of SMEs that do and do not use e-commerce to determine the most significant barriers in the Tanzanian context. The results showed that technical barriers were the most important overall, while lack of internet security was the highest individual barrier. The findings imply more efforts are needed to encourage e-commerce adoption among SMEs in Tanzania, especially for more advanced applications.
CII organized a series of roadshows in tier II and III cities across the country to promote the adoption of IT products and solutions among SMEs. For more information, please contact sainath.p@cii.in.
Does adoption of information technology improve firm performance a survey of ...Alexander Decker
This document discusses a study that examines the effects of information technology (IT) adoption on organizational performance among firms listed on the Nairobi Securities Exchange. The study found that IT adoption was associated with competitive advantages like improved profit margins and revenue, customer retention, and attracting new investors. IT adoption also helped with cost cutting by enabling firms to switch to less expensive health insurance programs. However, the study found no clear effects of IT adoption on factors like laying off employees, lowering monthly bills, changing service hours, or debt restructuring. Overall, the study concludes that IT adoption positively impacts organizational performance among firms listed on the Nairobi Securities Exchange.
Top 20 Cited Research Articles in Information Management - 2021IJMIT JOURNAL
International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas
Information and communication adoption in smesfahmi221282
This document provides a literature review on information and communication technologies (ICTs) adoption by small and medium enterprises (SMEs). It finds that ICT adoption is critical for SME competitiveness and accessing international markets. However, SMEs face numerous challenges to adopting ICTs including lack of skills, infrastructure, and financial resources. The review develops a conceptual framework outlining driving forces for ICT adoption, barriers, ICT tools, and benefits. It concludes that while ICTs offer opportunities for SMEs, many lack strategies to overcome adoption challenges.
IRJET - Ways of Improving it-Dependent Service Delivery in Public Organis...IRJET Journal
1) The document discusses ways to improve IT-dependent service delivery in public organizations in Tanzania, focusing on the Electronic Fiscal Devices Management System (EFDMS) used by employees and customers.
2) Some key ways to improve identified include conducting training for customers and employees on IT devices, promptly fixing computer problems, having clear strategies and feedback mechanisms to improve IT performance, and ensuring sufficient documentation.
3) Additional ways discussed are implementing good organizational structures for service delivery, making repairing any issues a priority, securing institutional IT knowledge, and innovating to improve customer satisfaction.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Similar to Information and Communication Technology Diffusion in Indian Small and Medium scale Enterprises: An overview (20)
Explore the key differences between silicone sponge rubber and foam rubber in this comprehensive presentation. Learn about their unique properties, manufacturing processes, and applications across various industries. Discover how each material performs in terms of temperature resistance, chemical resistance, and cost-effectiveness. Gain insights from real-world case studies and make informed decisions for your projects.
Complete Self-write Restaurant Business Plan Guide for Entrepreneurs
Information and Communication Technology Diffusion in Indian Small and Medium scale Enterprises: An overview
1. AMIT SINGH
(Under the Guidance of )
Prof. M. Jenamani & Prof. J. J. Thakkar
Indian Institute of Technology, Kharagpur
Information and Communication
Technology Diffusion in Indian Small and
Medium scale Enterprises: An overview
Research
Guidanc
e
Methods
Dedicati
on
Facts
2. MSME Sector in India: An Overview
India has 36 million SMEs that provides employment over 80
million persons. They produce more than 6000 products, but
contribute only 8% to National GDP.
83% of SMEs are involved in manufacturing activities and
17% of them are providing service.
MSMEs in India contribute 40% of industrial output and 35%
direct export.
Indian MSMEs lack in terms of their reach to national as well
as international market.
http://msme.gov.in/WriteReadData/eBook/MSME_at_a_GLANCE_EN.pdf
3. MSME Sector in India: An Overview
Developing global Competitiveness of the Indian MSMEs: National
Manufacturing Competitiveness Council (NMCC) initiatives-
1. Lean Manufacturing Competitiveness Scheme
2. Design Clinic Scheme
3. Marketing Assistance and Technology Up gradation
4. Technology and Quality Up gradation
5. Promotion of Information and Communication Tools (ICT)
6. Tolling and Training Centres
7. Improving Quality in Products
8. Awareness on Intellectual Property Rights (IPR)
9. Barcode Certification
10. Nurturing Innovative Business Ideas
4. ICT Adoption in SMEs: World View
Sub Saharan Africa and South Asia, two poorest regions of the
world, are also those with the lowest access to information and
communication technologies. The gap in access to and use of
ICTs, the so-called ‘digital divide’ often follows and reinforces
existing inequality and poverty patterns. For example, in March
2000 out of the 304 million people with Internet access, only 2.6
million were in Africa while 137 million were located in the U.S.
and Canada. A huge difference in ICT adoption is noticed
between developing and developed countries. Developing Sub
Saharan countries and countries in south Asia are specifically
backward in terms of ICT deployment in their enterprises,
specifically in MSMEs. The ICT sector is socially and economically
relevant to developing countries as it has been the major
economic driver in Sub-Saharan Africa over the past decade.
5. ICTs in Developing countries: World bank
recommendations
1. Reduce the cost of access for mobile and broadband
2. Support government/private-sector collaboration
3. Improve the e-commerce environment
4. Improve ICT worker skill levels
5. Encourage innovative business models that drive
employment, such as micro work
6. Create ICT parks in countries that meet infrastructure
requirements
7. Support ICT entrepreneurs.
6. Level of ICT adoption in MSMEs: Indian
Scenario
ICT adoption level in Indian MSMEs is sector specific. Sectors
such as auto components, chemical products and electrical
machinery are relatively ahead to other sectors. This is
promoted by the extended support from large scale
enterprises. They have provided technological as well as
financial support to their Tier I suppliers to ensure high ICT
adoption levels among the suppliers. This has had a cascade
effect with the Tier I suppliers providing a similar ‘pull effect’ to
the Tier II suppliers and beyond.
http://nmcc.nic.in/pdf/NMCC_Report_2010.pdf
7. ICT Adoption in SMEs: Research
Directions (countrywide)
http://www.scopus.com/term/analyzer.uri?sid=8D2D466F97B43B86E0302147F0906AF5.aXczxbyuHHiXgaIW6Ho7g%3a80&origin=resultslist&src=s&s=TITLE-ABS-KEY%28ICT+in+SMEs%29&sort=plf-
f&sdt=sisr&sot=b&sl=26&count=64&analyzeResults=Analyze+results&ref=%28ICT+in+SMEs+research+directions%29&txGid=0#zip
8. Literature Review: ICT in SMEs (Worldwide)
Author Title Description
Bloom, et al. (2014) The distinct effects of information
technology and communication
technology on firm organization.
This study has reported the impact of the information and communication
technology on management and workers autonomy and span of control.
They have presented these technologies as two different technologies.
Information technology is presented as the decentralizing force while
communication technology as a decentralizing force for decision making
process.
Bala, H., &
Venkatesh, V.
(2013)
Changes in Employees' Job
Characteristics During an
Enterprise System
Implementation: A Latent Growth
Modeling Perspective
This paper has examined the change in employees’ job characteristics while
the implementation more specifically in the shakedown phase of the
Enterprise System.
Sin Tan, et al.
(2009)
Internet-based ICT adoption:
evidence from Malaysian SMEs.
The investigated, what was innovative uniqueness of internet based ICT
adoption in SMEs, how it helped SMEs, what were associated barriers.
Antlová, K. (2009) Motivation and barriers of ICT
adoption in small and medium-
sized enterprises.
They performed an study on the effect of the owner's approach on
performance of SMEs, The research had also investigated how the complex
relationships among the owner group family members negatively affects the
performance of the organizations. In this research ICT adoption was analysed
in thirty SMEs. In second part of the study they have studied the barriers in
ICT adoption. this paper concluded that, to make ICT the tool of competitive
advantage, organizations should have the clear future vision and they should
know the approach or strategy of ICT adoption.
Forman, et al.
(2014)
Special Section Introduction-
Information, Technology, and the
Changing Nature of Work.
This paper reports that despite of higher interdependencies, of information
and technology on work, detailed studies to understand relationship among
these are lacking. This special issue has felt the need for longitudinal analysis
to clearly understand the work related changes as till only surveys and case
studies were only available.
9. Author Title Description
Ismail, et al. (2011). Using ICT as a value adding tool
in South African SMEs.
This paper has empirically investigated, how ICTs were the value addition in
case of SMEs in South Africa, specifically in field of retail, production and
service sector. They performed this study keeping three things in mind. First,
the type of then used ICTs in South African SMEs, Second, the value added
by the ICT the operations, third, study about various barriers during ICT
implementation. They concluded that ICT added values in terms of higher
customer satisfaction and increased service level, and their use was
differently used for different sectors
Mpofu, K. C., et al.
(2013)
ICT adoption and development of
e-business among SMEs in South
Africa.
They have studied the influence of key ICT adoption factors in small hotel
establishment in South Africa supported by case studies. results reflects that
internet, websites and other formal and informal networks are important
factors for ICT adoption. This research identified that skills, knowledge and
background experience were most critical among them.
Touray, A., et al.
(2013)
ICT barriers and critical success
factors in developing countries.
They focused on barriers of ICT adoption in SMEs and identified that
micromanaging and lack of internet exchange points was a most critical one.
These empirical findings were compared with the existing literature to
categories the barriers into success factors.
Antlova, K. (2014) Main factors for ICT adoption in
the Czech SMEs.
They mentioned that with the increased use of e-mail packages, mobile
computing and electronic devices, smart phones and personal networking and
storage, SMEs were enriching their business in current environment. This
research noticed that cloud computing, specifically, software as a service
(SaaS), supported SMEs a lot in ICT adoption by decreasing the dependency
on trained ICT experts.
Adeniran, T. V., et
al. (2014)
ICT Utilization within
Experienced South African Small
and Medium Enterprises.
They identified the purpose and the level of ICT utilization in South African
SMEs. This study presented that ICT utilization in South Africa was sector
specific and it also depends on the firm size and age an maturity level of
organization. they mentioned that Internet/Intranet was used to improve the
information collaboration and extending the trade over the globe.
10. Literature Review: ICTs in SMEs (In India)
Author Title Description
Mitra, et al. (2016) The distinct effects of information
technology and communication
technology on firm organization.
They have analysed the impact of ICT in Indian manufacturing firms and
identified that it has a significant impact on manufacturing productivity in
the context of total factor productivity (TFP) and technical efficiency (TE).
They have noticed that the impact is sector specific.
Todd, P. R., &
Javalgi, R. R. G.
(2007).
Internationalization of SMEs in
India: Fostering entrepreneurship
by leveraging information
technology.
They have focused on determinants influencing the internationalization of
small and medium-sized enterprises (SMEs) in India. They have investigated
and evaluated the business environment and, then, examined the
importance of developing and promoting entrepreneurship to allow SMEs in
India to develop a competitive position in the international marketplace. This
paper has proposed that the primary method for fostering or promoting the
growth of entrepreneurship is through the utilization of technology
Thakkar et al.
(2008).
Internet-based ICT adoption:
evidence from Malaysian SMEs.
They, using interpretive structural modelling (ISM), have identified the
interrelationship among the drivers of IT in Indian SMEs. They have further
classified these factors into four categories; autonomous, drivers, dependent
and linkage to dray higher managerial insights.
Kannabiran, G., &
Dharmalingam, P.
(2012).
Enablers and inhibitors of
advanced information
technologies adoption by SMEs:
An empirical study of auto
ancillaries in India.
They have done a survey-based study to identify enablers and inhibitors of
advanced IT (Information technology) adoption in SMEs. They have identified
several technological, economical and organizational factors that enable or
inhibit the adoption of advanced IT. They have took the case of auto
ancillaries in India and identified five specific barriers in IT adoption.