Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry. There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT applications in banks in general, and almost negligible investigations on mediating and moderating factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector. The importance of Egypt stems from its high population and steady steps taken towards technology adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’, ‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship between research variables and readiness to IOT applications, and only a partial moderation role was proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with useful guidelines on how to optimally promote IOT applications among employees.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
The digital economy is the type of economy which operates predominantly with the help of digital technology. It is the economic activity that results from the online transactions among people, businesses, devices, and processes. The economic activity is enabled by information and communications technologies. The transition from traditional to digital economy will boost national competitiveness and bring about new opportunities for businesses and jobs. This paper provides a primer on digital economy. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Digital Economy: A Primer" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46449.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46449/digital-economy-a-primer/matthew-n-o-sadiku
Artificial Intelligence and Human Computer Interactionijtsrd
Computers are becoming ubiquitous and are playing significant roles in our lives. Domestic digital devices for leisure and entertainment are becoming increasingly important. To be usable, every computing device must allow for some form of interaction with its user. The human computer interaction is the point of communication between the human user and the computer. AI has been gradually being incorporated into human computer interaction HCI . As AI systems become more and more ubiquitous, it is imperative to understand those systems from a human perspective. This paper provides an introduction to the “marriage†between HCI and AI. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Artificial Intelligence and Human-Computer Interaction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47491.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/47491/artificial-intelligence-and-humancomputer-interaction/matthew-n-o-sadiku
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
The digital economy is the type of economy which operates predominantly with the help of digital technology. It is the economic activity that results from the online transactions among people, businesses, devices, and processes. The economic activity is enabled by information and communications technologies. The transition from traditional to digital economy will boost national competitiveness and bring about new opportunities for businesses and jobs. This paper provides a primer on digital economy. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Digital Economy: A Primer" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46449.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46449/digital-economy-a-primer/matthew-n-o-sadiku
Artificial Intelligence and Human Computer Interactionijtsrd
Computers are becoming ubiquitous and are playing significant roles in our lives. Domestic digital devices for leisure and entertainment are becoming increasingly important. To be usable, every computing device must allow for some form of interaction with its user. The human computer interaction is the point of communication between the human user and the computer. AI has been gradually being incorporated into human computer interaction HCI . As AI systems become more and more ubiquitous, it is imperative to understand those systems from a human perspective. This paper provides an introduction to the “marriage†between HCI and AI. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Artificial Intelligence and Human-Computer Interaction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47491.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/47491/artificial-intelligence-and-humancomputer-interaction/matthew-n-o-sadiku
Today, a growing number of vehicles are equipped with communication devices to facilitate vehicle to vehicle and vehicle to infrastructure communication and increase the safety of passengers. A new type of network called Vehicular Network VANET provides us with the infrastructure for developing new systems to enhance drivers' and passengers' safety and comfort. Vehicular networks are special types of mobile ad hoc networks that are used to help drivers access necessary information. This paper provides an introduction to vehicular networks. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Vehicular Networking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46451.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/46451/vehicular-networking/matthew-n-o-sadiku
Insight into IoT Applications and Common Practice Challengesijtsrd
IoT caused a revolution in the technological world. Not only is the IoT related to computers, people or cell phones but also to various sensors, actuators, vehicles, and other modern appliances. There are around 14 billion interconnected digital devices across the globe i.e. almost 2 devices per human being on earth. The IoT serves as a medium to connect non living things to the internet to transfer information from one point to another in their community network which automates processes and ultimately makes the life of human beings convenient. The subsequent result of amalgamating internet connectivity with powerful data analysis is a complete change in the way we humans work and live. The most vital characteristics of IoT include connectivity, active engagement, sensors, artificial intelligence, and small device use. All of this creates many challenges that need to be solved to keep this technology to continue expanding. In this paper, we have identified various applications of IoT based on recent technological and business trends and highlighted the existing challenges faced by IoT which need to be addressed considering the exponential acceptance of the concept globally and the way those challenges had been addressed in the past. We have also made a few comments on the way such challenges are being attempted to be resolved now. This paper presents the current status Internet of Things IoT in terms of technical details, and applications. Also, this paper opens a window for future work on the historical approach to study and address IoT challenges. Lubna Alazzawi | Jamal Alotaibi "Insight into IoT Applications and Common Practice Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30286.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30286/insight-into-iot-applications-and-common-practice-challenges/lubna-alazzawi
Role of Information & Communication Technology in Developing the Banking Sect...ijtsrd
Today Information& Communication Technology is not only for computer literacy, it also deals with how computers work and how these computers can further be used not just for information processing but also for communications and problem solving tasks as well. The significance of ICT can be seen from the fact that it has penetrated almost every aspect of our daily lives from business to leisure and even society and social development. The 21st century will bring about an all-embracing convergence of computing, communications and informations. This explosion of technology is changing the banking industry from paper and branch banks to digitized and networked banking services. All over the world, banks are still struggling to find a technological solution to meet the challenges of a rapidly-changing environment. The present article presents the role of Computer Science as well as Information& Communication Technology in developing the banking industry in India. Smt Paramita Chatterjee"Role of Information & Communication Technology in Developing the Banking Sector of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10710.pdf http://www.ijtsrd.com/computer-science/data-processing/10710/role-of-information-and-communication-technology-in-developing-the-banking-sector-of-india/smt-paramita-chatterjee
Top 5 ICT issues identified by iCIO for Indonesia to address to in order to better drive economic growth. Presented to Minister of Information nd Communications. Detailed report and recommendations are available.
IoT - Technical Regulatory Aspects and Key Challenges Dr. Mazlan Abbas
MCMC envisages that this Technical Report becomes a reference for the stakeholders
in rolling out IoT applications and services
in Malaysia, especially start-up companies, universities and Makers community who
are less than familiar with such technical regulatory requirement. This Technical Report defines the requirement and procedures to achieve compliance to the technical regulatory requirements including Spectrum Requirement, Network Numbering and Assignment, Technical Standardisation, Roaming or Mobility Requirement, and Security and Data Privacy
in order to implement IoT applications and services in Malaysia.
In the recent years, Internet of Things (IoT) has acquired a remarkable attention. IoT projects a world where billions of smart, interacting things are able to offer various services to near and remote entities. This innovative technology enables users to identify and control services. Customers can benefit from the functional guidance. Therefore, the voice of customers is transmitted to manufacturers. The benefit and welfare that the IoT brings about are undeniable; on the other hand, there are some challenges to apply IoT. The main objective of this study is to reveal the usability challenges of IoT in developing countries through a detailed literature survey.
A presentation delivered to the "Seminar Nasional Internal Audit 2017' at JW. Marriott Hotel, Medan, Indonesia. Be insightful, pro-active, future focused. 8-10 May 2017.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Big Oppportunities, Clouded Possibilities for IT Services SectorPeopleWorks IN
With global IT spending projected to grow by 3.9 per cent, the IT services segment is all set to surpass its contribution to Industry revenue. Right Talent will be the ultimate source of comfort for firms like yours to support in your growth and business aspirations. PeopleWorks team pooled in resources to understand the challenges faced and the role of HR in IT Services Sector. The same has been documented and attached for your perusal.
As objects become embedded with sensors and gain the ability to communicate,
the new information networks promise to create new business models, improve
business processes, and reduce costs and risks. One such Model is the internet of
things. Sensors and actuators are embedded in physical objects from roadways to
pacemakers are linked through wired and wireless networks, often using the same Internet
Protocol (IP) that connects the Internet. Internet of Things has great potential to support
society, to improve energy efficiency and to optimize various kinds of mobility and
transport at the same time. However, the Internet of Things raises significant
challenges that could stand in the way of reaping its potential benefits. Pitfalls
concerning cyber security, theft and hacking of personal and financial data are the
ones that are making people agitated.
Electronic devices used at home, workplaces, in a neighbourhood or in a large
urban landscape are connected and provide data which is accumulated and analyzed
for the benefit of its users. The ability of a simple cell phone connecting to other
devices, sensors in public, to regulate traffic and other civic institutions, shows how
IoT has merged with data and analytics of data plays a key role and will continue to
do so in the future.
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the unfolding changes brought by IOT will also help in its growth.
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations.
This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
Big data represents one of the most profound and most pervasive evolutions in the digital world. Examples of big data come from Internet of Things (IoT) devices, as well as smart cars, but also the use of social networks, industries, and so on. The sources of data are numerous and continuously increasing, and, therefore, what characterizes big data is not only the volume but also the complexity due to the heterogeneity of information that can be obtained. The fastest growth in spending on big data technologies is happening within banking, healthcare, insurance, securities and investment services, and telecommunications. Remarkably, three of those industries lie within the financial sector, which has many particularly serviceable use cases for big data analytics, such as fraud detection, risk management, and customer service optimization. In fact, the definition of big data analysis refers to the process that encompasses the gathering and analysis of big data to obtain useful information for the business. This paper focuses on delivering a short review concerning the current technologies, future perspectives, and the evaluation of some use cased associated with the analysis of big data.
Insight into IoT Applications and Common Practice Challengesijtsrd
IoT caused a revolution in the technological world. Not only is the IoT related to computers, people or cell phones but also to various sensors, actuators, vehicles, and other modern appliances. There are around 14 billion interconnected digital devices across the globe i.e. almost 2 devices per human being on earth. The IoT serves as a medium to connect non living things to the internet to transfer information from one point to another in their community network which automates processes and ultimately makes the life of human beings convenient. The subsequent result of amalgamating internet connectivity with powerful data analysis is a complete change in the way we humans work and live. The most vital characteristics of IoT include connectivity, active engagement, sensors, artificial intelligence, and small device use. All of this creates many challenges that need to be solved to keep this technology to continue expanding. In this paper, we have identified various applications of IoT based on recent technological and business trends and highlighted the existing challenges faced by IoT which need to be addressed considering the exponential acceptance of the concept globally and the way those challenges had been addressed in the past. We have also made a few comments on the way such challenges are being attempted to be resolved now. This paper presents the current status Internet of Things IoT in terms of technical details, and applications. Also, this paper opens a window for future work on the historical approach to study and address IoT challenges. Lubna Alazzawi | Jamal Alotaibi "Insight into IoT Applications and Common Practice Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30286.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30286/insight-into-iot-applications-and-common-practice-challenges/lubna-alazzawi
Role of Information & Communication Technology in Developing the Banking Sect...ijtsrd
Today Information& Communication Technology is not only for computer literacy, it also deals with how computers work and how these computers can further be used not just for information processing but also for communications and problem solving tasks as well. The significance of ICT can be seen from the fact that it has penetrated almost every aspect of our daily lives from business to leisure and even society and social development. The 21st century will bring about an all-embracing convergence of computing, communications and informations. This explosion of technology is changing the banking industry from paper and branch banks to digitized and networked banking services. All over the world, banks are still struggling to find a technological solution to meet the challenges of a rapidly-changing environment. The present article presents the role of Computer Science as well as Information& Communication Technology in developing the banking industry in India. Smt Paramita Chatterjee"Role of Information & Communication Technology in Developing the Banking Sector of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10710.pdf http://www.ijtsrd.com/computer-science/data-processing/10710/role-of-information-and-communication-technology-in-developing-the-banking-sector-of-india/smt-paramita-chatterjee
Top 5 ICT issues identified by iCIO for Indonesia to address to in order to better drive economic growth. Presented to Minister of Information nd Communications. Detailed report and recommendations are available.
IoT - Technical Regulatory Aspects and Key Challenges Dr. Mazlan Abbas
MCMC envisages that this Technical Report becomes a reference for the stakeholders
in rolling out IoT applications and services
in Malaysia, especially start-up companies, universities and Makers community who
are less than familiar with such technical regulatory requirement. This Technical Report defines the requirement and procedures to achieve compliance to the technical regulatory requirements including Spectrum Requirement, Network Numbering and Assignment, Technical Standardisation, Roaming or Mobility Requirement, and Security and Data Privacy
in order to implement IoT applications and services in Malaysia.
In the recent years, Internet of Things (IoT) has acquired a remarkable attention. IoT projects a world where billions of smart, interacting things are able to offer various services to near and remote entities. This innovative technology enables users to identify and control services. Customers can benefit from the functional guidance. Therefore, the voice of customers is transmitted to manufacturers. The benefit and welfare that the IoT brings about are undeniable; on the other hand, there are some challenges to apply IoT. The main objective of this study is to reveal the usability challenges of IoT in developing countries through a detailed literature survey.
A presentation delivered to the "Seminar Nasional Internal Audit 2017' at JW. Marriott Hotel, Medan, Indonesia. Be insightful, pro-active, future focused. 8-10 May 2017.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Big Oppportunities, Clouded Possibilities for IT Services SectorPeopleWorks IN
With global IT spending projected to grow by 3.9 per cent, the IT services segment is all set to surpass its contribution to Industry revenue. Right Talent will be the ultimate source of comfort for firms like yours to support in your growth and business aspirations. PeopleWorks team pooled in resources to understand the challenges faced and the role of HR in IT Services Sector. The same has been documented and attached for your perusal.
As objects become embedded with sensors and gain the ability to communicate,
the new information networks promise to create new business models, improve
business processes, and reduce costs and risks. One such Model is the internet of
things. Sensors and actuators are embedded in physical objects from roadways to
pacemakers are linked through wired and wireless networks, often using the same Internet
Protocol (IP) that connects the Internet. Internet of Things has great potential to support
society, to improve energy efficiency and to optimize various kinds of mobility and
transport at the same time. However, the Internet of Things raises significant
challenges that could stand in the way of reaping its potential benefits. Pitfalls
concerning cyber security, theft and hacking of personal and financial data are the
ones that are making people agitated.
Electronic devices used at home, workplaces, in a neighbourhood or in a large
urban landscape are connected and provide data which is accumulated and analyzed
for the benefit of its users. The ability of a simple cell phone connecting to other
devices, sensors in public, to regulate traffic and other civic institutions, shows how
IoT has merged with data and analytics of data plays a key role and will continue to
do so in the future.
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the unfolding changes brought by IOT will also help in its growth.
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations.
This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
Big data represents one of the most profound and most pervasive evolutions in the digital world. Examples of big data come from Internet of Things (IoT) devices, as well as smart cars, but also the use of social networks, industries, and so on. The sources of data are numerous and continuously increasing, and, therefore, what characterizes big data is not only the volume but also the complexity due to the heterogeneity of information that can be obtained. The fastest growth in spending on big data technologies is happening within banking, healthcare, insurance, securities and investment services, and telecommunications. Remarkably, three of those industries lie within the financial sector, which has many particularly serviceable use cases for big data analytics, such as fraud detection, risk management, and customer service optimization. In fact, the definition of big data analysis refers to the process that encompasses the gathering and analysis of big data to obtain useful information for the business. This paper focuses on delivering a short review concerning the current technologies, future perspectives, and the evaluation of some use cased associated with the analysis of big data.
Process oriented architecture for digital transformation 2015Vinay Mummigatti
How the digitally savvy enterprises need to transform their business processes - A paper on architecture and patterns for business and technology audience.
IIoT Framework for SME level Injection Molding Industry in the Context of Ind...Dr. Amarjeet Singh
The Internet of Things (IoT) is a hype topic for nearly a decade now. Broadly growing, millions of devices get direct access to the Internet provides plenty of applications such as smart homes or mobile health management. This trend can also be found in the industry where IoT components hardened for these environments are introduced, called Industrial IoT (IIoT) devices which can be either sensors or actors, as well as mobile equipment such as smartphones, tablets, and smart glasses. Consequently, mobile communication becomes universal in smart factories. IIoT devices provide massive data on temperature, pressure, machine states, etc. But still, most of the SME level industries in the Asian region are new to these technological advancements. They still operate their facilities ith conventional setups without absorbing the new opportunities which are presented by IoT.
In the plastic injection molding industry, process parameters perform a significant role in the quality of the output product. During the manufacturing process, these process parameters have to deal with various factors such as quality and type of materials, requirement tolerance levels of the output product, Environmental conditions like temperature and humidity, etc. Injection molding has been a challenging process for many SME level manufacturers to produce products while meeting the quality requirements at the lowest cost. Most of them are unable to reach the global market in the injection molding industry due to the non-availability of the proper methods to determine the process parameters for injection molding. During production, quality characteristics may differ due to drifting or shifting of processing conditions caused by machine wear, environmental change, or operator fatigue. By determining the optimal process parameter settings productivity and quality will increase while reducing the cost of production.
In this paper, we suggest an Industrial IoT framework that can develop for small- and medium-sized enterprises (SMEs) level industries to optimize their production facility. With the presented framework SME level industries can start to inherit IoT devices into their production floor to manage and monitor production parameters in real-time while improving the quality of the production.
IT Infrastructure on the Verge of Technological SingularityMiraworks.io
Miraworks, the world's first multi-vender platform for IT infrastructure design, presents its vision of the industry up until 2030. The White Paper, entitled "IT Infrastructure on the Verge of Technological Singularity", covers the development trends of the global IT infrastructure, including a transition to open multivendor solutions in IT infrastructure design, looming professional IT standards, and integrated tools for designing traditional and cloud IT infrastructures.
This presentation highlights the definition of IoT, various applications of IoT, the Role of IoT in building smart cities, and the challenges and opportunities of Implementing IoT for smart cities.
The digital revolution will redefine every sector of the economy. The pace of the change, as we move to more smart digital solutions, is predicted to be comparable to the Industrial Revolution. Although we not know for sure where the Digital Revolution will take us, but it holds massive potential to transform everything we do. We must be prepared to embrace new technologies, new business models, and new possibilities as they emerge.In this paper we discuss the trends and insights that will help you make more informed decisions in the digital world in the upcoming years. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Future of Digital" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50289.pdf Paper URL: https://www.ijtsrd.com/engineering/other/50289/future-of-digital/matthew-n-o-sadiku
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
Internet of Things (IoT) is a novel communication standard and it is researcher’s preferred topic, which integrates heterogeneous systems seamlessly. Designing a universal architecture for IoT is a challenging task due to the integration of wide variety of the devices. The main objective of this paper is to provide comprehensive knowledge on challenges, applications, Security issues, and different communication models of IoT. This paper also focuses on the marketing trends of IoT with respect to variety of application with the end users. This motivates the researchers to contribute more productive work in this field by analyzing various parameters.
Similar to Mediating and moderating factors affecting readiness to io t applications the banking sector context (20)
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG
risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG
risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through
R&D. The analysis also highlights the significance of network externality effects, with a specific focus on
Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies
towards F + ESG optimization.
The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of
amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth
and scalability, specifically its ability to grow and expand, is accelerating high-level research and
development by gaining the trust of stakeholders in the "synergy through R&D-driven ESG risk
mitigation."
Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the
transformation of Japan's management system.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
These days the security provided by the computer systems is a big issue as it always has the threats of
cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security
provided by the blue team operations tends to be costly if done in large firms as a large number of systems
need to be protected against these attacks. This leads these firms to turn to less costly security
configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services
provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS
attacks which are done on both physical and network layers. These attacks in turn result in loss of
extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it,
and taking appropriate action to not only stop the attack but also locate its source IP address. This whole
process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will
result in not only the detection of the attack but also the source IP address of the machine on which the
attack is initiated and completed. The end product of this research will result in sets of default rules for the
Snort tool which will not only be able to provide better security than its previous versions but also be able
to provide the user with the IP address of the attacker or the person conducting the attack. The system
involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata
which is another intrusion detection system capable of detecting all these types of attacks as mentioned.
Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to
be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for
traffic monitoring and incident response than any other of its alternatives in the market. Since this system
is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as
it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS
automation in its capability to capture and report the malicious packets found during the network scan. All
of this gives the IDS a capability of a low budget automated threat detection system. This paper gives
complete guidelines for authors submitting papers for the AIRCC Journals.
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
IT (Information and Communication Technology) companies are facing the dilemma of decreasing
productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being
considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to
the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and
to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A
leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is
utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long
period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate
performance. The results, using sports prosthetics as a case study and using patents as a proxy variable,
confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained
through M&A is effective for creating new innovations.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of information technology and management
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the
research framework using survey data from 210 respondents. The collected data has been analyzed using
Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively
related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude.
However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for
future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI.
The findings will benefit academic staff and university administrations.The study will also help academic
staff enhance their knowledge-sharing practices.
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
Cloud computing systems need to be reliable so that they can be accessed and used for computing at any
given point in time. The complex nature of cloud systems is the motivation to conduct research in novel
ways of ensuring that cloud systems are built with reliability in mind. In building cloud systems, it is
expected that the cloud system will be able to deal with high demands and unexpected events that affect the
reliability and performance of the system.
In this paper, chaos engineering is considered a heuristic method that can be used to build reliable cloud
systems. Chaos engineering is aimed at exposing weaknesses in systems that are in production. Chaos
engineering will help identify system weaknesses and strengths when a system is exposed to unexpected
knocks and shocks while it is in production.
Chaos engineering allows system developers and administrators to get insights into how the cloud system
will behave when it is exposed to unexpected occurrences.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
This paper will provide a novel empirical study for the relationship between network media attention and
green technology innovation and examine how network media attention can ease financing constraints. It
collected data from listed companies in China's heavy pollution industry and performed rigorous
regression analysis, in order to innovatively explore the environmental governance functions of the media.
It found that network media attention significantly promotes green technology innovation. By analyzing the
inner mechanism further, it found that network media attention can promote green innovation by easing
financing constraints. Besides, network media attention has a significant positive impact on green invention
patents while not affecting green utility model patents.
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
With an increasing number of extreme events and complexity, more alarms are being used to monitor
control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable
actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It
is important to have a rigid surveillance that should guarantee protection from any sought of hazard.
Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these
CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired
off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with
a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing
images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and
a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on
providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO
algorithm, it divides an image from the video into grid system and each grid detects an object within itself
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Mediating and moderating factors affecting readiness to io t applications the banking sector context
1. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
DOI: 10.5121/ijmit.2020.12401 1
MEDIATING AND MODERATING FACTORS
AFFECTING READINESS TO IOT APPLICATIONS:
THE BANKING SECTOR CONTEXT
RashaAbd El-Aziz1
, Sarah El-Gamal2
and Miran Ismail1
1
Business Information Systems Department, College of Management and Technology,
Arab Academy for Science, Technology and Maritime Transport,
Miami Campus, Alexandria, Egypt
2
Logistics and Supply Chain Management Department, College of International
Transport and Logistics, Arab Academy for Science, Technology and Maritime
Transport, AbouKir Campus, Alexandria, Egypt
ABSTRACT
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
KEYWORDS
IOT applications; Readiness; IOT challenges; Banking sector; HRM practices; Structural Equation
Modelling
1. INTRODUCTION
Information technology and digital economy have reshaped the business landscape around the
world by changing the way organisations conduct business and the way services are delivered.
Digitalization involves, but is not limited to, the digital transformation of business processes
through the interaction of digital technologies such as mobile networks, cloud computing,
artificial intelligence, and Internet of Things (IOT) with physical ICT infrastructure [12][48]. It
also shows the influence of growing use of computers and communication channels [18] [83]
[69]. Digitalization is the next industrial revolution and IOT is its core technology. IOT is a new
paradigm promising a smart human being life by allowing communications between objects
(things) such as televisions, lamps, cars, mobile phones or even plants connected by sensors
through the Internet anywhere, anytime. IOT applications include Wristbands that act as an alarm
2. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
2
and recognize sleeping patterns, Smartphones that can scan barcodes on food packages to provide
information about its ingredients, and the gym that has a variety of applications enabling
gathering information about the calories or body fat content [58]. Accordingly, IOT is expected
to play an important role in many business areas [70] [23].
Despite the emergence of IoT applications, organisations face great challenges keeping up with
an acceptable transformation pace, and achieving the expected results. Research on IOT has been
recognized [45]by academics, and has gained banks’ attention; especially in developing countries
[46]. Yet, most of the studies were conducted on IOT adoption in general, with only few tackling
factors that affect readiness to IOT applications in banks, negligible investigations on mediating
and moderating factors, and almost none in the Egyptian context. The Egyptian banking industry
in particular is one of the oldest and most critical in the region; especially due to its high
population and steady steps it takes towards technology adoption [54]. Accordingly, the study at
hand aims to present a thorough investigation of readiness to IOT applications in the banking
industry, while highlighting the mediating and moderating factors. In order to achieve the
research aim, the study seeks to answer the research questions: (1)What are the key factors
affecting readiness to IOT applications in the banking sector? (2) What are the mediating and
moderating factors affecting readiness to IOT applications in the banking sector?
This paper is structured into five sections: the first Section introduces the research and the study
background, Section 2, provides a review of literature, Section 3, demonstrates the research
framework and hypotheses, Section 4 illustrates the data collection and analysis. Section 5 draws
conclusions, theoretical and practical implications, and provides suggestions for future work.
2. LITERATURE REVIEW
The digital economy has been identified as a wide network of economic and social activities,
supported by digital technologies with an enormous potential to affect any organisation.
Digitalization has been the upcoming trend; as it is the ability to turn existing products or services
into digital variants, and thus offer advantages over tangible product [37][24][62] cited by[35].
In the last decade, IOT has played a significant role in the business landscape, making it fast
moving and more competitive. Its great potential to enhance sustainability; which in turn
optimizes operations and services [14], makes it an important topic to investigate.IOT is a
network connectivity and computing capability that extends to objects, sensors and everyday
items. Internet services have created new sets of data that include social networks data, pictures,
videos, and a lot of textual information. But the real explosion of data variety is happening with
the establishment and massive development of IOT [65] and [34]. Data generated from various
domains helps to create valuable insights for optimizing operations and quality standards [6]. IOT
is considered a wide-ranging network of smart ‘things’, associated with programs, electronics,
hardware and network connectivity that empowers these things to accumulate and exchange data
[17]. According to the Internet Architecture Board, IOT is a technology with a large number of
embedded devices that employ Internet Protocols Communication Services and are not directly
controlled by people [28]. It is a computing concept that describes a future where everyday
objects are Internet-connected such as wearable devices or other sensor technologies [4].In 2017,
IOT was reported as a huge industry that is worth over USD 745 billion [76]was predicted to
increase to billions of connected devices by 2020 [10]. This brings great potential for both
businesses and academia [21]. However, the more IOT applications are weaved into the fabric of
everyday life, the more security concerns will be raised; which if neglected could threaten its
existence [3].
3. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
3
2.1. IOT in Human Resources Management
Human resources (HR) are treated as strategic assets to achieve its sustainable competitive
advantages. In human resources processes and practices, Information Technology has had a
substantial effect [74]. The technological advancements have brought up the term terms
Electronic Human Resource Management (E-HRM). E-HRM is being the facets of intranet based
human resource management, virtual human resource management; website based human
resource management and information system based upon the human resource management
[11].Human Resource Management (HRM) refers to the strategic effort by management systems
to plan, recruit, select, train and develop employees in order to achieve organisational and
individual objectives [48]. The appreciation of society to the new technology trends forced
organisations to adapt to more innovative solutions in order to suit the marketplace. Similarly,
human resource professionals; who are also urged to keep up with these innovations in their
practices [82] [13], have recognized e-HRM, which has become the pivot of human capital
management solutions. Accordingly, HRM practices have also been re-defined as e-Recruitment,
e-Payroll, e-Performance Management, e-Training etc.[13].
The influence of technology adoption derives change to the HR business process. Digitalization
enables HRM to achieve its main objectives efficiently [9]. The excessive use of smart phones
and cloud-based applications have changed the workplace and enabled organisations to perform
work schedules with open work spaces or virtual workplace. IOT can transform HRM and allow
organisations to take suitable HR decisions and promote organisational growth through the
availability of easy and cost-effective employee data. This can be done through the establishment
of systems to connect, track and measure the effectiveness and efficiency of humans in the digital
work environment [13].IOT applications in HRM aim at improving HR practices, namely; HR
analytics, recruitment, deployment, performance management, training and development, and
compensation. IOT enables HRM to collect real-time big data. The sensing function of smart
things stimulates changes and provides HRM with the strategies necessary to maximize agility
and correct creation of workforce. For example, using wearable devices all employee-related
information from diet, sleep, movements and pulse are monitored. Such data can be utilised to
enhance productivity [73]. Utilising IOT in HRM can also digitize employees’ attendance; where
biometric systems are used to calculate the total working hours instantly. Compensation can thus
be automatically calculated and debited to employees’ bank accounts instantly and accurately
[30][59]. IOT facilitates sending/retrieving employees’ data, which improves performance
appraisal and enhances delivering employees’ benefits as promotion, salary increase, gifts,
recognition, certificates etc.[78] and [73].
2.2. IOT Challenges
IOT continues to steer operations in the 21st century, numerous challenges are coming to light
[59]. The first and most critical obstacle to IOT implementation is Security, which it considered
as top priority [39]. This challenge is important due to the billions of devices connected through
IOT; it requires an efficient security mechanism [59][49][5]. The security problem is magnified
by the fact that many IOT devices may be built by companies that have little expertise in security
[7][15][50]. Considering challenges such as security is still important to enhance IOT adoption
[61].Information security is a social and organizational problem because technical systems must
be operated and used by people [22, p.7], which includes factors as
confidentiality, integrity and availability of information achieved through the application of certai
n standards and measures and organisational support for the preparation, implementation, andveri
fication and updating of business standards and measures [56][29]. Also,
information security is impacted by the individuals that use it and the same technologies that
4. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
4
Enable it to takeplace in compliance with these processes. The growing influence of information
security policy thinking shows the width and scope of the content being protected [29].According
to the information security life cycle developed by [47], it is extremely significance for the
organization to recognize that the process is never-ending, and the organization needs to improve
its behaviour during every cycle. Information security is needed because the technology applied
to information creates risks. When information security risk is recognized, it is necessary to
create a policy for information security. These policies can be divided into four categories:
protection measures, detection measures, consequences response measures and measures to
ensure the effectiveness of the consequences response. Management uses information security
policy to distinguish between employee behaviours that are either allowed or prohibited, as well
as the corresponding penalties if the prohibited behaviours occur [22]. In order to ensure that the
security policy is in line with standard organisational practices, it is critical that the human
resource department be involved in the security policy development life cycle [53]. In this way,
consistency between the organisation’s security policy and standard organisational practices will
be assured. According to [25] security policy should not have conflict with human resources
policy.
Figure 1. Information security life cycle [53, p. 123]
Software complexity in IOT cannot be neglected, where a more extensive software infrastructure
will be needed on the network and on background servers in order to manage the smart objects
and provide supporting services, because software systems in smart objects will have to function
with minimal resources, as unconventional embedded systems [19][68][67][49] [31].The
presence of clear and strong IOT regulations is very important as well; it can decrease the fear of
security breaches from IOT usage [16][51] [43]. Business policies and procedures create some
social challenges to IOT and government laws, and rules pose legal challenges to its use [43].
IOT regulatory problem are amplified since the rapid rate of change in IOT technology outpaces
the ability of the associated policy, legal, and regulatory structures to adapt [64]. If a government
imposes IOT policy compliance with penalties on firms who do not comply, numerous
organizations would be interested in IOT adoption [61].
Software development is an important challenge as well; as it is assumed that human lives will
totally depend on things around them that are connected to the Internet, the validity and reliability
of the data being sent and the decision taken accordingly is an equally important [85]. Challenges
increase if the data sent is critical for human lives as heart beat rate or blood pressure for
example. An IOT integration framework exclude all complexities and provide appropriate
documentation for non-developers and developers with basic programming knowledge to
understand the internals of the framework easily [77]. In other words, software developers must
develop easy programs with high accuracy to guarantee decisions taken by things accordingly.
Complex dependencies must also be considered [8]. Human behaviour in general is very complex
that is influenced by a lot of variables. This makes its interpretation using software and sensors a
real challenge. With IOT humans are able to monitor and control physical processes while
5. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
5
interacting with very large data sets collected via sensors. For IOT to gain maximum efficiency
and make human lives much easier software designed for sensors must be smart enough to take
critical decisions and avoid conflict situations [75]. The presence of a lot of complexities will
affect IOT adoption negatively [61].Perceived Safety is the degree to which a user believes that
using a particular IOT system he would be free from possible dangers (health, physical, mental,
financial, social, environmental, etc.), risks, losses, negative outcomes that can be caused from its
usage. IOT products need to obtain software updates and security patches in a manner that
preserves their limited bandwidth and connectivity and reduces the risk of sacrificing functional
safety [32].
All of the above-mentioned challenges are assumed to affect how IOT is perceived. Perceived
privacy risk plays a key factor in IOT adoption [38]. Therefore, ensuring security in IOT products
and services should be considered a top priority [63]. Businesses aim to be more efficient and
responsive by having a better control through strong governance, better communication, efficient
coordination and cumulative vision of the organisation [72]. The intent for IOT adoption is
another primary factor in the study of IoT. Technology readiness positively impacts IOT
adoption[61].The unified theory of acceptance and use of technology (UTAUT) is an advanced
tool developed to analyse and understand the factors that influence the acceptance of IOT
[79][57]. The integrated model is the result of a combined eight models [80] and is one of the
most popular frameworks in the field of technology acceptance models [81]. Some of the
models incorporated are: Theory of Reasoned Action (TRA), Theory of planned behaviour
(TPB), Technology acceptance models (TAM), and Motivational models (MM). There are four
constructs / variables which are direct determinants of acceptance and use behaviour, the four
variables are Social Influence (SI), Effort Expectancy (EE), Facilitating Conditions (FC), and
Performance Expectancy (PE).Readiness to IOT applications has a great potential to
revolutionize human capital management in the digital environment [13]. However, organisations
need to acquaint employees with IOT and determine the key challenges to transforming from
legacy systems to IOT enabled systems [84].Employee readiness to use IOT technology is not yet
fully explored.
2.3. IOT in Organisations
With the arrival of IOT in organisations, it becomes more necessary to consider its potential
proliferation and adapt correct strategies while investigating its attractiveness from the various
perspectives. Those perspectives include, employees who are interested in the adoption of smart
technology; the decision makers interested in increasing effectiveness and reducing
administrative efforts; and the administrators who have administration obligations in managing
the process. Assuming the arrival of IOT to organisation premises entails investigating the
different perspectives in needs, readiness, or posing threats [27]. IOT can be used outdoors or
indoors and can be used in the normal daily life activities. Employees check in and out through
RFID tag identifiers and Smartphone applications generating attendance reports, where decision
makers and administrators get automatic updates. Adding IOT to gateways of any
campus/organisational premises helps in attaining security and reducing time wasted in checking
employees’ identification proofs/cards. Therefore, IOT helps in saving not only time but also
avoids wastage of energy [27].
Many organisations still use ID (employee card) to check in and out; which has many limitations
such as the processing time, where the card is inserted into a reader, processed, data read, and the
employee is successfully identified. This process takes time and causes crowds and frustration.
Moreover, these ID cards can be scratched, bent, or even lost. They may also be kept in wallets or
pockets for long hours, and therefore the electromagnetic chip maybe affected. Not to mention
6. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
6
the likelihood of typical human errors. Therefore, IOT are positively related to both growth and
competitiveness [33]. IOT has a great impact in all major industries including the Banking and
Financial Services sector; as it measures and provides useful quantified data, which can be
analysed to ensure improved performance at workplace. Thus, it has become increasingly
important for HR to automate the monitoring of the human productivity in terms of meaningful
data and help them in making strategic decision making not only limited to clients’ efficiency but
have extended its dimensions to improve organisational efficiency [13].
2.4. The Egyptian Banking Industry
The Egyptian banking sector is considered one of the most developed in the Middle East and
North Africa region. Therefore, the purpose of banking operations is supposed to enhance the
quality of life for the overall society not just maximize shareholders' wealth [26]. The banking
system in Egypt is a national priority; where it has been experiencing a clear increase in the
number of customers using online banking services, with Internet users in Egypt reaching
49,231,493 million in March 2019; which brings Internet penetration to 48.7 % [86]. This
justifies why the Egyptian economy heavily relies on the banking industry to maintain its
stability. The banking industry in Egypt consists of a variety of segments [1], where there are
commercial banks that accept deposits and provide finance for a wide variety of transactions;
business and Investment banks that perform medium-and-long-term business and finance
operations; and specialized banks which offer specific types of economic activities and accept
demand deposits[40]. However, they have a significant contribution in the financial sector of the
country [2][41][42].
3. RESEARCH FRAMEWORK AND HYPOTHESES
Despite the wide availability of studies on key dimensions that affect readiness to IOT
applications, levels of importance remain variable between countries. Not to mention that only
few studies focused on the banking industry. Accordingly, literature was extensively reviewed to
derive the main dimensions that affect readiness to IOT applications in the Egyptian banking
industry and propose the research framework; as illustrated in Fig. 1. The model contains
research variables, that were highlighted in a variety of studies, namely: ‘Networking’, ‘Software
Development’, ‘Complex dependencies’ and ‘Regulations’ and are considered antecedents to
‘readiness to IOT applications’. Accordingly, the first hypotheses 1 to 5 were devised to test
whether these factors still stand as the main factors within the context.
Since only few studies investigated factors that affect readiness to IOT applicationsin banks[60],
and almost negligible investigations on mediating and moderating factors, ‘Security’ and
Intention to Use’ are proposed by the researchers as mediators for the relationship between the
research variables and the ‘readiness to IOT applications’. This assumption was based on the fact
that a variety of investigations have revealed that Security is the most critical obstacle. Thus, it
was worth investigating its mediating effect to test whether with its absence, other independent
dimensions would still affect the readiness to IOT applications. This also applies to the user
intention, which was proven as a prerequisite to readiness to IOT applications. Therefore,
hypothesis 6 was devised to test their mediating impact on the model. ‘Efficiency’ was
introduced as a moderator for the model, in order to examine whether its importance stems from
its impact on strengthening the relationship between the research variables and the readiness to
IOT applications. Thus, hypothesis 7 was devised to test the ‘Efficiency’ moderating role. To the
best of the researchers’ knowledge, this study is the first to investigate mediating and moderating
factors in the Egyptian banking context; especially in the pandemic, which makes technology
adoption a calling need, rather than just an interesting trend with great potential.
7. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
7
Figure 2. Proposed Research Model for Readiness to IOT Applications
Therefore, the four constructs mentioned above are considered as the factors affecting the
Readiness to IOT applications in Egypt, and they are mediated by Security and Users’ Intention,
and moderated by Efficiency. Thus, the research hypotheses could be developed as follows:
H1: There is a significant impact of Research variables on Readiness to IOT applications.
H1.1: There is a significant impact of Networking on Readiness to IOT applications.
H1.2: There is a significant impact of Software development on Readiness to IOT applications.
H1.3: There is a significant impact of Complex dependencies on Readiness to IOT applications.
H1.4: There is a significant impact of Regulations on Readiness to IOT applications.
H2: There is a significant impact of Research variables on Security.
H2.1: There is a significant impact of Networking on Security.
H2.2: There is a significant impact of Software development on Security.
H2.3: There is a significant impact of Complex dependencies on Security.
H2.4: There is a significant impact of Regulations on Security.
H3: There is a significant impact of Security on Users’ Intention.
H4: There is a significant impact of Security on Readiness to IOT applications.
H5: There is a significant impact of Users’ Intention on Readiness to IOT applications.
H6: Security and Users’ Intention mediate the relationship between Research variables and
Readiness to IOT applications.
H6.1: Security mediates the relationship between Research variables and Readiness to IOT
applications.
H6.2: Users’ Intention mediates the relationship between Research variables and Readiness to
IOT applications.
H7: Efficiency moderates the relationship between Research Variables and Readiness to IOT
applications.
H7.1: Efficiency moderates the relationship between Networking and Readiness to IOT
applications.
H7.2: Efficiency moderates the relationship between Software development and Readiness to
IOT applications.
H7.3: Efficiency moderates the relationship between Complex dependencies and Readiness to
IOT applications.
H7.4: Efficiency moderates the relationship between Regulations and Readiness to IOT
applications.
Networking
Users
Intention
Software
development Security Readiness to IOT
Applications
Complex
dependencies
Regulations
Efficiency
8. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
8
4. DATA COLLECTION AND ANALYSIS
To test the hypotheses, a survey was conducted to investigate the impact and adoption of Internet
of Things in HRM at banks in Egypt. The Items used to test the constructs are mainly adapted
from previous studies. A structured questionnaire is designed as shown in Appendix, where
questionnaire items are adopted and adapted to suit the study’s context. The questionnaire is
designed in English and translated into Arabic, containing 47 statements regarding various
aspects of IOT. A five-point Likert scale is used to capture the level of agreement with each
statement. Questionnaire forms are randomly distributed in both languages, according to
respondents’ preferences over 700 employees at banks in Egypt. Data was collected on four
months duration (March 2020 – July 2020).Data collected was coded and analysed using SPSS
and AMOS to compute the reliability, validity, descriptive statistics and regression analysis to
test the research hypotheses. In order to confirm the overall structure of the research model, the
structural equation modelling (SEM) technique [55] [66] was applied. This section presents the
data analysis in order to test the research hypotheses. For data testing, convergent validity is
measured by the two main factors; the Average Variance Extracted (AVE) and the factor loading
(FL). AVE represents the average community for each latent factor, which has to be greater than
0.5 to assume adequate validity. Second is the factor loading for each item, which should be
greater than or equal to 0.4 to imply adequate validity [44]. Table 1 shows the convergent validity
test of the variables under study, namely; Networking, Software development, Complex
dependencies, Regulations, Security, User intention and Readiness to IOT applications, where all
AVE values corresponding to the mentioned variables exceed 50% and all FL values exceed
0.4.To examine reliability, each factor is measured using a group of statements, where the
consistency between these statements refers to their reliability in which it can be examined by
Cronbach's Alpha; the most common used test of reliability. The adequate reliability should be
referred by Alpha coefficients exceeding 0.7. Table 1 shows the reliability test of the research
variables, where all alpha coefficients are found to be greater than 0.7, implying adequate
reliability.
Table 1.Validity and Reliability Test
Variables KMO AVE Cronbach’s Alpha Items FL
Networking .835 59.280% .828
Item1 .541
Item2 .652
Item3 .594
Item4 .545
Item5 .632
Software
Development
.681 70.405% .784
Item1 .680
Item2 .777
Item3 .655
Complex
Dependencies
.830 62.622% .850
Item1 .561
Item2 .621
Item3 .645
Item4 .628
Item5 .677
Regulations .882 69.287% .910
Item1 .689
Item2 .706
Item3 .725
Item4 .645
Item5 .696
Item6 .696
Security .584 64.420% .714 Item1 .442
9. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
9
Variables KMO AVE Cronbach’s Alpha Items FL
Item2 .798
Item3 .692
User intention .894 48.903% .868
Item1 .481
Item2 .431
Item3 .564
Item4 .478
Item5 .464
Item6 .505
Item7 .492
Item8 .555
Item9 .432
Efficiency .814 64.447% .862
Item1 .597
Item2 .710
Item3 .630
Item4 .609
Item5 .677
Readiness to IOT
applications
.729 80.693% .879
Item1 .837
Item2 .832
Item3 .751
Descriptive analysis provides summary statistics about the research variables, including the mean
and standard deviations. Table 2 shows the descriptive analysis for the research variables, where
it could be observed that the mean of the research variables; Networking, Software development,
Complex dependencies, Regulations, Security, User intention, Efficiency and Readiness to IOT
applications are 4.0418, 3.8559, 4.0230, 3.7035, 4.1962, 4.0689, 4.0731, and 4.0146 respectively.
Table 2. Descriptive Analysis for Research variables
Research Variables N Mean Std. Deviation
Frequency
1 2 3 4 5
Networking 479 4.0418 .62239 0 0 83 293 103
Software development 479 3.8559 .61885 0 0 131 286 62
Complex dependencies 479 4.0230 .63830 0 0 92 284 103
Regulations 479 3.7035 .58913 0 0 175 271 33
Security 479 4.1962 .54418 0 0 33 319 127
User intention 479 4.0689 .54259 0 0 55 336 88
Efficiency 479 4.0731 .70628 0 0 107 258 114
Readiness to IOT applications 479 4.0146 .67980 0 0 103 238 138
Normality testing is important for determining the tests to be used in the research. In order to
check the normality for the data, two types of tests are conducted; formal and informal testing.
Table 3 shows the formal testing of normality assumption for the research variables conducted by
the Kolmogorov-Smirnov test of normality. It could be observed that the research variables are
not exactly normally distributed, as the corresponding P-values are less than 0.05, implying that
the skewness and kurtosis values are not equal to zero.
10. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
10
Table 3. Formal Testing of Normality
Kolmogorov-Smirnov
Statistic df P-value
Networking .312 479 .000
Software Development .319 479 .000
Complex Dependencies .299 479 .000
Regulations .327 479 .000
Security .376 479 .000
User intention .367 479 .000
Internet of Things .253 479 .000
Efficiency .271 479 .000
As the formal test shows that the research variables are not normally distributed, an informal test
could be used to detect the approximate normality, as the sample size is greater than 150. Table 4
shows the informal test of normality, where it could be shown that the skewness and kurtosis
values are within the accepted level of ±1. This means that the data under study are
approximately normal.
Table 4. Informal Testing of Normality
N Skewness Kurtosis
Statistic Statistic Std. Error Statistic Std. Error
Networking 479 -.028 .112 -.413 .223
Software Development 479 .102 .112 -.467 .223
Complex Dependencies 479 -.020 .112 -.535 .223
Regulations 479 .185 .112 -.589 .223
Security 479 .092 .112 -.095 .223
User intention 479 .049 .112 .353 .223
Internet of Things 479 -.104 .112 -.989 .223
Efficiency 479 -.018 .112 -.828 .223
Accordingly, the researcher is able to use the Pearson correlation, regression analysis as well as
the SEM analysis. The following shows the hypotheses testing using the assigned statistical tests.
H1: Testing the Effect of Independent variables on Readiness to IOT applications
Table 5 shows the correlation matrix between the independent variables; Networking, Software
development, Complex dependencies, Regulations, and Readiness to IOT applications. It was
observed that the values of Pearson’s correlation for the research variables; Networking, Software
development, Complex dependencies, Regulations, and Readiness to IOT applications are 0.683,
0.575, 0.651, and 0.364 respectively. Therefore, it could be claimed that there is a significant
positive correlation between the research variables and Readiness to IOT applications, as
corresponding P-values are less than 0.05 and r > 0.
11. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
11
Table 5. Correlation Matrix between independent variables on Readiness to IOT applications
1 2 3 4 5
1. Networking Pearson Correlation 1
Sig. (2-tailed)
N 479
2.Software development Pearson Correlation .591**
1
Sig. (2-tailed) .000
N 479 479
3.Complex dependencies Pearson Correlation .624**
.464**
1
Sig. (2-tailed) .000 .000
N 479 479 479
4. Regulations Pearson Correlation .291**
.319**
.274**
1
Sig. (2-tailed) .000 .000 .000
N 479 479 479 479
5.Readiness to IOT
applications
Pearson Correlation .683**
.575**
.651**
.364**
1
Sig. (2-tailed) .000 .000 .000 .000
N 479 479 479 479 479
Table 6 shows the multiple regression analysis of the influence of the independent variables;
Networking, Software development, Complex dependencies, Regulations on Readiness to IOT
applications. It was found that the P-values corresponding to the research variables; Networking,
Software development, Complex dependencies and Regulations are 0.000, 0.000, 0.000 and
0.000. Also, the coefficients are 0.383, 0.216, 0.354 and 0.141 respectively, implying a positive
significant impact of the research variables on Readiness to IOT applications. However, the R
square is 0.590 which means that the model explains 59% of the variation in Readiness to IOT
applications. Thus the first hypothesis is accepted.
Table 6. Regression Model of Independent Variables Effect on Readiness to IOT applications
Model
Unstandardized
Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
R-
Square
(Constant) -.254 .178 -1.431 .153
.590
Networking .383 .048 .337 8.044 .000
Software development .216 .043 .189 5.047 .000
Complex dependencies .354 .042 .320 8.365 .000
H2: Testing the Effect of Independent variables on Security
Table 7 shows the correlation matrix between the independent variables; Networking, Software
development, Complex dependencies, Regulations, and Security. It was observed that the values
of Pearson’s correlation for the research variables; Networking, Software development, Complex
dependencies, Regulations, and Security are 0.507, 0.475, 0.481, and 0.332 respectively.
Therefore, it could be claimed that there is a significant positive correlation between the research
variables and Security, as corresponding P-values are less than 0.05 and r > 0.
12. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
12
Table 7. Correlation Matrix between independent variables on Security
1 2 3 4 5
1. Networking Pearson Correlation 1
Sig.(2-tailed)
N 479
2.Software
development
Pearson Correlation .591**
1
Sig. (2-tailed) .000
N 479 479
3.Complex
dependencies
Pearson Correlation .624**
.464**
1
Sig. (2-tailed-) .000 .000
N 479 479 479
4. Regulations Pearson Correlation .291**
.319**
.274**
1
Sig. (2-tailed) .000 .000 .000
N 479 479 479 479
5. Security Pearson Correlation .507**
.475**
.481**
.332**
1
Sig. (2-tailed) .000 .000 .000 .000
N 479 479 479 479 479
Table 8 shows the multiple regression analysis of the influence of Networking, Software
development, Complex dependencies, Regulations on Security. it was found that P-values of the
research variables; Networking, Software development, Complex dependencies and Regulations
are all less than 0.05 and the coefficients are 0.182, 0.181, 0.183 and 0.136 respectively, implying
a positive significant impact of the research variables on Security. Thus, the second hypothesis is
accepted.
Table 8. Regression Model of Independent Variables on Security
Model
Unstandardized Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
(Constant) 1.522 .172 8.873 .000
Networking .182 .046 .208 3.963 .000
Software development .181 .041 .206 4.378 .000
Complex dependencies .183 .041 .215 4.486 .000
Regulations .136 .036 .147 3.724 .000
H3: Testing the Effect of Security on User Intention
Table 9 shows the correlation matrix between Security and User intention. There is a significant
positive correlation, as the corresponding P-value is less than 0.05 and Pearson’s correlation
coefficient is 0.599, which is greater than zero. Thus, the third hypothesis is accepted.
Table 9. Correlation Matrix between Security on User intention
Security User intention
Security Pearson Correlation 1
Sig. (2-tailed)
N 479
User intention Pearson Correlation .599**
1
Sig. (2-tailed) .000
N 479 479
13. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
13
Table 10 shows the simple regression model of the influence of Security on User intention. It
could be observed that there is a positive significant influence of Security on User intention with
regression coefficient 0.597, as well as P-value of 0.000, which is less than 0.05.
Table 10. Regression Model of Security on User intention
Model
Unstandardized Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
(Constant) 1.563 .155 10.105 .000
Security .597 .037 .599 16.332 .000
H4: Testing the Effect of Security on Readiness to IOT applications
Table 11 shows the correlation matrix between Security and Internet of Things. There is a
significant positive correlation, as the corresponding P-value is less than 0.05 and Pearson’s
correlation coefficient is 0.550, which is greater than zero.
Table 11. Correlation Matrix between Security on Internet of Things
Security User intention
Security Pearson Correlation 1
Sig. (2-tailed)
N 479
Internet of Things Pearson Correlation .550**
1
Sig. (2-tailed) .000
N 479 479
Table 12 shows the simple regression model of the influence of Security on Internet of Things. It
could be observed that there is a positive significant influence of Security on Internet of Things
with regression coefficient 0.714, as well as P-value of 0.000, which is less than 0.05.Thus, the
fourth is accepted.
Table 12. Regression Model of Security on Internet of Things
Model
Unstandardized Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
(Constant) 1.075 .210 5.121 .000
Security .714 .050 .550 14.401 .000
H5: Testing the Effect of User intention on Readiness to IOT applications
Table 13 shows the correlation matrix between User intention and Readiness to IOT applications.
There is a significant positive correlation as the corresponding P-value is less than 0.05 and
Pearson’s correlation coefficient is 0.549, which is greater than 0.
14. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
14
Table 13. Correlation Matrix between User intention and Readiness to IOT applications
User intention Internet of Things
User intention Pearson Correlation 1
Sig. (2-tailed)
N 479
Internet of Things Pearson Correlation .549**
1
Sig. (2-tailed) .000
N 479 479
Table 14 shows the simple regression model of the influence of User intention on Readiness to
IOT applications. It could be observed that there is a significant influence of User intention on
Readiness to IOT applications with regression coefficient 0.715, as well as P-value of 0.000,
which is less than 0.05. Thus, the fifth is accepted.
Table 14. Regression Model of User intention on Readiness to IOT applications
Model
Unstandardized Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
(Constant) 1.165 .204 5.696 .000
User intention .715 .050 .549 14.350 .000
H6: Testing Security and User’s Intention mediate the relationship between research
variables and Readiness to IOT Applications
Table 15 show the regression model fitted for the mediation role of Security between Research
Variables and Readiness to IOT applications. According to the results obtained from Table 6 it
could be observed that the relation between Research Variables and Readiness to IOT
applications are significant. Also, regarding the results from Table 12 it could be observed that
the relation between Security and Readiness to IOT applications is significant, so, based on the
results from Table 15 it could be noted that there is a significant effect of the Research Variables
and Readiness to IOT applications with the existence of Security which is also has a significant
effect. Further, the Security mediates the relation between the Research Variables and Readiness
to IOT applications.
Table 15. Mediation Role of Security between Research Variable and Readiness to IOT applications
Model
Unstandardized Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
(Constant) -.550 .189 -2.918 .004
Networking .347 .048 .306 7.304 .000
Software Development .181 .043 .158 4.212 .000
Complex Dependencies .318 .042 .288 7.494 .000
Regulations .115 .038 .096 3.057 .002
Security .194 .047 .150 4.160 .000
Table 16 show the regression model fitted for the mediation role of User intention between
Research Variables and Readiness to IOT applications. According to the results obtained from
Table 6 it could be observed that the relation between Research Variables and Readiness to IOT
applications are significant. Also, regarding the results from Table 14 it could be observed that
15. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
15
the relation between User intention and Readiness to IOT applications is significant, so, based on
the results from Table 16 it could be noted that there is a significant effect of the Research
Variables and Readiness to IOT applications with the existence of User intention which also has a
significant effect. Furthermore, the User intention mediates the relation between the Research
Variables and Readiness to IOT applications. Thus, the sixth hypothesis is accepted.
Table 16. Mediation Role of User intention between Research Variable and Readiness to IOT applications
Model
Unstandardized Coefficients
Standardized
Coefficients
T P-valueB Std. Error Beta
(Constant) -.619 .188 -3.301 .001
Networking .335 .047 .295 7.066 .000
Software Development .190 .042 .166 4.511 .000
Complex Dependencies .311 .042 .281 7.388 .000
Regulations .116 .037 .097 3.131 .002
User intention .228 .045 .175 5.059 .000
H7: Testing Efficiency Moderation between Independent Variables and Readiness to IOT
applications.
Table 17 shows the regression model fitted for the moderation role of Efficiency between
Networking and Readiness to IOT applications. It was found that there is a significant moderation
of Efficiency between Networking and Efficiency as the P-value is less than 0.05 and correlation
coefficient is -0.119.
Table 17. Moderation Role of Efficiency between Networking and Readiness to IOT applications
Model
Unstandardized Coefficients
Standardized
Coefficients
t P-valueB Std. Error Beta
(Constant) -1.219 1.005 -1.214 .225
Networking 1.212 .249 1.068 4.867 .000
Efficiency .587 .248 .565 2.366 .018
Network * Efficiency -.119 .060 -.779 -1.993 .047
Testing the Efficiency moderation between Software development and Readiness to IOT
applications: Table 18 shows the regression model fitted for the moderation role of Efficiency
between Software development and Readiness to IOT applications. It was found that there is a
significant moderation of Efficiency between Software development and Efficiency as the P-
value is less than 0.05 and correlation coefficient is -0.251.
Table 18. Moderation Role of Efficiency between Software development and Readiness to IOT
applications
Model
Unstandardized Coefficients
Standardized
Coefficients
t P-valueB Std. Error Beta
(Constant) -3.264 .941 -3.471 .001
Software development 1.620 .245 1.419 6.608 .000
Efficiency 1.247 .226 1.201 5.516 .000
Software Development *
Efficiency
-.251 .058 -1.470 -4.323 .000
16. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
16
Testing the Efficiency moderation between Complex dependencies and Readiness to IOT
applications: Table 19 shows the regression model fitted for the moderation role of Efficiency
between Complex dependencies and Readiness to IOT applications. It was found that there is a
significant moderation of Efficiency between Complex dependencies and Efficiency as the P-
value is less than 0.05 and correlation coefficient is -0.119.
Table 19. Moderation Role of Efficiency between Complex dependencies and Readiness to IOT
applications
Model
Unstandardized Coefficients
Standardized
Coefficients
t P-valueB Std. Error Beta
(Constant) -1.037 .952 -1.089 .277
Complex dependencies 1.129 .235 1.021 4.799 .000
Efficiency .626 .240 .602 2.610 .009
Complex Dependencies *
Efficiency
-.119 .058 -.771 -2.061 .040
Testing the Efficiency moderation between Regulations and Readiness to IOT applications: Table
20 shows the regression model fitted for the moderation role of Efficiency between Regulations
and Readiness to IOT applications. It was found that there is an insignificant moderation of
Efficiency between Regulations and Efficiency as the P-value is more than 0.05 and correlation
coefficient is 0.122.
Table 20. Moderation Role of Efficiency between Regulations and Readiness to IOT applications
Model
Unstandardized Coefficients
Standardized
Coefficients
t P-valueB Std. Error Beta
(Constant) 3.283 1.050 3.128 .002
Regulations -.173 .289 -.144 -.600 .549
Efficiency -.098 .252 -.094 -.390 .697
Regulations * Efficiency .122 .068 .677 1.784 .075
Thus, the seventh hypothesis is partially accepted. Table 21 shows the SEM analysis of the
influence of the research variables; Networking, Software development, Complex dependencies,
Regulations on Readiness to IOT applications. It was found that the model fit indices; CMIN/df =
2.151, GFI = 0.921, CFI = 0.960, and RMSEA = 0.049 are all within their acceptable levels. It
was also found that there is a significant influence of Networking, Software development,
Complex dependencies, and Regulations on the Readiness to IOT applications with Estimates of
0.596, -0.193, 0.222 and 0.139 respectively, as well as the P-values are less than 0.05.
Table 21. SEM for Research Model
Estimate P
Readiness to IOT
applications
<--- Networking .596 ***
Readiness to IOT
applications
<--- Software development -.193 .040
Readiness to IOT
applications
<--- Complex dependencies .222 .025
Readiness to IOT
applications
<--- Regulations .139 .034
17. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
17
Figure 3. SEM Model for the Direct Impact on Readiness to IOT applications
Table 22 show the SEM analysis of the influence of the research variables; Networking, Software
development, Complex dependencies, Regulations, Security, and User intention on Readiness to
IOT applications. It was also found that there is a significant influence of Networking, and
Regulations on Security with Estimates of 0.220 and 0.070 respectively, as well as the P-values
are less than 0.05, while, there is a significant influence of Software development, Complex
dependencies, and Regulations on User intention with Estimates of 0.199, 0.195 and 0.119
respectively, as well as the P-values are less than 0.05. Furthermore, there is a significant
influence of Networking, Complex dependencies, and Regulations on Readiness to IOT
applications with Estimates of 0.658, 0.313 and 0.155 respectively, as well as the P-values are
less than 0.05. Also, it was found that the model the model fit indices are; CMIN/df = 1.625, GFI
= 0.909, CFI = 0.961, and RMSEA = 0.036 are all within their acceptable levels.
Table 22. SEM for Research Model
Estimate P
Security <--- Networking .220 ***
Security <--- Software Development .075 .069
Security <--- Complex Dependencies .088 .078
Security <--- Regulations .070 .019
Users Intention <--- Networking .129 .062
Users Intention <--- Software Development .199 ***
Users Intention <--- Complex Dependencies .195 .006
Users Intention <--- Regulations .119 .004
Readiness to IOT appl. <--- Networking .658 ***
Readiness to IOT appl. <--- Software Development -.153 .124
Readiness to IOT appl. <--- Complex Dependencies .313 .008
Readiness to IOT appl. <--- Regulations .155 .026
Readiness to IOT appl. <--- Security -.228 .157
Readiness to IOT appl. <--- Users Intention -.127 .223
18. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
18
Figure 4. SEM Model for the Mediation Role of Security and User Intention
Table 23 show the SEM analysis of the influence of the whole model on Readiness to IOT
applications. It was also found that there is a significant influence of research variables;
Networking, Software development, Complex dependencies, and Regulations on Security with
Estimates of 0.178, 0.059, 0.120 and 0.078 respectively, as well as the P-values are less than
0.05, while, there is a significant influence of Networking, Software development, Complex
dependencies, and Regulations on User intention with Estimates of 0.158, 0.088, 0.253 and 0.112
respectively, as well as the P-values are less than 0.05. Furthermore, there is a significant
influence of Software development, and Regulations on Readiness to IOT applications with
Estimates of -0.143 and -0.421 respectively, as well as the P-values are less than 0.05. Also, it
was found that the model fit indices are; CMIN/df = 1.790, GFI = 0.890, CFI = 0.962, and
RMSEA = 0.041 are all within their acceptable levels.
19. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
19
Table 23. SEM for Research Model
Estimate P
Security <--- Networking .178 ***
Security <--- Software Development .059 .014
Security <--- Complex Dependencies .120 .001
Security <--- Regulations .078 .008
User intention <--- Networking .158 ***
User intention <--- Software Development .088 .008
User intention <--- Complex Dependencies .253 ***
User intention <--- Regulations .112 .006
Readiness to IOT
applications
<--- Networking -.217 .390
Readiness to IOT
applications
<--- Software Development -.143 .025
Readiness to IOT
applications
<--- Complex Dependencies -.086 .773
Readiness to IOT
applications
<--- Regulations -.421 ***
Readiness to IOT
applications
<--- Security .092 .159
Readiness to IOT
applications
<--- User intention -.035 .418
Readiness to IOT
applications
<--- N.E .065 .197
Readiness to IOT
applications
<--- SD.E .036 .016
Readiness to IOT
applications
<--- CD.E .028 .561
Readiness to IOT
applications
<--- R.E .090 ***
Figure. 5. SEM Model for the whole model
20. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
20
5. CONCLUSION
Internet of Things is the fastest growing new technology that we perceive in the present world.
IOT provides many applications to identify and connect objects to each other through the
Internet. Although its potential is obvious in transforming the way organisations conduct
business, yet it did not dominate in organizations; especially in HRM practices. This research
thoroughly investigated Readiness to IOT applications through an extensive review of literature
and conducting a survey in order to identify the main factors affecting Readiness to IOT
applications in the Egyptian banking industry, while determining the mediating and moderating
factors involved in the research model. Results proved that there is a significant positive impact
of ‘Networking’, ‘Software Development’, ‘Complex Dependencies’ and ‘Regulations’ on
‘Readiness to IOT applications’. These results clearly match the literature found regarding those
variables and their effect on employee readiness [16] and [44]. Although few studies investigated
factors that affect readiness to IOT applications in banks, and almost negligible investigations
were done on mediating and moderating factors, ‘Security’ and ‘User intention’ proved to affect
the readiness to using IOT [7] [15] [50]. Results showed that ‘Security’ and ‘User intention’
significantly mediate the relationship between ‘Networking’, ‘Software Development’, ‘Complex
Dependencies’ and ‘Regulations’ and ‘Readiness to IOT applications’. Literature showed that
businesses aim to be more efficient and responsive by having a better control through strong
governance, better communication, efficient coordination and cumulative vision of the
organisation [71].‘Efficiency’ was introduced as a moderator for the model, in order to examine
whether its importance stems from its impact on strengthening the relationship between the
research variables and the readiness to IOT applications. ‘Efficiency’ was found to have a
significant impact on ‘Readiness to IOT applications’, with R Square of 0.59, which is relatively
large contribution of ‘Efficiency’ in the variation of ‘Readiness to IOT applications’. Efficiency
was also found to play a partial significant moderation role between the independent research
variable together with ‘Readiness to IOT applications’.
5.1. Theoretical Contributions
The current study examined the determining factors of employees’ readiness to IOT applications
in the Egyptian banking industry. The study’s results not just test and confirm that the main
factors affecting readiness to IOT applications identified in literature, still stand in the Egyptian
banking context, but also indicate that ‘Security’ and ‘User intention’ are mediating factors that
explain the relationship between the independent research variables and the readiness to IOT
applications. Based on the statistical analysis, although users tend to be more ready to IOT
applications if ‘Networking’, ‘Software Development’, ‘Complex dependencies’ and
‘Regulations’ were maintained, ‘Security’ and ‘Users Intention’ play a mediating role. The study
also proves the moderating role of ‘Efficiency’; which implies that ‘Efficiency’ strengthens the
relationship between all independent variables except ‘Regulations’, and IOT applications’
readiness.
5.2. Research Contributions
This study contributes to the understanding of readiness to IOT applications by identifying the
mediating role of ‘Security’ and ‘Users Intention’, and the moderating role of ‘Efficiency’. The
study also contributes to fills a gap on the Egyptian banking context in particular. Finally, it
provides a building block for further academic investigations as proposed in the study’s future
work. In addition to its theoretical relevance, this study has several practical implications. IOT
applications have great potential to facilitate banking transactions. In order to ensure unlocking
its full potential, it must be perceived as a secure method for transactions. The present study’s
21. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
21
results can provide decision makers at banks with useful guidelines on how to optimally promote
IOT applications among employees. For example, the findings revealed that perceived security
with IOT applications is a determining driver to readiness to IOT applications. Since new security
challenges will always arise, keeping the entire linked banking experience safe and secure is
crucial to gain user trust. This implies that while creating awareness and motivating employees to
engage, decision makers should emphasize the security of transactions. The study also
emphasizes the mediating role of ‘User intention’; this could be a clear indication to decision
makers that users will not be ready to IOT applications unless they are motivated by key factors
in order to enhance user intention. Thus, key drivers will not have the required impact, except
through ‘User Intention’ together with ‘Security’. On the other hand, the partial moderating role
of ‘Efficiency’ proven by the study should be the base to decision makers and practitioners when
implementing IOT applications. The study highlights the importance of efficiency in IOT
applications; as it positively enhances the relationship between ‘Networking’, ‘Software
Development’, and ‘Complex Dependencies’ on one side and readiness to IOT applications on
the other. Finally, this investigation should pave the way to decision makers and practitioners
5.3. Research Limitations and Future Work
The current research faced a number of limitations. The lack of data on IOT in the Egyptian
banking context, did not allow room for conducting a comparative study between studies
conducted in Egypt compared to those on a different context. Moreover, questionnaires were only
distributed over employees at banks. It is recommended that the model should be tested across
various sectors other than the banking industry. A longitudinal study may also reveal different
results. Furthermore, the study only investigated the perspective of HR employees; a stakeholder
analysis may reveal similarities or differences. Finally, the model explains 59% of the variations
of Readiness to IOT applications in HRM, other factors that may affect Readiness to IOT
applications could be worth investigating in order to have a more comprehensive study.
REFERENCES
[1] Abd El Aziz, R., Beeson, I., and Hussien, M. I. (2018), “A Soft Systems Methodology Based
Analysis of the ATM System in Egypt”, International Journal of Computer and Information
Technology (ISSN: 2279 – 0764) 7(4), 176 – 183.
[2] Abd El Aziz, R., El Badrawy, R., and Hussien, M. I. (2014). ‘ATM, Internet Banking and Mobile
Banking Services in a Digital Environment: The Egyptian Banking Industry’. International Journal of
Computer Applications, 90 (8).
[3] Abed A.H., Nasr M., Sayed B. (2020), ‘The Principle Internet of Things (IoT) Security Techniques
Framework Based on Seven Levels IoT’s Reference Model’. In: Ghalwash A., El Khameesy N.,
Magdi D., Joshi A. (eds) Internet of Things—Applications and Future. Lecture Notes in Networks
and Systems, 114. Springer, Singapore, pp 219-237, 978-981-15-3074-6
[4] Abdelmoumen, R. (2019). A Review of Link Layer Protocols for Internet of Things. International
Journal of Computer Applications, 182 (46), 0975 – 8887.
[5] Alhalafi, N and Veeraraghavan, P. (2019). Privacy and Security Challenges and Solutions in IOT: A
review. International Conference on Smart Power and Internet Energy Systems. doi:10.1088/1755-
1315/322/1/012013.
[6] AlHogail, A. (2018). Improving IOT Technology Adoption through Improving Consumer Trust,
Technologies, 6(4).
[7] Ali, I. Sabir,s and Ullah, Z. (2016). Internet of Things Security, Device Authentication and Access
Control: A Review. International Journal of Computer Science and Information Security, 14, 456.
[8] Alur, R., Berger, E., Drobnis, A. W., Fix, L., Fu, K., Hager, G. D., Lopresti, D., Nahrstedt, K.,
Mynatt, E., Patel Sh., Rexford, J., Stankovic, J A., and Zorn, B (2016). Systems computing
challenges in the Internet of Things. Computing Community Consortium.
22. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
22
[9] Angrave, D., Charlwood, A., Kirkpatrick, I., Lawrence, M., and Stuart, M. (2016). HR and analytics:
why HR is set to fail the big data challenge. Human Resource Management Journal, 26(1), 1-11.
[10] Arshad, R, Zahoor S, Shah MA, Wahid A, Yu H (2017) Green IoT: An investigation on energy
saving practices for 2020 and beyond. IEEE Access 5:15667–15681
[11] AzharNaima, M. (2019).Factors Affecting the Acceptance of E-HRM in Iraq. International Journal of
Academic Research in Business and Social Sciences, 9(2)., 265-276.
[12] Banga, K., and teVelde, D. W. (2018). Digitalisation and the Future of Manufacturing in Africa.
[13] Barman, A., Das. K. (2018). Internet of Things (IOT) as the Future Smart Solution to HRM-How
would wearable IOT bring organisational efficiency? Introduction: Rise of HR Technology.
International Conference Dec, 2018 organised by RDA at Sibsagar, Assam.
[14] Bibri S. (2020) TheIoT and Big Data Analytics for Smart Sustainable Cities: Enabling Technologies
and Practical Applications. In: Advances in the Leading Paradigms of Urbanism and their
Amalgamation. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for
Sustainable Development). Springer, Cham, pp 191-226.
[15] Bilal, M. (2017). A Review of Internet of Things Architecture, Technologies and Analysis
Smartphone-based Attacks Against 3D printers. arXiv preprint arXiv:1708.04560.
[16] Brass, I., Tanczer, L., Carr, M., Elsden, M., and Blackstock, J. (2018). Standardising a moving target:
The development and evolution of IoT security Standards, 1-9.
[17] Burhanuddin, M. A., Mohammed, A. A. J., Ismail, R., and Basiron, H. (2017). Internet of Things
Architecture: Current Challenges and Future Direction of Research. International Journal of Applied
Engineering Research, 12(21), 11055-11061.
[18] Castells, M. and Castells, M. (1971), The rise of the network society, 2nd ed., With a new pref.
Chichester, West Sussex ; Malden, MA: Wiley-Blackwell, 2010.
[19] Charmonman, S., Mongkhonvanit, P., Dieu, V., and Linden, N. (2015). Applications of internet of
things in e-learning.International Journal of the Computer, the Internet and Management, 23(3), 1-4.
[20] Chang, S. E. & Lin, C. S. (2007). Exploring organizational culture for information security
management. Industrial Management & Data Systems, 107(3), 438-458.
https://doi.org/10.1108/02635570710734316
[21] Chang, V., Muñoz, V.M. &Ramachandran, M. (2020), ‘Emerging applications of internet of things,
big data, security, and complexity’: special issue on collaboration opportunity for IoTBDS and
COMPLEXIS. Computing 102, 1301–1304 (2020).https://doi.org/10.1007/s00607-020-00811-y
[22] Chen, H., & Li, W. (2014, June). Understanding Organization Employee's Information Security
Omission Behavior: an Integrated Model of Social norm and Deterrence. In PACIS (p. 280).
[23] Čolaković, A., and Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling technologies,
challenges, and open research issues. Computer Networks, 144 (2018), 17-39.
[24] Dewa, M.T, van der Merwe, A.F and Matope, S. (2018). Digitalisation of shop-floor operations in the
south African tool, die, and mould- making industry’. South African Journal of Industrial
Engineering, 29(2),153-170.
[25] Diver, S. (2007). Information security policy-a development guide for large and small
companies. Sans Institute, 1-37.
[26] El Saghier, N., and Nathan, D. (2013, April).Service quality dimensions and customers’ satisfactions
of banks in Egypt.In Proceedings of 20th International Business Research Conference. 13.
[27] Elsaadany, A., and Soliman, M. (2017). Experimental Evaluation of Internet of Things in the
Educational Environment. International Journal of Engineering Pedagogy (iJEP), 7(3), 50-60.
[28] Emrah, I and Mehmet, B. (2018). ‘Internet of Things (IOT): The Most Up-To-Date Challenges,
Architectures, Emerging Trends and Potential Opportunities’. International Journal of Computer
Applications. 179 (40), 0975 – 8887.
[29] Erceg, A (2019). Information security: threat from employees. JO -Tehničkiglasnik. Pp. 123-128.
Vol. 13.DO - 10.31803/tg-20180717222848
[30] Eshan, MRandBinoy, TA. (2018). The Role of Digitalization in Human Resource Management in
Star Category Hotels: A Review. Journal of Emerging Technologies and Innovative Research
(JETIR), 5(12), 203-211.
[31] Fernández-Caramés, T. M., and Fraga-Lamas, P. (2018). A Review on the Use of Blockchain for the
Internet of Things. IEEE Access.
23. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
23
[32] Fernandes E, Rahmati A, Eykholt K, Prakash A. Internet of things security research: a rehash of old
ideas or new intellectual challenges? IEEE Secur Priv. 2017;15(4):79–84
[33] Fosty, V., Eleftheriadou, D., Combes, C., Willemsens, B.,Wauters, P., and Vezbergiene, A. (2013).
Doing Business in the Digital Age: The Impact of New ICT Developments in the Global Business
Landscape – Europe’s Vision and Action Plan to Foster Digital Entrepreneurship, 1–71.
[34] Gallego, B. C., and Drexl, J. (2019). IoT Connectivity Standards: How Adaptive is the Current SEP
Regulatory Framework?. IIC-International Review of Intellectual Property and Competition
Law, 50(1), 135-156.
[35] Gierlich, M., Volkwein, M., Schü ritz, R., Hess, T (2019). SMEs’ Approaches for Digitalization in
Platform Ecosystems. Twenty-Third Pacific Asia Conference on Information Systems, China 2019.
[36] Gubbi, J., Buyya, B., Marusic, S., Palaniswami, M. (2014). Internet of Things (IOT): A vision,
architectural elements, and future directions. Future Generation Computer Systems, 29, 1645-1660.
[37] Henriette, E., Feki, M., and Boughzala, I. (2015). The Shape of Digital Transformation: A Systematic
Literature review’ MCIS 2015 Proceedings. 10.
[38] Hsu, C. L., and Lin, J. C. C. (2018). Exploring Factors Affecting the Adoption of Internet of Things
Services. Journal of Computer Information Systems, 58(1), 49-57.
[39] Hussien, M. I., Abd El Aziz, R., &Oatley, G. (2014). Perception and ranking of internet banking
service quality from banker perspective in public and private banks in Egypt. International Journal of
Research, 1(8).
[40] Hussien, M, I. and Abd El-Aziz, R. (2019), ‘System Dynamics Modelling and Simulation for E-
Banking: The Egyptian Context’. In Martin Garcia, Juan (Ed.), Modelling the Economy: Money and
Finances.Selected Papers on System Dynamics Collection, (pp. 70 - 84). KDP Publishers, ISBN:
9781687003133.
[41] Hussien, M. I. and Abd El Aziz, R. (2016), 'Simulating Banking Service Quality Websites in Egypt:
A System Dynamic Approach', In Proceedings of the 28th International Business Information
Management Association Conference, 9-10 November 2016, Seville, Spain, 4325-4340, ISBN: 978-
0-9860419-8-3.
[42] Hussien, M., I., and Abd El Aziz, R. (2017), ‘System Dynamics Modelling and Simulation for E-
Banking: The Egyptian Context’, IBIMA Business Review Journal, 2017, 1-17. DOI: 10.5171/2017.
904520. ISSN: 1947-3788
[43] Jindal, F., Jamar, R., and Churi, P. (2018). Future and challenges of internet of things. International
Journal of Computer Science and Information Technology (IJCSIT), 10 (2), 13-25.
[44] Hair, J., Carole L. Hollingsworth, Adriane B. Randolph, Alain Yee Loong Chong, (2017), ‘An
updated and expanded assessment of PLS-SEM in information systems research’, Industrial
Management and Data Systems, 117(3), 442-458.
[45] Kandil. O. and Abd El Aziz, R. (2018), ‘Evaluating the Supply Chain information flow in Egyptian
SMEs using Six Sigma: A Case Study’, International Journal of Lean Six Sigma, 9 (4), Emerald, DOI
10.1108/IJLSS-10-2016-0066.
[46] Kandil, O., Abd El Aziz, R., Rosillo, R., and De la Fuente, D. (2019), ‘Investigating the Impact of
Internet of Things on the Educational Business Process', In Proceedings of the 13th International
Conference on Industrial Enginering and Industrial Management, 11-12 July 2019, Gijón, Spain.
[47] Kaushal, P. & Khan, R. (2018). A Review on Information Security. International Journal of
Advanced Research in Computer Science and Software Engineering, 8(4), 122-124.
https://doi.org/10.23956/ijarcsse.v8i4.646
[48] Khanboubi, F., Boulmakoul, A., and Tabaa, M. (2019). Impact of digital trends using IoT on banking
processes. Procedia Computer Science, 151, 77-84.
[49] Kumar, M., Annoo, K., and Mandal, R. K. (2018). The Internet of Things Applications for
Challenges and Related Future Technologies and Development. context, 5(1).
[50] Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Parizi, R. M., and Choo, K. K. R. (2018). Fog data
analytics: A taxonomy and process model. Journal of Network and Computer Applications.
[51] Lee, S. K., Bae, M., and Kim, H. (2017). Future of IOT networks: A survey. Applied Sciences, 7(10),
1072.
[52] Mathew, N and Nitha, K. (2016), ‘Smart Academy an IOT approach: A survey on IOT in education’,
International Journal of Advanced Research Trends in Engineering and Technology, 3 (2), ISSN
2394-3777 (Print), ISSN 2394-3785 (Online).
[53] Maynard, S. B., Ruighaver, A. B., & Ahmad, A. (2011). Stakeholders in security policy development.
24. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
24
[54] MCIT (2019), ICT Indicators in Brief, official report for the Egyptian Ministry of Communication
and Information Technology, available at:
http://www.mcit.gov.eg/Upcont/Documents/Publications_912020000_ICT_Indicators_in_Brief_Nov
ember_2019.pdf (accessed January 18, 2020).
[55] McQuitty S, Wolf M (2013) Structural equation modelling: a practical introduction. J Afr Bus 14(1),
58–69.
[56] Narodnenovine. (2007). Zakon o tajnostipodatakaiinformacijskojsigurnosti (in Croatian)
[57] Momani, A. M. (2020). The Unified Theory of Acceptance and Use of Technology: A New Approach
in Technology Acceptance. International Journal of Sociotechnology and Knowledge Development
(IJSKD), 12(3), 79-98.
[58] Ndung’u, N. S. (2018). Harnessing Africa’s digital potential: New tools for a new age.
[59] Neeraj. (2018). Role of Digitalization in Human Resource Management.International Journal of
Emerging Technologies and Innovative Research (www.jetir.org). 5(1), 284-288.
[60] Nura, B. and Baharudin, A (2020). Determinants of Users’ Intention to Use IoT: A Conceptual
Framework. Emerging Trends in Intelligent Computing and Informatics (pp.980-990)
DOI: 10.1007/978-3-030-33582-3_92
[61] Omoyiola, B. (2020). Factors affecting IOT adoption. Journal of Computer Engineering (IOSR-JCE),
21(6), 19-24.
[62] Parviainen, P., Tihinen, M., Kääriäinen, J., and Teppola, S. (2017). Tackling the digitalization
challenge: how to benefit from digitalization in practice. International Journal of information systems
and project management, 5(1), 63-77.
[63] Raza, S., Misra, P., He, Z., and Voigt, T. (2017). Building the Internet of Things with bluetooth
smart. Ad Hoc Networks, 57, 19-31.
[64] Rose GA, and Rowe S. 2015. Northern cod comeback. Canadian Journal of Fisheries and Aquatic
Sciences, 72: 1789–1798. DOI: 10.1139/cjfas-2015-0346.
[65] Rossman, J. (2016). The Amazon Way on IOT: 10 Principles for Every Leader from the World's
Leading Internet of Things Strategies”, Clyde Hill Publishing.
[66] Roussou, I., Stiakakis, E., Sifaleras, A. (2019), An empirical study on the commercial adoption
of digital currencies, Syst E-Bus Manage 17:223–259 (2019). https://doi.org/10.1007/s10257-019-
00426-7
[67] Ryan, P. J., and Watson, R. B. (2017). Research Challenges for the Internet of Things: What Role
Can OR Play?. Systems, 5(1), 24.
[68] Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., and Ande, R. (2018). IoT standardisation:
challenges, perspectives and solution. In Proceedings of the 2nd International Conference on Future
Networks and Distributed Systems (p. 1). ACM.
[69] Schumacher, A., Sihn, W., and Erol, S. (2016), “Automation, digitization and digitalization and their
implications for manufacturing processes”, Conference: Innovation and Sustainability International
Scientific Conference. Sustainable Innovative Solutions 2nd Edition, Bucharest, Romania
[70] Sethi, P., and Sarangi, S. R. (2017). Internet of things: architectures, protocols, and
applications. Journal of Electrical and Computer Engineering.
[71] Shang, X., Yin, H., Liu, A., Wang, Y., and Wang, Y. (2020), Secure Green-Oriented Multiuser
Scheduling for Wireless-Powered Internet of Things, Special issue of Recent Advances in Security
and Privacy Issues for Internet of Things Applications, Wireless Communications and Mobile
Computing, Wiley, 1-11. https://doi.org/10.1155/2020/7845107
[71] Singh, P. (2017). Impact of digitalization on small and medium enterprises in India. Indian Journal of
Research, 6(4), 468-469.
[72] Strohmeier, S. (2018). Smart HRM–a Delphi study on the application and consequences of the
Internet of Things in Human Resource Management. The International Journal of Human Resource
Management, 1-30.
[73] Stone, D. L., Deadrick, D. L., Lukaszewski, K. M., & Johnson, R. (2015). The influence of
technology on the future of human resource management. Human Resource Management Review,
25(2), 216–231. https://psycnet.apa.org/doi/10.1016/j.hrmr.2015.01.002
[74] Talari, S., Shafie-Khah, M., Siano, P., Loia, V., Tommasetti, A., and Catalão, J. (2017). A review of
smart cities based on the internet of things concept. Energies, 10(4), 421.
25. International Journal of Managing Information Technology (IJMIT) Vol.12, No.4, November 2020
25
[75] Torchia, M., Shirer, M.,( 2019). IDC Forecasts Worldwide Spending on the Internet of Things to
Reach $745 Billion in 2019, Led by the Manufacturing, Consumer, Transportation, and Utilities
Sectors, International Data Corporation.
[77] Uviase, O., and Kotonya, G. (2018). IOT architectural framework: connection and integration
framework for IOT systems. arXiv preprint arXiv:1803.04780.
[78] Venkatesh, A. N. (2017). ‘Connecting the Dots: Internet of Things and Human Resource
Management’. American International Journal of Research in Humanities, Arts and Social Sciences,
17(1), 21-24
[79] Vankatesh, V., J. Thong, and X. Xu. (2012) “Consumer Acceptance and Use of Information
Technology: Extending The Unified Theory of Acceptance and Use of Technology.” MIS Quarterly
36 (1): 157-178.
[80] Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information
technology: Toward a unified view. MIS Quarterly, 27(3), 425-478
[81] Venkatesh, V., Thong, J. Y., &Xu, X. (2016). Unified theory of acceptance and use of technology: A
synthesis and the road ahead. Journal of the association for Information Systems, 17(5), 328-376.
[82] Vivekananth.P. (2016). The Impact of Internet of Things (IOT) in Human Resource Management.
IPASJ International Journal of Management (IIJM), 4 (9),1-3.
[83] Wachel, R. “Humanities and Computers,” North Am. Rev., pp. 30–32, 1971.
[84] Yadav, P., Mittal, A., and Yadav, H. (2018). IOT: Challenges and Issues in Indian Perspective. 3rd
IEEE International Conference on Internet of Things: Smart Innovation and Usages (IOT-SIU 2018),
24-25.
[85] Ziegeldorf, J. H., Morchon, O. G., and Wehrle, K. (2014). Privacy in the Internet of Things: threats
and challenges. Security and Communication Networks, 7(12), 2728-2742.
[86] Internet World Stats, (2019), https://www.internetworldstats.com/stats5.htm
Appendix: Questionnaire Form