The proposed methodology allows a comprehensive assessment of the various types of value generated by a PSI e-infrastructure for each stakeholder group, and also the interconnections among them.
Evaluation of E-Learning Web Sites Using Fuzzy Axiomatic Design Based ApproachGurdal Ertek
Â
High quality web site has been generally recognized as a critical enabler to conduct online business. Numerous studies exist in the literature to measure the business performance in relation to web site quality. In this paper, an axiomatic design based approach for fuzzy group decision making is adopted to evaluate the quality of e-learning web sites. Another multi-criteria decision making technique, namely fuzzy TOPSIS, is
applied in order to validate the outcome. The methodology proposed in this paper has the advantage of incorporating requirements and enabling reductions in the problem size, as compared to fuzzy TOPSIS. A case study focusing on Turkish e-learning websites is presented, and based on the empirical findings, managerial implications and recommendations
for future research are offered.
http://research.sabanciuniv.edu.
Rule-based expert systems for supporting university studentsertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/rule-based-expert-systems-for-supporting-university-students/
There are more than 15 million college students in the US alone. Academic advising for courses and scholarships is typically performed by human advisors, bringing an immense managerial workload to faculty members, as well as other staff at universities. This paper reports and discusses the development of two educational expert systems at a private international university. The first expert system is a course advising system which recommends courses to undergraduate students. The second system suggests scholarships to undergraduate students based on their eligibility. While there have been reported systems for course advising, the literature does not seem to contain any references to expert systems for scholarship recommendation and eligibility checking. Therefore the scholarship recommender that we developed is first of its kind. Both systems have been implemented and tested using Oracle Policy Automation (OPA) software.
Competitiveness of Top 100 U.S. Universities: A Benchmark Study Using Data En...ertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/benchmark-study-using-data-envelopment-analysis/
This study presents a comprehensive benchmarking study of the top 100 U.S. Universities. The methodologies used to come up with insights into the domain are Data Envelopment Analysis (DEA) and information visualization. Various approaches to evaluating academic institutions have appeared in the literature, including a DEA literature dealing with the ranking of universities. Our study contributes to this literature by the extensive incorporation of information visualization and subsequently the discovery of new insights.
Microscopic modeling and simulation of vehicle parking (systematic review)Aboubakr Moubarak
Â
This article achieves a comprehensive and detailed presentation of various contributions made by the scientific community in terms of analysis and understanding of the negative externalities resulting from the vehicle parking operation in the urban space such as congestion, accidents, environmental nuisances, and many others, and this by relying on microscopic modeling and simulation that analyze the behaviors of each component of the transportation system individually
Industrial Benchmarking through Information Visualization and Data Envelopmen...ertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/industrial-benchmarking-through-information-visualization-and-data-envelopment-analysis-a-new-framework/
We present a benchmarking study on the companies in the Turkish food industry based on their financial data. Our aim is to develop a comprehensive benchmarking framework using Data Envelopment Analysis (DEA) and information visualization. Besides DEA, a traditional tool for financial benchmarking based on financial ratios is also incorporated. The consistency/inconsistency between the two methodologies is investigated using information visualization tools. In addition, k-means clustering, a fundamental method from machine learning, is applied to understand the relationship between k-means clustering and DEA.
Improving Technological Services and Its Effect on the Policeâs PerformanceEditor IJCATR
Â
The role of police department in any country is critical. It is obvious that improving the technology in police department can
be done with safety and contributes to improve its economy. This paper, first tries to recognize the existed weaknesses in used
technologies. Then, it will suggest the best approach. The proposed framework of this study points out to two different moderating
roles that can be considered as technical contributions. Moreover, the combination of this proposed framework is new for current
study. This framework is concentrated on technology improvement, knowledge management system, technology acceptance, police
performance, and ministry performance
Chapter 2 Evaluation of E-Portfolio Systems Klaus Himpsl & Peter BaumgartnerDaniel Dufourt
Â
Buzzetto-More, N. (Eds.). (2010).
The E-Portfolio Paradigm:
Informing, Educating, Assessing and Managing with E-Portfolios
Santa Rosa, California: Informing Science Press. (pp. 19-33).
Evaluation of E-Learning Web Sites Using Fuzzy Axiomatic Design Based ApproachGurdal Ertek
Â
High quality web site has been generally recognized as a critical enabler to conduct online business. Numerous studies exist in the literature to measure the business performance in relation to web site quality. In this paper, an axiomatic design based approach for fuzzy group decision making is adopted to evaluate the quality of e-learning web sites. Another multi-criteria decision making technique, namely fuzzy TOPSIS, is
applied in order to validate the outcome. The methodology proposed in this paper has the advantage of incorporating requirements and enabling reductions in the problem size, as compared to fuzzy TOPSIS. A case study focusing on Turkish e-learning websites is presented, and based on the empirical findings, managerial implications and recommendations
for future research are offered.
http://research.sabanciuniv.edu.
Rule-based expert systems for supporting university studentsertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/rule-based-expert-systems-for-supporting-university-students/
There are more than 15 million college students in the US alone. Academic advising for courses and scholarships is typically performed by human advisors, bringing an immense managerial workload to faculty members, as well as other staff at universities. This paper reports and discusses the development of two educational expert systems at a private international university. The first expert system is a course advising system which recommends courses to undergraduate students. The second system suggests scholarships to undergraduate students based on their eligibility. While there have been reported systems for course advising, the literature does not seem to contain any references to expert systems for scholarship recommendation and eligibility checking. Therefore the scholarship recommender that we developed is first of its kind. Both systems have been implemented and tested using Oracle Policy Automation (OPA) software.
Competitiveness of Top 100 U.S. Universities: A Benchmark Study Using Data En...ertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/benchmark-study-using-data-envelopment-analysis/
This study presents a comprehensive benchmarking study of the top 100 U.S. Universities. The methodologies used to come up with insights into the domain are Data Envelopment Analysis (DEA) and information visualization. Various approaches to evaluating academic institutions have appeared in the literature, including a DEA literature dealing with the ranking of universities. Our study contributes to this literature by the extensive incorporation of information visualization and subsequently the discovery of new insights.
Microscopic modeling and simulation of vehicle parking (systematic review)Aboubakr Moubarak
Â
This article achieves a comprehensive and detailed presentation of various contributions made by the scientific community in terms of analysis and understanding of the negative externalities resulting from the vehicle parking operation in the urban space such as congestion, accidents, environmental nuisances, and many others, and this by relying on microscopic modeling and simulation that analyze the behaviors of each component of the transportation system individually
Industrial Benchmarking through Information Visualization and Data Envelopmen...ertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/industrial-benchmarking-through-information-visualization-and-data-envelopment-analysis-a-new-framework/
We present a benchmarking study on the companies in the Turkish food industry based on their financial data. Our aim is to develop a comprehensive benchmarking framework using Data Envelopment Analysis (DEA) and information visualization. Besides DEA, a traditional tool for financial benchmarking based on financial ratios is also incorporated. The consistency/inconsistency between the two methodologies is investigated using information visualization tools. In addition, k-means clustering, a fundamental method from machine learning, is applied to understand the relationship between k-means clustering and DEA.
Improving Technological Services and Its Effect on the Policeâs PerformanceEditor IJCATR
Â
The role of police department in any country is critical. It is obvious that improving the technology in police department can
be done with safety and contributes to improve its economy. This paper, first tries to recognize the existed weaknesses in used
technologies. Then, it will suggest the best approach. The proposed framework of this study points out to two different moderating
roles that can be considered as technical contributions. Moreover, the combination of this proposed framework is new for current
study. This framework is concentrated on technology improvement, knowledge management system, technology acceptance, police
performance, and ministry performance
Chapter 2 Evaluation of E-Portfolio Systems Klaus Himpsl & Peter BaumgartnerDaniel Dufourt
Â
Buzzetto-More, N. (Eds.). (2010).
The E-Portfolio Paradigm:
Informing, Educating, Assessing and Managing with E-Portfolios
Santa Rosa, California: Informing Science Press. (pp. 19-33).
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/modelling-the-supply-chain-perception-gaps/
This study applies the research of perception gap analysis to supply chain integration and develops a generic model, the 3-Level Gaps Model, with the goal of contributing to harmonization and integration in the supply chain. The model suggests that significant perception gaps may exist among supply chain members with regards to the importance of different performance criteria. The concept of the model is conceived through an empirical and inductive approach, combining the research discipline of supply chain relationship and perception gap analysis. First hand data has been collected through a survey across a key buyer in the motor insurance industry and its eight suppliers. Rigorous statistical analysis testified the research hypotheses, which in turn verified the validity and relevance of the developed 3-Level Gaps Model. The research reveals the significant existence of supply chain perception gaps at all three levels as defined, which could be the root-causes to underperformed supply chain.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Â
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
Authors: Rita FalcĂŁo de Berredo, Alfredo Soeiro.
This article proposes a methodology for benchmarking learning objects. It aims to deal with two problems related to e-learning: the validation of learning using this method and the return on investment of the process of development and use: effectiveness and efficiency.
Technology acceptance model for evaluating IT of online based transportation ...TELKOMNIKA JOURNAL
Â
GO-JEK acceptance in Salatiga, as a provider of online transportation reservation based on mobile phones, is not running without problems. The difficulties in accessing certain features, the lack of support from Salatiga government, and other obstacles have an impact on the performance of the Salatiga GO-JEK drivers. With the Technology Acceptance framework that is processed with a qualitative approach, we try to get what factors which have an impact on GO-JEK acceptance process in Salatiga. Our goal is to get the problems from the experience of Salatiga GO-JEK drivers that had never been thought before by the researcher. The result is that technological support, local policies, market share, and market rivalry affect the GO-JEK acceptance process in Salatiga.
WSN SIMULATORS EVALUATION: AN APPROACH FOCUSING ON ENERGY AWARENESSijwmn
Â
The large number of Wireless Sensor Networks (WSN) simulators available nowadays, differ in their design, goals, and characteristics. Users who have to decide which simulator is the most appropriate for their particular requirements, are today lost, faced with a panoply of disparate and diverse simulators. Hence, it is obvious the need for establishing guidelines that support users in the tasks of selecting a simulator to suit their preferences and needs. In previous works, we pro- posed a generic and novel approach to evaluate networks simulators, considering a methodological process and a set of qualitative and quantitative criteria. In particularly, for WSN simulators, the criteria include relevant aspects for this kind of networks, such as energy consumption modelling and scalability capacity. The aims of this work are: (i) describe deeply the criteria related to WSN aspects; (ii) extend and update the state of the art of WSN simulators elaborated in our previous works to identify the most used and cited in scientific articles; and (iii) demonstrate the suitability of our novel methodological approach by evaluating and comparing the three most cited simulators, specially in terms of energy modelling and scalability capacities. Results show that our proposed approach provides researchers with an evaluation tool that can be used to describe and compare WSN simulators in order to select the most appropriate one for a given scenario.
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...IAEME Publication
Â
Automation has introduced new dimension to the advent of project and
construction execution in construction field. Virtually all aspect of construction is
being innovated with cutting edge technology. In this study cutting edge technologies
were evaluated and their various validation platforms were evaluated. The following
objectives were set and achieved in this study: Establishing different tests that could
be carried out to ascertain functionality of an informatics platform, review of features
present in available informatics platforms, exploratory study of platform validity
system through functionality tests and developing a semantic icon functionality test.
Ten (10) informatics platforms were selected for case study, while 40 structured
questionnaires was used to collate respondents data as related to on the critical
factors that influences the effective use of system usability test on ICT Informatics
platform and parameters for newly generated Icon functionality rating scale(IRS). A
new test protocol was designed that could be used for carrying out Icon functionality
rating evaluation taggedâIRSâ.
Modeling the Student Success or Failure in Engineering at VUT Using the Date ...journal ijrtem
Â
The success or failure of students is a concern for every academic institution, college, university,
governments and students themselves. This paper presents a model to determine the propensity of a student to
succeed in the Electrical Engineering Department at Vaal University of Technology. Firstly, various machine
learning algorithms which can be used in modelling and in predicting student success or failure are discussed as
well a new algorithm called the date band algorithm. Secondly, the concept of an academic model is also
discussed. This model defines the domain and focus of data used to make preditcions. The academic model consists
of the subject, the lecturer and the sudent each of which has various attributes. One of the attributes discussed in
this paper is the popularity index which is a measure of cohesiveness of the model.The Date Band Algorithm is
presented among others in the development of the model. In this algorithm, predictions are made to optimize the
performance of academic environment, thereby impacting on the choices of funders when they support students.
DEA-Based Benchmarking Models In Supply Chain Management: An Application-Orie...ertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/data-envelopment-analysis/
Data Envelopment Analysis (DEA) is a mathematical methodology for benchmarking a group of entities in a group. The inputs of a DEA model are the resources that the entity consumes, and the outputs of the outputs are the desired outcomes generated by the entity, by using the inputs. DEA returns important benchmarking metrics, including efficiency score, reference set, and projections. While DEA has been extensively applied in supply chain management (SCM) as well as a diverse range of other fields, it is not clear what has been done in the literature in the past, especially given the domain, the model details, and the country of application. Also, it is not clear what would be an acceptable number of DMUs in comparison to existing research. This paper follows a recipe-based approach, listing the main characteristics of the DEA models for supply chain management. This way, practitioners in the field can build their own models without having to perform detailed literature search. Further guidelines are also provided in the paper for practitioners, regarding the application of DEA in SCM benchmarking.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
Â
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and science were studied and compared. The purpose of this research is to predict the academic major of high school students using Bayesian networks. The effective factors have been used in academic major selection for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on each other, discretization data and processing them was performed by GeNIe. The proper course would be advised for students to continue their education.
This presentation deals with an investigation for the implementation of the PSI directive in Greece and analyses the landscape of open government data (OGD) movement in terms of âMetadata and Open Data Standardsâ and âPublic Sector Sources and Knowledge Sourcesâ, from a functional, knowledge and technological perspective.
Open government data infrastructures: research challenges, artefacts design a...Charalampos Alexopoulos
Â
Numerous government agencies worldwide are making big investments for developing information systems that open data they possess to the society, in order to be used for scientific, commercial and political purposes. It is therefore highly important to develop advanced open government infrastructures, which not only publish government data, but also provide support for the individual and collaborative value generation from them. It is also necessary, for both the âtraditionalâ and the advanced open government data infrastructures, to understand what value they create and how, and at the same time â since this is a relatively new type of information systems â to identify the main improvements they require, as well as, the infrastructure development priorities. Filling this research gap and following the Design Science research methodology five research questions were formulated further evolving this research field. A thorough literature review and a taxonomy creation conclude the main research areas of the Open Government Data (OGD) domain. Continuously, a model for a desk-based research was developed in order to analyse the current landscape of OGD infrastructures. Following the results of the above studies, a scenario-based design was applied in order to identify the requirements of the next generation infrastructures. Moreover, an evaluation framework and a value model have been developed driving to the next versions of the infrastructure. Finally, a new platform was realised and applied to the Greek context maximising the value for Collaborative and Individual use of OGD. Addressing the five basic research questions of this dissertation, different issues accrued and handled that are of major importance for the development of an OGD infrastructure. These issues have been discussed in the conclusions and were assimilated into the greater domain of OGD research articulating the future research.
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/modelling-the-supply-chain-perception-gaps/
This study applies the research of perception gap analysis to supply chain integration and develops a generic model, the 3-Level Gaps Model, with the goal of contributing to harmonization and integration in the supply chain. The model suggests that significant perception gaps may exist among supply chain members with regards to the importance of different performance criteria. The concept of the model is conceived through an empirical and inductive approach, combining the research discipline of supply chain relationship and perception gap analysis. First hand data has been collected through a survey across a key buyer in the motor insurance industry and its eight suppliers. Rigorous statistical analysis testified the research hypotheses, which in turn verified the validity and relevance of the developed 3-Level Gaps Model. The research reveals the significant existence of supply chain perception gaps at all three levels as defined, which could be the root-causes to underperformed supply chain.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Â
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
Authors: Rita FalcĂŁo de Berredo, Alfredo Soeiro.
This article proposes a methodology for benchmarking learning objects. It aims to deal with two problems related to e-learning: the validation of learning using this method and the return on investment of the process of development and use: effectiveness and efficiency.
Technology acceptance model for evaluating IT of online based transportation ...TELKOMNIKA JOURNAL
Â
GO-JEK acceptance in Salatiga, as a provider of online transportation reservation based on mobile phones, is not running without problems. The difficulties in accessing certain features, the lack of support from Salatiga government, and other obstacles have an impact on the performance of the Salatiga GO-JEK drivers. With the Technology Acceptance framework that is processed with a qualitative approach, we try to get what factors which have an impact on GO-JEK acceptance process in Salatiga. Our goal is to get the problems from the experience of Salatiga GO-JEK drivers that had never been thought before by the researcher. The result is that technological support, local policies, market share, and market rivalry affect the GO-JEK acceptance process in Salatiga.
WSN SIMULATORS EVALUATION: AN APPROACH FOCUSING ON ENERGY AWARENESSijwmn
Â
The large number of Wireless Sensor Networks (WSN) simulators available nowadays, differ in their design, goals, and characteristics. Users who have to decide which simulator is the most appropriate for their particular requirements, are today lost, faced with a panoply of disparate and diverse simulators. Hence, it is obvious the need for establishing guidelines that support users in the tasks of selecting a simulator to suit their preferences and needs. In previous works, we pro- posed a generic and novel approach to evaluate networks simulators, considering a methodological process and a set of qualitative and quantitative criteria. In particularly, for WSN simulators, the criteria include relevant aspects for this kind of networks, such as energy consumption modelling and scalability capacity. The aims of this work are: (i) describe deeply the criteria related to WSN aspects; (ii) extend and update the state of the art of WSN simulators elaborated in our previous works to identify the most used and cited in scientific articles; and (iii) demonstrate the suitability of our novel methodological approach by evaluating and comparing the three most cited simulators, specially in terms of energy modelling and scalability capacities. Results show that our proposed approach provides researchers with an evaluation tool that can be used to describe and compare WSN simulators in order to select the most appropriate one for a given scenario.
BUILDING INFORMATICS: REVIEW OF SELECTED INFORMATICS PLATFORM AND VALIDATING ...IAEME Publication
Â
Automation has introduced new dimension to the advent of project and
construction execution in construction field. Virtually all aspect of construction is
being innovated with cutting edge technology. In this study cutting edge technologies
were evaluated and their various validation platforms were evaluated. The following
objectives were set and achieved in this study: Establishing different tests that could
be carried out to ascertain functionality of an informatics platform, review of features
present in available informatics platforms, exploratory study of platform validity
system through functionality tests and developing a semantic icon functionality test.
Ten (10) informatics platforms were selected for case study, while 40 structured
questionnaires was used to collate respondents data as related to on the critical
factors that influences the effective use of system usability test on ICT Informatics
platform and parameters for newly generated Icon functionality rating scale(IRS). A
new test protocol was designed that could be used for carrying out Icon functionality
rating evaluation taggedâIRSâ.
Modeling the Student Success or Failure in Engineering at VUT Using the Date ...journal ijrtem
Â
The success or failure of students is a concern for every academic institution, college, university,
governments and students themselves. This paper presents a model to determine the propensity of a student to
succeed in the Electrical Engineering Department at Vaal University of Technology. Firstly, various machine
learning algorithms which can be used in modelling and in predicting student success or failure are discussed as
well a new algorithm called the date band algorithm. Secondly, the concept of an academic model is also
discussed. This model defines the domain and focus of data used to make preditcions. The academic model consists
of the subject, the lecturer and the sudent each of which has various attributes. One of the attributes discussed in
this paper is the popularity index which is a measure of cohesiveness of the model.The Date Band Algorithm is
presented among others in the development of the model. In this algorithm, predictions are made to optimize the
performance of academic environment, thereby impacting on the choices of funders when they support students.
DEA-Based Benchmarking Models In Supply Chain Management: An Application-Orie...ertekg
Â
Download Link > https://ertekprojects.com/gurdal-ertek-publications/blog/data-envelopment-analysis/
Data Envelopment Analysis (DEA) is a mathematical methodology for benchmarking a group of entities in a group. The inputs of a DEA model are the resources that the entity consumes, and the outputs of the outputs are the desired outcomes generated by the entity, by using the inputs. DEA returns important benchmarking metrics, including efficiency score, reference set, and projections. While DEA has been extensively applied in supply chain management (SCM) as well as a diverse range of other fields, it is not clear what has been done in the literature in the past, especially given the domain, the model details, and the country of application. Also, it is not clear what would be an acceptable number of DMUs in comparison to existing research. This paper follows a recipe-based approach, listing the main characteristics of the DEA models for supply chain management. This way, practitioners in the field can build their own models without having to perform detailed literature search. Further guidelines are also provided in the paper for practitioners, regarding the application of DEA in SCM benchmarking.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
Â
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and science were studied and compared. The purpose of this research is to predict the academic major of high school students using Bayesian networks. The effective factors have been used in academic major selection for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on each other, discretization data and processing them was performed by GeNIe. The proper course would be advised for students to continue their education.
This presentation deals with an investigation for the implementation of the PSI directive in Greece and analyses the landscape of open government data (OGD) movement in terms of âMetadata and Open Data Standardsâ and âPublic Sector Sources and Knowledge Sourcesâ, from a functional, knowledge and technological perspective.
Open government data infrastructures: research challenges, artefacts design a...Charalampos Alexopoulos
Â
Numerous government agencies worldwide are making big investments for developing information systems that open data they possess to the society, in order to be used for scientific, commercial and political purposes. It is therefore highly important to develop advanced open government infrastructures, which not only publish government data, but also provide support for the individual and collaborative value generation from them. It is also necessary, for both the âtraditionalâ and the advanced open government data infrastructures, to understand what value they create and how, and at the same time â since this is a relatively new type of information systems â to identify the main improvements they require, as well as, the infrastructure development priorities. Filling this research gap and following the Design Science research methodology five research questions were formulated further evolving this research field. A thorough literature review and a taxonomy creation conclude the main research areas of the Open Government Data (OGD) domain. Continuously, a model for a desk-based research was developed in order to analyse the current landscape of OGD infrastructures. Following the results of the above studies, a scenario-based design was applied in order to identify the requirements of the next generation infrastructures. Moreover, an evaluation framework and a value model have been developed driving to the next versions of the infrastructure. Finally, a new platform was realised and applied to the Greek context maximising the value for Collaborative and Individual use of OGD. Addressing the five basic research questions of this dissertation, different issues accrued and handled that are of major importance for the development of an OGD infrastructure. These issues have been discussed in the conclusions and were assimilated into the greater domain of OGD research articulating the future research.
This study contains the advanced features of an OGD infrastructure in order to generate and return more value to the users. The evaluation from users shows positive reaction to these developments.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
Â
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether theyâre using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating â and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology â and how attitudes change with age, location and seniority level. If youâre marketing a tech brand â or planning to use VR and wearables to reach a professional audience â then these are insights you wonât want to miss.
Recommender systems: a novel approach based on singular value decompositionIJECEIAES
Â
Due to modern information and communication technologies (ICT), it is increasingly easier to exchange data and have new services available through the internet. However, the amount of data and services available increases the difficulty of finding what one needs. In this context, recommender systems represent the most promising solutions to overcome the problem of the so-called information overload, analyzing users' needs and preferences. Recommender systems (RS) are applied in different sectors with the same goal: to help people make choices based on an analysis of their behavior or users' similar characteristics or interests. This work presents a different approach for predicting ratings within the model-based collaborative filtering, which exploits singular value factorization. In particular, rating forecasts were generated through the characteristics related to users and items without the support of available ratings. The proposed method is evaluated through the MovieLens100K dataset performing an accuracy of 0.766 and 0.951 in terms of mean absolute error and root-mean-square error.
Persuasive Technologies for Sustainable Urban MobilityGreenapps&web
Â
Š Evangelia Anagnostopoulou, Efthimios Bothos, Babis Magoutas, Johann Schrammel, Gregoris Mentzas
In recent years, the persuasive interventions for inducing sustainable urban mobility behaviours has become a very active research field. This review paper systematically analyses existing approaches and prototype systems and describes and classifies the persuasive strategies used for changing behaviour in the domain of transport. It also studies the results and recommendations derived from pilot studies, and as a result of this analysis highlights the need for personalizing and tailoring persuasive technology to various user characteristics.
We also discuss the possible role of context-aware persuasive systems for increasing the number of sustainable choices. Finally, recommendations for future investigations on scholarly persuasive systems are proposed
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Â
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
MINING DISCIPLINARY RECORDS OF STUDENT WELFARE AND FORMATION OFFICE: AN EXPLO...IJITCA Journal
Â
Data mining is the process of analyzing large datasets, understanding their patterns and discovering useful
information from a large amount of data. Decision tree as one of the common algorithm of data mining is a tree structure entailing of internal and terminal nodes which process the data to eventually produce a classification. Classification is the process of dividing a dataset together in a high-class set such that the members of each set are nearby as expected to one another, and different groups are as far as expected from one another, where distance is measured with respect to the specific variable(s) you are trying to predict. Data Envelopment Analysis is a technique wherein the productivity of a unit is evaluated by equating the volume/amount of output(s) in relation to the volume/amount of input(s) used. The performance of a unit is calculated by equating its efficiency with the best-perceived performance in the data set. In this study, a model for measuring the efficiency of Decision Making Units will be presented, along with related methods of implementation and interpretation. DEA assesses and evaluates the efficiency of a unit dubbed as Decision-Making Units or DMU. There are many classification techniques and algorithms but the research study used decision tree using CHAID algorithms. Classification decision tree algorithm using CHAID as data mining technique identifies the relationship between the demographic profile of the students and the category of offenses. Cross tabulation is a tool used to analyze categorical data. It is a type of table in a matrix format that shows the multivariate occurrence dissemination of the variables and delivers a basic picture of the interrelation between two variables. Both CHAID algorithm and cross tabulation obtained the same results implying that higher percentage of students commit minor offenses regardless of college, gender, year level, month and course. The CHAID algorithm used in a software application Student Offenses Remediation System (STORES) serves as remediation plan for the university. Further studies should be conducted to identify the effectiveness of the remediation plan by conducting an empirical investigation on the rule set and/or implement another algorithm to determine the program efficiency.
MINING DISCIPLINARY RECORDS OF STUDENT WELFARE AND FORMATION OFFICE: AN EXPLO...IJITCA Journal
Â
Data mining is the process of analyzing large datasets, understanding their patterns and discovering useful
information from a large amount of data. Decision tree as one of the common algorithm of data mining is a
tree structure entailing of internal and terminal nodes which process the data to eventually produce a
classification. Classification is the process of dividing a dataset together in a high-class set such that the
members of each set are nearby as expected to one another, and different groups are as far as expected
from one another, where distance is measured with respect to the specific variable(s) you are trying to
predict. Data Envelopment Analysis is a technique wherein the productivity of a unit is evaluated by
equating the volume/amount of output(s) in relation to the volume/amount of input(s) used. The
performance of a unit is calculated by equating its efficiency with the best-perceived performance in the
data set. In this study, a model for measuring the efficiency of Decision Making Units will be presented,
along with related methods of implementation and interpretation. DEA assesses and evaluates the
efficiency of a unit dubbed as Decision-Making Units or DMU. There are many classification techniques
and algorithms but the research study used decision tree using CHAID algorithms. Classification decision
tree algorithm using CHAID as data mining technique identifies the relationship between the demographic
profile of the students and the category of offenses. Cross tabulation is a tool used to analyze categorical
data. It is a type of table in a matrix format that shows the multivariate occurrence dissemination of the
variables and delivers a basic picture of the interrelation between two variables. Both CHAID algorithm
and cross tabulation obtained the same results implying that higher percentage of students commit minor
offenses regardless of college, gender, year level, month and course. The CHAID algorithm used in a
software application Student Offenses Remediation System (STORES) serves as remediation plan for the
university. Further studies should be conducted to identify the effectiveness of the remediation plan by
conducting an empirical investigation on the rule set and/or implement another algorithm to determine the
program efficiency.
Sentiment analysis in SemEval: a review of sentiment identification approachesIJECEIAES
Â
Social media platforms are becoming the foundations of social interactions including messaging and opinion expression. In this regard, sentiment analysis techniques focus on providing solutions to ensure the retrieval and analysis of generated data including sentiments, emotions, and discussed topics. International competitions such as the International Workshop on Semantic Evaluation (SemEval) have attracted many researchers and practitioners with a special research interest in building sentiment analysis systems. In our work, we study top-ranking systems for each SemEval edition during the 2013-2021 period, a total of 658 teams participated in these editions with increasing interest over years. We analyze the proposed systems marking the evolution of research trends with a focus on the main components of sentiment analysis systems including data acquisition, preprocessing, and classification. Our study shows an active use of preprocessing techniques, an evolution of features engineering and word representation from lexicon-based approaches to word embeddings, and the dominance of neural networks and transformers over the classification phase fostering the use of ready-to-use models. Moreover, we provide researchers with insights based on experimented systems which will allow rapid prototyping of new systems and help practitioners build for future SemEval editions.
Enhanced model for ergonomic evaluation of information systems: application t...IJECEIAES
Â
Considering the importance of the ergonomic aspect for information systems in providing an easy use of the computing systems, this paper focuses on the elaboration of a hybrid model for the ergonomic evaluation of information systems that merges a set of inspection dimensions such as accessibility, practicality, emotionality, and technological persuasion. Details on how the model has been constructed and data have been collected are presented. For the evaluation of our model, a situation of an information system for scientific research (SIMArech) in Moroccan Universities has been studied. This model can be used by ergonomist and human factor professionals. It is found that the proposed heuristics can effectively assess the most important dimensions of scientific research information systems.
PATHS state of the art monitoring reportpathsproject
Â
This document provides an update to an Initial State of the Art Monitoring report delivered by the project. The report covers the areas of Educational Informatics, Information Retrieval and Semantic Similarity relatedness.
Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkis...IJMIT JOURNAL
Â
This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fundamental components of our user acceptance model are perceived usefulness, attitude towards use, social norms, and performance expectancy.
Design of an environmental management information system for the Universidad ...nooriasukmaningtyas
Â
This article presents the design, development and implementation of a software tool, serving as an alternative to the problems involving management, control and reporting of processes within the institutional plan for environmental management (known as plan institucional de gestiĂłn ambiental (PIGA) by its Spanish acronym) for the Universidad Distrital Francisco JosĂŠ de Caldas. The software is focused on carrying out such processes to the automation setting, based on the extreme programming (XP) Agile methodology that mainly centers on the continuous development of the customer requirements to offer a more assertive tool, in line with the plan institucional de gestiĂłn ambiental in Spanish (PIGA) processes. The result is a complete satisfaction of users and a highly usable, adaptable and efficient software, inherently optimizing and automating the environmental management processes of the PIGA program. This work delivers an applet that meets the design and implementation requirements of environmental management policies. The proposed tool manages to reduce process-related times by 97%, therefore, allowing to aim efforts in other missional functions and increase the overall value offer of the organization.
USER EXPERIENCE EVALUATION OF A STUDENT INFORMATION SYSTEMijcsit
Â
Today's academic environment, many students use technology as an integral aspect of their studies; as a
result, higher education (HE) institutions have been compelled to design student information systems (SIS)
that can facilitate students' online learning processes. However, SIS must be aligned with user needs and
should provide a pleasant user experience (UX) that enables students to attain their goals. The current
research looked at how students rated an SIS. The study was based on the responses of 307 students at
Kuwait's College of Business Studies (CBS) provided within a questionnaire. The survey's findings
revealed that students had a generally favourable impression of the SIS, with perceptions of the pragmatic
quality of the system being somewhat higher than the perceptions of hedonic quality. The findings of this
research may be valuable to authorities working to design improved SIS, particularly in terms of the
hedonic system components.
de l'Economie et des Finances | En charge des questions financières et monÊta...aminellaoui
Â
de l'Economie et des Finances | En charge des questions financières et monÊtaires
de l'Economie et des Finances | En charge des questions financières et monÊtaires
de l'Economie et des Finances | En charge des questions financières et monÊtaires
UI/UX integrated holistic monitoring of PAUD using the TCSD methodjournalBEEI
Â
User interface (UI)/user experience (UX) is one part of the stages in the development of the system to produce interactive and attractive web-based application layouts so that it is easy to understand and use by users. In this research, a case study was conducted on early childhood in PAUD Kuntum Mekar. The design of the UI/UX model for holistic integrative PAUD monitoring becomes one of the solutions to help parents and teachers. The method used to design UI/UX is the task centered system design (TCSD) approach starting from the stages; 1) identification scope of use, 2) user centered requirement analysis, 3) design and scenario, and 4) walkthrough evaluate, the method used for system testing is user satisfaction, and heuristic usability. The purpose of this study is the UI/UX design with TCSD can provide valid data needs of each actor based on the assignment and design of the story board of the developed system. The results of this research are UI/UX model design for integrative holistic PAUD monitoring application.
Use of information Systems in Yemeni Universities Future Vision EECJOURNAL
Â
This research examines the use of computed information systems in Yemeni universities through the use of intermediate variable technology to test the indirect impact of the information systems structure on the relationship between information technology, and the final performance in the computed information systems in Yemeni universities. The applied situation was exemplified by the selection of four universities where the data on the study were collected through special friendly questionnaire, and the number of respondent (224) persons had been used. Many statistical means, percentages, arithmetic mean, standard deviation, and intermediate deviation have been used for the description of the study sample, and for the study variables, as for hypothesis testing, the intermediate variant method was used and the end result was to prove that there was a relationship An incomplete mediation attributed to the structure of information systems that has an indirect impact on the resulting relationship between information technology and the final performance of information systems.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Â
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Â
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Â
Building better applications for business users with SAP Fiori.
⢠What is SAP Fiori and why it matters to you
⢠How a better user experience drives measurable business benefits
⢠How to get started with SAP Fiori today
⢠How SAP Fiori elements accelerates application development
⢠How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
⢠How SAP Fiori paves the way for using AI in SAP apps
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
đ Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilotâ˘UiPathCommunity
Â
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalitĂ di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
đ Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
đ¨âđŤđ¨âđť Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Â
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Â
PSI e-infrastructures evaluation
1. University of the Aegean â Department of Information and Communication Systems Engineering
A methodology for Evaluating PSI e-Infrastructures
based on Multiple Value Models
Charalampos Alexopoulos, cPhD
Euripides Loukis, Associate Professor
2. INTRODUCTION
ďe-Science: cross border research collaboration and use of
huge high-capacity computing resources â tools for
collection, storage, analysis and modeling of data
ďlarge amount of data is very useful for conducting scientific
research in many areas
ďsocio-economic benefits
ďunderstanding of social and economic problems, and also of the
effectiveness of various policies government agencies
implement for addressing them
ďopening up this resource could amount to about ⏠40 billion a
year in the EU â a new e-market governments start to invest on
5/10/20122 PCI2012 - University of the Aegean
3. PURPOSE
ďa systematic evaluation of these PSI e-Infrastructures, aiming
at a better understanding and assessment of value they
generate
ďa structured and comprehensive evaluation methodology is
missing
ďâ The proposed methodology includes initially the definition
of one value model for each stakeholder group, which
consists of the main dimensions of value the PSI e-
infrastructure generates for it, and also the connections
among themâ
5/10/20123 PCI2012 - University of the Aegean
5. Research Streams Insights
IS Evaluation
ďISâs offer various types of benefits, both financial and non-
financial, and also tangible and intangible ones, which differ
among the different types of IS
ďit is not possible to formulate one generic IS evaluation
method, which is applicable to all IS
ďa comprehensive methodology for evaluating a particular
type of IS should include evaluation of both its efficiency and
its effectiveness, taking into account its particular
characteristics, capabilities and objectives
5/10/20125 PCI2012 - University of the Aegean
6. Research Streams Insights
ďTAM
ďidentify the characteristics and factors affecting the attitude towards
using an IS, the intention to use it and finally the extent of its actual
usage
ďperceived usefulness and perceived ease of use determine an
individual's intention to use a system with intention to use serving as a
mediator of actual system use
ďIS Success Models
ďIS evaluation should adopt a layered approach based on the above
interrelated IS success measures (information quality, system quality,
service quality, user satisfaction, actual use, perceived usefulness,
individual impact and organizational impact) and on the relations
among them
5/10/20126 PCI2012 - University of the Aegean
7. Research Streams Insights
e-Services Evaluation
ďframeworks that assess the quality of the capabilities that the
e-service provides to its users
ďframeworks that assess the support it provides to users for
performing various tasks and achieving various objectives, or
usersâ overall satisfaction
ďthe above frameworks do not include advanced ways of
processing the evaluation data collected from the users, in
order to maximize the extraction of value-related knowledge
from them
5/10/20127 PCI2012 - University of the Aegean
8. Our Approach based on Value
Models
Ease of Use Experience
Performance
Data Search &
Download Capabilities
Data Provision
Capabilities
Accompl. Users
Objectives
Use
Future
Behaviour
Usersâ Data Analysis
Capabilities
Efficiency Level
Effectiveness
Level
Fut. Behavior
Level
Data Users
5/10/20128 PCI2012 - University of the Aegean
9. Our Approach based on Value
Models
Efficiency Level
Effectiveness
Level
Fut. Behavior
Level
5/10/20129 PCI2012 - University of the Aegean
Data Providers
Ease of Use Experience
Performance
Providersâ Data Analysis
Capabilities
Data Upload
Capabilities
Accompl. Providers
Objectives
Use
Future
Behaviour
10. Value Measures
ďThe total of 51 value measures were defined
ď15 common value measures
ď22 value measures for users
ď14 value measures for providers
ďThese value measures was then converted to a
question to be included in questionnaires to be
distributed to stakeholders
ďA five point Likert scale is used to measure
agreement or disagreement
ď2 Questionnaires have been formulated
5/10/201210 PCI2012 - University of the Aegean
11. Value Model Estimation Algorithm
1. For each value dimension a composite variable is calculated as the average of
its individual measure variables.
2. Average ratings are calculated for all value dimensions (using the composite
variables calculated in step 1
3. For each value dimension of the first level we calculate its correlations with
all value dimensions of the second and the third levels (using again the
composite variables calculated in step 1).
4. Combination of 2 classes of analytics calculated in steps 2 and 3 for the
construction of a high-level value model of the PSI e-Infrastructure
5. First Layer Value Dimensions Classification into four groups:
ď low rating â high impact
ď low rating â low impact
ď high rating â high impact
ď high rating â low impact
1. Finally we repeat stages 2, 3, 4 and 5, but this time for the individual value
measures/variables instead of the value dimensionsâ composite variables.
5/10/201211 PCI2012 - University of the Aegean
12. Conclusions
5/10/2012PCI2012 - University of the Aegean12
ďThis paper has presented a methodology for evaluating an emerging class
of IS: the PSI e-Infrastructures.
ďThese IS aim to support the evaluation of
ďgovernment agencies for opening their data, in order to be used for
scientific, commercial and political purposes
ďvarious groups of users interested in them (e.g. scientists for conducting
research, active citizens and journalists for drawing conclusions on previous
government activity)
ďThe proposed methodology assesses a wide range of types of value
generated by PSI e-Infrastructures for these two stakeholdersâ groups
ďAn algorithm for advanced processing of stakeholdersâ evaluation data,
which results in the estimation of value models for these two groups and
the identification of improvement priorities
13. References
5/10/2012PCI2012 - University of the Aegean13
ď Commission of the European Communities (2009),
âCommunication from the Commission to the European
Parliament, the Council, the European Economic and
Social Committee and the Committee of the Regions â ICT
Infrastructures for e-Scienceâ, COM (2009) 108 Final,
Brussels.
ď Commission of the European Communities (2011),
âCommunication from the Commission to the European
Parliament, the Council, the European Economic and
Social Committee and the Committee of the Regions â
Open data: An engine for innovation, growth and
transparent governanceâ, COM (2011) 882 Final, Brussels.
ď Loukis, E. Pazalos, K. Salagara, A. (2012), âTransforming
e-services evaluation data into business analytics using value
modelsâ, Elsevier, Electronic Commerce Research and
Applications 11 (2012), 129â141.
ď Makx Dekkers, Femke Polman, Robbin te Velde and Mark
de Vries, MEPSIR â Measuring European Public Sector
Information Resources: Final report of study on
exploitation of public sector information â benchmarking
of EU framework Conditions, report for the European
Commission, June 2006
ď Kim, Y. and Crowston, K. (2011), Technology adoption
and use theory review for studying scientists' continued use
of cyber-infrastructure. Proc. Am. Soc. Info. Sci. Tech.,
48:Â 1â10. doi:Â 10.1002/meet.2011.14504801197
ď Stockdale, R., and Standing, C. (2006), âAn interpretive
approach for interpreting information systems: a content,
context, process frameworkâ. European Journal of
Operational Research, 173, , 1090â1102.
ď Irani, Z., and Love, P., (2008), âInformation systems
evaluation â a crisis of understandingâ In Z. Irani and P.
Love (eds.), âEvaluating Information Systems â Public and
Private Sectorâ, Butterworth-Heinemann, UK.
ď Schepers, J. and Wetzels, M. (2007). A meta-analysis of
the technology acceptance model: Investigating subjective
norm and moderation effects. Information & Management,
44, pp. 90-103.
ď Fishbein, M., & Ajzen, I. (1975). Belief, Attitude,
Intention, and Behavior. Reading, MA: Addison-Wesley.
ď Lu, J., and Zhang, G. (2003), âCost benefit factor analysis
in e-servicesâ, International Journal of Industry Service
Management, 14, 5, 570â595.
ď Fassnacht, M., and Koese, I. (2006), âQuality of electronic
servic
ď DeLone, D.H., McLean, E. R. (2003), âThe DeLone and
McLean model of information systems success: a ten-year
updateâ, Journal of Management Information Systems, 19,
4, , 9â30
14. Thank you for your attention
5/10/2012PCI2012 - University of the Aegean14
Editor's Notes
Such a value model consists of a set of measures assessing different types of value generated by the evaluated e-service, and the relations among them. These value measures are organized in three levels: (i) Efficiency level: it includes âefficiencyâ measures, which assess the quality of the basic capabilities offered by the e-service to its users, (ii) Effectiveness level: it includes âeffectivenessâ measures, which assess the extent of use of the e-service and also its outcomes (iii) Future behaviour level: it includes measures assessing to what extent the e-service influences the future behaviour of its users This methodology combines assessment of these multiple types of value generated by the e-service with estimation of the relations among them (with the former and the latter constituting the value model of the e-service), and also an algorithm for defining priorities for capabilitiesâ improvements.
Such a value model consists of a set of measures assessing different types of value generated by the evaluated e-service, and the relations among them. These value measures are organized in three levels: (i) Efficiency level: it includes âefficiencyâ measures, which assess the quality of the basic capabilities offered by the e-service to its users, (ii) Effectiveness level: it includes âeffectivenessâ measures, which assess the extent of use of the e-service and also its outcomes (iii) Future behaviour level: it includes measures assessing to what extent the e-service influences the future behaviour of its users This methodology combines assessment of these multiple types of value generated by the e-service with estimation of the relations among them (with the former and the latter constituting the value model of the e-service), and also an algorithm for defining priorities for capabilitiesâ improvements.