In the current digitalization dilemma of an organization, there is a need for the business intelligence and knowledge management element for enhancing a perspective of learning and strategic management. These elements will comprise a significant evolution of learning, insight gained, experiences and knowledge through compelling theoretical impact for practitioners, academicians, and scholars in the pertinent field of interest. This phenomenon occurs due to digitalization transformation towards industry revolution 5.0 and organizational excellence in the information system area. This research focuses on the characteristic of a comprehensive performance measure perspective in an organization that conceives information assessment and key challenges of Business Intelligence and Knowledge Management in perceiving a relevant organizational excellence framework. The dynamic research focusing on the decision-making process and leveraging better knowledge creation. The future of organization excellence seemed to be convergent in determining the holistic performance measure perspective and its factors towards industry revolution 5.0. The research ends up with a typical basic excellence framework that will mash up some characteristics in designing an organizational strategic performance framework. The output is a conceptual performance measure framework for a typical decision-making application for organizational strategic performance management dashboarding.
Design and implement a new secure prototype structure of e-commerce system IJECEIAES
The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on the system server. This problem may lead to server deadlock, especially at rush time, which reduce system performance. To solve security and performance problems, this research suggests a prototype design for agent software. This agent will play the role of broker between the clients and the electronic marketplace. This is done by providing security inside the client device and converting the client’s order into a special form which is called a record form to be sent to the commercial website. Experimental results showed that this method increase system performance in terms of page loading time, transaction processing and improves the utilization of system resources.
Rapid evolution of information technology has contributed to the evolution of more sophisticated Ecommerce
system with the better transaction time and protection. The currently used E-commerce models
lack in quality properties such as logical security because of their poor designing and to face the highly
equipped and trained intruders. This editorial proposed a security framework for small and medium sized
E-commerce, based on service oriented architecture and gives an analysis of the eminent security attacks
which can be averted. The proposed security framework will be implemented and validated on an open
source E-commerce, and the results achieved so far are also presented.
E-Commerce Mobile Marketing Model Resolving Users Acceptance Criteria IJMIT JOURNAL
The growth of e-commerce and mobile services has been creating business opportunities. Among these,
mobile marketing is predicted to be a new trend of marketing. As mobile devices are personal tools such
that the services ought to be unique, in the last few years, researches have been conducted studies related
to the user acceptance of mobile services and produced results. This research aims to develop a model of
mobile e-commerce mobile marketing system, in the form of computer-based information system (CBIS)
that addresses the recommendations or criteria formulated by researchers. In this paper, the criteria
formulated by researches are presented then each of the criteria is resolved and translated into mobile
services. A model of CBIS, which is an integration of a website and a mobile application, is designed to
materialize the mobile services. The model is presented in the form of business model, system procedures,
network topology, software model of the website and mobile application, and database models.
Cognitive Integration: How Canonical Models and Controlled Vocabulary Enable ...Cognizant
For pharmaceuticals companies dealing with multiple partners' systems, employing a canonical model for data communications facilitates point-to-point integration, and applying a controlled vocabulary (CV) in such models alleviates semantical ambiguity and facilitates cognitive and systems integration. We demonstrate how this works with a pharma business scenario involving Contract Research Organizations (CROs).
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Information technology Management and measurement of success and failure of IT implementation in MNC's - a comparitive analysis of Citi bank and HDFC IT strategies
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
Design and implement a new secure prototype structure of e-commerce system IJECEIAES
The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on the system server. This problem may lead to server deadlock, especially at rush time, which reduce system performance. To solve security and performance problems, this research suggests a prototype design for agent software. This agent will play the role of broker between the clients and the electronic marketplace. This is done by providing security inside the client device and converting the client’s order into a special form which is called a record form to be sent to the commercial website. Experimental results showed that this method increase system performance in terms of page loading time, transaction processing and improves the utilization of system resources.
Rapid evolution of information technology has contributed to the evolution of more sophisticated Ecommerce
system with the better transaction time and protection. The currently used E-commerce models
lack in quality properties such as logical security because of their poor designing and to face the highly
equipped and trained intruders. This editorial proposed a security framework for small and medium sized
E-commerce, based on service oriented architecture and gives an analysis of the eminent security attacks
which can be averted. The proposed security framework will be implemented and validated on an open
source E-commerce, and the results achieved so far are also presented.
E-Commerce Mobile Marketing Model Resolving Users Acceptance Criteria IJMIT JOURNAL
The growth of e-commerce and mobile services has been creating business opportunities. Among these,
mobile marketing is predicted to be a new trend of marketing. As mobile devices are personal tools such
that the services ought to be unique, in the last few years, researches have been conducted studies related
to the user acceptance of mobile services and produced results. This research aims to develop a model of
mobile e-commerce mobile marketing system, in the form of computer-based information system (CBIS)
that addresses the recommendations or criteria formulated by researchers. In this paper, the criteria
formulated by researches are presented then each of the criteria is resolved and translated into mobile
services. A model of CBIS, which is an integration of a website and a mobile application, is designed to
materialize the mobile services. The model is presented in the form of business model, system procedures,
network topology, software model of the website and mobile application, and database models.
Cognitive Integration: How Canonical Models and Controlled Vocabulary Enable ...Cognizant
For pharmaceuticals companies dealing with multiple partners' systems, employing a canonical model for data communications facilitates point-to-point integration, and applying a controlled vocabulary (CV) in such models alleviates semantical ambiguity and facilitates cognitive and systems integration. We demonstrate how this works with a pharma business scenario involving Contract Research Organizations (CROs).
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Information technology Management and measurement of success and failure of IT implementation in MNC's - a comparitive analysis of Citi bank and HDFC IT strategies
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
This study investigates the effect of IT investment portfolios on the performance of mobile business services, as well as the moderating role of IT savvy. This study pulls the concept of IT investment mandates into the conceptual research framework of mobile investment. A survey for the IT specialists working at 123 enterprise-level companies was conducted and hierarchical regression analysis was adopted. Our results show that IT investment and organizational IT capabilities influence the performance of the mobile office and that IT savvy plays as a moderator in the relationship between investment mandates and mobile office performance. This research also may indicate that transactional assets are most helpful factors for a change by the adoption of mobile technology. This study is a rare research paper to explain the impact of IT investment portfolios on the mobile office performance in an academic methodology.
Mobile Business Intelligence Acceptance Model for Organisational Decision MakingjournalBEEI
Mobile Business Intelligence (BI) is the ability to access BI-related data such as key performance indicators (KPIs), business metric and dashboard through mobile device. Mobile BI addresses the use-case of remote or mobile workers that need on-demand access to business-critical data. User acceptance on mobile BI is an essential in order to identify which factors influence the user acceptance of mobile BI application. Research on mobile BI acceptance model on organizational decision-making is limited due to the novelty of mobile BI as newly emerged innovation. In order to answer gap of the adoption of mobile BI in organizational decision-making, this paper reviews the existing works on mobile BI Acceptance Model for organizational decision-making. Two user acceptance models which are Technology Acceptance Model and Technology Acceptance Model for Mobile Services will be review. Realizing the essential of strategic organizational decision-making in determining success of organizations, the potential of mobile BI in decision-making need to be explore. Since mobile BI still in its infancy, there is a need to study user acceptance and usage behavior on mobile BI in organizational decision-making. There is still opportunity for further investigate the impact of mobile BI on organizational decision-making.
Accelerating Machine Learning as a Service with Automated Feature EngineeringCognizant
Building scalable machine learning as a service, or MLaaS, is critical to enterprise success. Key to translate machine learning project success into program success is to solve the evolving convoluted data engineering challenge, using local and global data. Enabling sharing of data features across a multitude of models within and across various line of business is pivotal to program success.
Exploring the Impact of the use of Business Information systems BIS on the or...inventionjournals
Business Information System BIS is considered as a critical tool, which has a major supporter of the economy which use BIS in an effectively manner. Organizations marked experiencing and acceleration towards the use of BIS to support its operations in order to improve performance and achieve superiority over competitors, which is reflected in the organizational effectiveness. This study aims to identify the impact of the use of Business Information Systems BIS on the organizational performance effectiveness in banks in Jordan. The study population are all (23) banks in Jordan. The study instrument distributed a (42) questionnaire to all senior directors in the banks, The questionnaires were analysed using regression, correlation analysis in order to determine the impact of business information systems BIS and its dimensions as an independent variable on the organizational performance effectiveness which is dependent variable in banks in Jordan.. The study outcomes shown that business information system BIS adoption would increase organizational performances, and offering practical suggestions that may ensure the achievement of the objectives to be accomplished by using BIS contributing to organisational effectiveness. Beside, effective use of BIS in banks would maximizing the total value to financial performance. Also Banks in Jordan gives great importance to the use of BIS significantly, in the belief that they contribute to improving the competitive position.
Artificial Intelligence in Financial Services: From Nice to Have to Must HaveCognizant
AI is moving beyond experimentation to become a competitive differentiator in financial services — delivering a hyper-personalized customer experience, improving decision-making and boosting operational efficiency, our recent primary research reveals. Yet, many financial services companies will need to accelerate their efforts to infuse AI across the value chain while preparing for the next generation of evolutionary neural network technologies to keep pace with more forward-thinking players.
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
Information technology knowledge has become a necessity. Most of a persons daily activities involve the assistance of information technology, both teaching and learning activities, working in institutions and entrepreneurship. In addition, knowledge of information technology is a persons main asset to be able to compete in the digital era. A cooperative is an institution that runs on the principle of kinship. So that in carrying out its activities prioritizing the welfare of its members and aiming to increase the economic growth of the community. The goal to be achieved in this community service activity is to produce an android based system of savings and loan cooperative service that is able to facilitate the delivery of information from management to members in real time and can provide solutions for speed, accuracy and accuracy. The method used in this research and development research uses the waterfall model, which is a process or steps to develop a new product or improve an existing product. The system analysis was carried out with the initial stages of the research method, the communication stage was carried out by the interview and observation process. The observation process is carried out by making direct observations to get an overview and the interview process is carried out by conducting questions and answers to match the data and information. After designing the next step is build an android system based of savings and loan cooperative service. Dimas Indra Laksmana | Maranatha Wijayaningtyas | Kiswandono "Application of Savings and Loan Cooperative Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40065.pdf Paper URL: https://www.ijtsrd.com/management/mis-and-retail-management/40065/application-of-savings-and-loan-cooperative-services/dimas-indra-laksmana
Strategic alignment is a conviction that is considered extremely important in understanding how organizations can apply their arrangement of information technology (IT) into substantial boosts in achievement. To attain alignment advantage, Information Technology Infrastructure Library (ITIL) prepares a framework of best practice approch for IT Service Management in all countries and Control Objectives for Information and Related Technology (COBIT) is an IT governance framework and aiding toolset that permits managers to stretch the gap between control prerequisites, technical matters and business risks. The purpose of this paper is to recognize how COBIT can complement ITIL to attain Business-IT Alignment.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
INFORMATION SYSTEM OF CUSTOMER RELATIONSHIP MANAGEMENT PT HASRAT ABADI MERAUK...IAEME Publication
Customer relationship management (CRM) is defined as a clear business strategy
and is a combination of a range of functions, skills, processes, and technologies that
together allow companies to better manage profits with customers as real assets. PT
Hasrat Abadi is the official distributor for Toyota and Yamaha vehicles in five regions
in Eastern Indonesia. However, PT Hasrat Abadi does not have software that can
manage company relationships with customers, and provide fast information to
customers for customer satisfaction and increase profits from the company. Making
this application uses the RUP (Rational Unified Process) methodology which is
gradual with upward progress and iterative (repetitive) to get the appropriate results.
Applications can help companies in making a new breakthrough to market their goods
and services by reading customer behavior through questionnaires, polling and
recording customer activity, this application can help companies to promote the latest
products to customers online so they can keep customers even new customers.
Chap01 Foundations of Information Systems in BusinessAqib Syed
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Just as computing and the World-Wide Web progressed through stages of maturity on the way to full acceptance, artificial intelligence is destined to do the same. By understanding the comparable challenges that were overcome and benefits achieved with earlier technologies, organizations can better see today where AI is heading and ensure that they are properly positioned to reap its full value.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
For effective management and governance of education system, several efforts have been evolving
continuously by using Information Communication and Technology for Educational Management. The role
of the Information and Communication Technology (ICT) infrastructure particularly services require for
the data intensive and communication intensive application becomes more important. Further, due to the
massive growth of information, situation becomes difficult to manage these services. The present paper
discusses the related issues such as competence building, creation of appropriate ICT infrastructure, ICT
acceptance level etc. required for Information Technology for Educational Management(ITEM)
competence building framework, considered in an earlier approach for core competences for ITEM.
Therefore, it becomes essential to consider the global standard and relevant ICT infrastructure. This effort
will help in activities and resource management for effective implementation of the framework.
COMPETENCE BUILDING FRAMEWORK REQUIREMENTS FOR INFORMATION TECHNOLOGY FOR EDU...cscpconf
Progressive efforts have been evolving continuously for the betterment of the services of the Information Technology for Educational Management(ITEM). These services require data intensive and communication intensive applications. Due to the massive growth of information, situation becomes difficult to manage these services. Here the role of the Information and Communication Technology (ICT) infrastructure particularly data centre with communication components becomes important to facilitate these services. The present paper discusses the related issues such as competent staff, appropriate ICT infrastructure, ICT acceptance level etc. required for ITEM competence building framework considering the earlier approach for core competences for ITEM. It this connection, it is also necessary to consider the procurement of standard and appropriate ICT facilities. This will help in the integration of these facilities for the future expansion. This will also enable to create and foresee the impact of the pairing the management with information, technology, and education components individually and combined. These efforts will establish a strong coupling between the ITEM activities and resource management for effective implementation of the framework.
Mobile Business Intelligence Acceptance Model for Organisational Decision MakingjournalBEEI
Mobile Business Intelligence (BI) is the ability to access BI-related data such as key performance indicators (KPIs), business metric and dashboard through mobile device. Mobile BI addresses the use-case of remote or mobile workers that need on-demand access to business-critical data. User acceptance on mobile BI is an essential in order to identify which factors influence the user acceptance of mobile BI application. Research on mobile BI acceptance model on organizational decision-making is limited due to the novelty of mobile BI as newly emerged innovation. In order to answer gap of the adoption of mobile BI in organizational decision-making, this paper reviews the existing works on mobile BI Acceptance Model for organizational decision-making. Two user acceptance models which are Technology Acceptance Model and Technology Acceptance Model for Mobile Services will be review. Realizing the essential of strategic organizational decision-making in determining success of organizations, the potential of mobile BI in decision-making need to be explore. Since mobile BI still in its infancy, there is a need to study user acceptance and usage behavior on mobile BI in organizational decision-making. There is still opportunity for further investigate the impact of mobile BI on organizational decision-making.
Accelerating Machine Learning as a Service with Automated Feature EngineeringCognizant
Building scalable machine learning as a service, or MLaaS, is critical to enterprise success. Key to translate machine learning project success into program success is to solve the evolving convoluted data engineering challenge, using local and global data. Enabling sharing of data features across a multitude of models within and across various line of business is pivotal to program success.
Exploring the Impact of the use of Business Information systems BIS on the or...inventionjournals
Business Information System BIS is considered as a critical tool, which has a major supporter of the economy which use BIS in an effectively manner. Organizations marked experiencing and acceleration towards the use of BIS to support its operations in order to improve performance and achieve superiority over competitors, which is reflected in the organizational effectiveness. This study aims to identify the impact of the use of Business Information Systems BIS on the organizational performance effectiveness in banks in Jordan. The study population are all (23) banks in Jordan. The study instrument distributed a (42) questionnaire to all senior directors in the banks, The questionnaires were analysed using regression, correlation analysis in order to determine the impact of business information systems BIS and its dimensions as an independent variable on the organizational performance effectiveness which is dependent variable in banks in Jordan.. The study outcomes shown that business information system BIS adoption would increase organizational performances, and offering practical suggestions that may ensure the achievement of the objectives to be accomplished by using BIS contributing to organisational effectiveness. Beside, effective use of BIS in banks would maximizing the total value to financial performance. Also Banks in Jordan gives great importance to the use of BIS significantly, in the belief that they contribute to improving the competitive position.
Artificial Intelligence in Financial Services: From Nice to Have to Must HaveCognizant
AI is moving beyond experimentation to become a competitive differentiator in financial services — delivering a hyper-personalized customer experience, improving decision-making and boosting operational efficiency, our recent primary research reveals. Yet, many financial services companies will need to accelerate their efforts to infuse AI across the value chain while preparing for the next generation of evolutionary neural network technologies to keep pace with more forward-thinking players.
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
Information technology knowledge has become a necessity. Most of a persons daily activities involve the assistance of information technology, both teaching and learning activities, working in institutions and entrepreneurship. In addition, knowledge of information technology is a persons main asset to be able to compete in the digital era. A cooperative is an institution that runs on the principle of kinship. So that in carrying out its activities prioritizing the welfare of its members and aiming to increase the economic growth of the community. The goal to be achieved in this community service activity is to produce an android based system of savings and loan cooperative service that is able to facilitate the delivery of information from management to members in real time and can provide solutions for speed, accuracy and accuracy. The method used in this research and development research uses the waterfall model, which is a process or steps to develop a new product or improve an existing product. The system analysis was carried out with the initial stages of the research method, the communication stage was carried out by the interview and observation process. The observation process is carried out by making direct observations to get an overview and the interview process is carried out by conducting questions and answers to match the data and information. After designing the next step is build an android system based of savings and loan cooperative service. Dimas Indra Laksmana | Maranatha Wijayaningtyas | Kiswandono "Application of Savings and Loan Cooperative Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd40065.pdf Paper URL: https://www.ijtsrd.com/management/mis-and-retail-management/40065/application-of-savings-and-loan-cooperative-services/dimas-indra-laksmana
Strategic alignment is a conviction that is considered extremely important in understanding how organizations can apply their arrangement of information technology (IT) into substantial boosts in achievement. To attain alignment advantage, Information Technology Infrastructure Library (ITIL) prepares a framework of best practice approch for IT Service Management in all countries and Control Objectives for Information and Related Technology (COBIT) is an IT governance framework and aiding toolset that permits managers to stretch the gap between control prerequisites, technical matters and business risks. The purpose of this paper is to recognize how COBIT can complement ITIL to attain Business-IT Alignment.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
INFORMATION SYSTEM OF CUSTOMER RELATIONSHIP MANAGEMENT PT HASRAT ABADI MERAUK...IAEME Publication
Customer relationship management (CRM) is defined as a clear business strategy
and is a combination of a range of functions, skills, processes, and technologies that
together allow companies to better manage profits with customers as real assets. PT
Hasrat Abadi is the official distributor for Toyota and Yamaha vehicles in five regions
in Eastern Indonesia. However, PT Hasrat Abadi does not have software that can
manage company relationships with customers, and provide fast information to
customers for customer satisfaction and increase profits from the company. Making
this application uses the RUP (Rational Unified Process) methodology which is
gradual with upward progress and iterative (repetitive) to get the appropriate results.
Applications can help companies in making a new breakthrough to market their goods
and services by reading customer behavior through questionnaires, polling and
recording customer activity, this application can help companies to promote the latest
products to customers online so they can keep customers even new customers.
Chap01 Foundations of Information Systems in BusinessAqib Syed
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Just as computing and the World-Wide Web progressed through stages of maturity on the way to full acceptance, artificial intelligence is destined to do the same. By understanding the comparable challenges that were overcome and benefits achieved with earlier technologies, organizations can better see today where AI is heading and ensure that they are properly positioned to reap its full value.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
FRAMEWORK FOR EDUCATIONAL COMPETENCE WITH EMERGING SCENARIOijcsit
For effective management and governance of education system, several efforts have been evolving
continuously by using Information Communication and Technology for Educational Management. The role
of the Information and Communication Technology (ICT) infrastructure particularly services require for
the data intensive and communication intensive application becomes more important. Further, due to the
massive growth of information, situation becomes difficult to manage these services. The present paper
discusses the related issues such as competence building, creation of appropriate ICT infrastructure, ICT
acceptance level etc. required for Information Technology for Educational Management(ITEM)
competence building framework, considered in an earlier approach for core competences for ITEM.
Therefore, it becomes essential to consider the global standard and relevant ICT infrastructure. This effort
will help in activities and resource management for effective implementation of the framework.
COMPETENCE BUILDING FRAMEWORK REQUIREMENTS FOR INFORMATION TECHNOLOGY FOR EDU...cscpconf
Progressive efforts have been evolving continuously for the betterment of the services of the Information Technology for Educational Management(ITEM). These services require data intensive and communication intensive applications. Due to the massive growth of information, situation becomes difficult to manage these services. Here the role of the Information and Communication Technology (ICT) infrastructure particularly data centre with communication components becomes important to facilitate these services. The present paper discusses the related issues such as competent staff, appropriate ICT infrastructure, ICT acceptance level etc. required for ITEM competence building framework considering the earlier approach for core competences for ITEM. It this connection, it is also necessary to consider the procurement of standard and appropriate ICT facilities. This will help in the integration of these facilities for the future expansion. This will also enable to create and foresee the impact of the pairing the management with information, technology, and education components individually and combined. These efforts will establish a strong coupling between the ITEM activities and resource management for effective implementation of the framework.
COMPETENCE BUILDING FRAMEWORK REQUIREMENTS FOR INFORMATION TECHNOLOGY FOR EDU...csandit
Progressive efforts have been evolving continuously for the betterment of the services of the Information Technology for Educational Management(ITEM). These services require data
intensive and communication intensive applications. Due to the massive growth of information,situation becomes difficult to manage these services. Here the role of the Information and
Communication Technology (ICT) infrastructure particularly data centre with communication components becomes important to facilitate these services. The present paper discusses the related issues such as competent staff, appropriate ICT infrastructure, ICT acceptance level etc.
required for ITEM competence building framework considering the earlier approach for core competences for ITEM. It this connection, it is also necessary to consider the procurement of
standard and appropriate ICT facilities. This will help in the integration of these facilities for the future expansion. This will also enable to create and foresee the impact of the pairing the
management with information, technology, and education components individually and combined. These efforts will establish a strong coupling between the ITEM activities and
resource management for effective implementation of the framework.
Core model of information technology governance system design in local govern...TELKOMNIKA JOURNAL
Information technology governance (ITG) in local government is aimed at a good governance service framework. Reports produced as a result of the framework’s implementation help to improve governance’s openness, potency, and efficiency. A strong governance structure for adopting information technology (IT) is essential to ensuring its best utilization. The governance system should be properly managed to support the organization’s business. Therefore, this research aims to design an ITG system suitable for best practices using the control objectives for information technologies (COBIT) 2019 framework. The recommendations from the core model were processed based on the priority or competence level that local government entities use. It also produced a core model with capability levels of 1 and 2 that do not exist. The recommendation designated for the priority level of 3 was 17. The core model to be assigned a capability level of 4 urgently needed to be implemented was 23 core models.
Neither Information technologies determine organisational structure merely, nor does organisational structure. There is a mutual interaction between there variables. Using information technologies is a must for the organisations in this century. However how information technologies evolved over the time brings a question of what effect can technology bring towards organisations and their structure. This study discusses the conceptual issues that raise the importance of technological tools, views and ways that followed by organisations and changed over the time. It also examines technological, organisational and interactive ties that connect organisational structure and the information technology. It concludes that information technologies have an impact on the organisational structure via centralisation and decentralisation, authority and control, space of control, change in organisational level, departmental structure, decision making process, communication, and organising the work.
An Empirical Study on the information systems in the Moroccan organizations: ...INFOGAIN PUBLICATION
An information system, it’s the key point of the success of companies [5] [6]. Where from the necessity of investing to develop information systems, these investments concern to infrastructures, application software’s, set up systems, and existing processes. Companies have to follow policies to manage well their investment of information systems in an economic and optimal way, it is the subject of this paper. To validate our subject, our hypothesis, a study of ground was necessary. We opted for an empirical study on the information systems of the high-level Moroccan organizations in various sectors, by basing itself on scientific foundations. The study and the data analysis allowed us to propose new simplified models.
A knowledge management-based conceptual model to improve the level of utiliza...IJAEMSJORNAL
The current commercial context for the Small and medium-sized enterprises (SMEs) is an ever-changing environment that is strongly influenced by the information and communication technologies (ICTs). This has led enterprises to implement these technologies as supportive tools for their business processes. Nevertheless, a vast number of SMEs have not obtained favorable results in implementing ICTs, since the lack of knowledge about the potential and application of these technologies has made this technological implementation activity prevail as an action oriented to the simple acquisition of equipment and informatic systems with a short-term vision without considering a business strategy. The aim of this paper is to perform a literature review that shows evidence of the low utilization of ICTs in SMEs, particularly in the Mexican environment, which leads to proposing a different approach where enterprises consider Knowledge Management (KM) in the implementation of the informatic technology, leading to a conceptual model to ensure human, organizational and relational capital provide the proper capabilities to complement a strategy that implies carrying out a correct acquisition and application of knowledge that contributes to improving the utilization of ICTs in the business processes.
Background: As a result of enormous progress in the information technology and communications, several
organizations adopt business intelligence (BI) applications in order to cope with the development in
business mechanisms, staying at the marketplace, competition, customer possession and retention.
The rapid growing capabilities of both generating and gathering data has created an imperative
necessity for new techniques and tools can intelligently and automatically transform the processed data in
to a valuable information and knowledge. Knowledge management is a cornerstone in selecting accurate
information at the appropriate time from many relevant resources.
Objective: The major Objective of this research is to "examine the impact of business intelligence on
employee's knowledge sharing at the Jordanian telecommunications company (JTC)".
Design/methodology/approach: A review of the literature serves as the basis for measuring the impact of
business intelligence using knowledge sharing scale. The study sample consisted of administrators,
technical staff, and senior managers.75 questionnaires were distributed in the site of JTC. (70)
Questionnaires were collected. (63) Found statistically usable for this study representing a response rate
of (84 %).
Findings: Most important findings for this study demonstrate that business intelligence tools respectively
(OLAP, Data Warehousing, and Data Mining)are highly effect on employee knowledge sharing.
Originality/ Value: Business Intelligence play a significant role in obtaining the underlying knowledge in
the organization, through optimum utilization of data sources the internal and external alike. Several
researches addressed the importance of integrating business intelligence with knowledge management,
little of these researches addressing the impact of business intelligence on knowledge sharing. This study
has tried to address this need.
Conceptualizing Information Technology Governance Model for Higher Education:...journalBEEI
Information Technology (IT) governance has been emerging as a central issue in many organizations. This is because IT governance is key to realizing IT business value. Past studies have focused on the three aspects of IT governance, namely, structural capability, process capability and relational capability. At the same time, some studies have suggested that IT governance process should be viewed as a learning process rather than a problem solving process. Based on this scenario, the role of knowledge and knowledge based processes should be the central focus of IT governance. As a learning process, IT governance effectiveness can be determined by how much impact IT governance practices has influenced on decision-makers’ thinking and actions. In this case, knowledge capacity absorbed from IT governance experience reflects a certain level of organizational learning (OL) achieved which later influences the level of IT governance performance. Since studies that adopt this perspective is lacking, this paper proposes a conceptual framework based on absorptive capacity approach for an IT governance performance model in the higher education. The paper contributes theoretically by extending the knowledge of IT governance by exploring a new perspective on OL
Net impact implementation application development life-cycle management in ba...CSITiaesprime
Digital transformation in the banking sector creates a lot of demand for application development, either new development or application enhancement. Continuous demand for reimagining, revamping, and running applications reliably needs to be supported by collaboration tools. Several big banks in Indonesia use Atlassian products, including Jira, Confluence, Bamboo, Bitbucket, and Crowd, to support strategic company projects. We need to measure the net impact of application development life-cycle management (ADLM) as a collaboration tool. Using the deLone and McLean model, process questionnaire data from banks in Indonesia that use ADLM. Processing data using structural equation modeling (SEM), multiple variables are analyzed statistically to establish, estimate, and test the causation model. The conclusions highlight that system quality strongly affected only User Satisfaction (p=0.049 and β=0.39). Information quality strongly affected use (p=0.001 and β=0.84) and strongly affected user satisfaction (p=0.169 and β=0.28). Service quality strongly affected only use (p=0.127 and β=0.31). Conclusion research verifies the information system's achievement approach described by DeLone and McLean. Importantly, it was discovered that system usability and quality were key indicators of ADLM success. To fulfill their objective, ADLM must be developed in a way that is simple to use, adaptable, and functional.
Small and medium enterprise business solutions using data visualizationjournalBEEI
The small and medium enterprise (SME) companies optimize performance using different automated systems to highlight the operations concerns. However, lack of efficient visualization in reporting results in slow feedbacks, difficulties in extracting root cause, and minimal corrective actions. To complicate matters, the data heterogeneity has intensely increased, and it is produced in a fast manner making it unmanageable if the traditional methods of analytics are applied. Hence, we propose the use of a dashboard that can summarize the operational events using real-time data based on the data visualization approach. This proposed solution summarizes the raw data, which allows the user to make informed decisions that can give a positive impact on business performance. An interactive intelligent dashboard for SME (iid-SME) is developed to tackle issues such as measurement of cases completed, the duration of time needed to solve a case, the individual performance of handling cases and other tasks as a proof of concept. From the result, the implementation of the iid-SME approach simplifies the conveyance of the message and helps the SME personnel to make decisions. With the positive feedback obtained, it is envisaged that such a solution can be further employed for SME improvement for better profit and decision making.
BIM Term Paper Proposal on Applications of ICT on Office Management santo BD
BIM Term Paper Proposal
Topics is "Applications of ICT on Office Management and organization Development"
Broader objective of the study :
? ? Main objective of this study- ICT applications how to help office management and
to develop organization.
Specific objectives: The specific objective of the study will be:
• Identify the ICT applications using for office management.
• To identify impact on employment productivity of using ICT applications.
• Cost benefit analysis of using ICT applications in the organization.
Bangladesh Institute of Management (BIM), Dhaka
Knowledge management (KM) has become an effective way of managing organization‟s intellectual capital or, in other words, organization‟s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.
The organizations can bring beneficial information through data technologies like Y2k, Bubble etc. There are many other benefits of these technologies, like they can help in utilizing and analyzing the information more comfortably and generate accurate financial reports within the organization. With the application of modern technology and automated systems, employees, stakeholders and consumers can be protected, because these systems help in making genuine report design. Organizations can maintain information system such as record keeping system on any Oracle or SQL server program. In order to avoid misuse of the data and analysis recorded in the system, the U.S designed SOX law procedures in July 2002 that needed to be followed.
This paper had as approach a study about the use of IT resources in three different small, medium and large transport companies of the city of Pau dos Ferros - RN. The collected data allowed the knowledge of the main technological resources used in the internal structure of each company and their influence on the internal decision-making processes. When analyzing the resources used by the organizations, a certain similarity was identified in the types and a difference in the Information Systems used. The enterprises,named here as A, B and C, use thesoftwares SYSPDV, SoftCom and CissPoder, respectively. It was also identified that the small enterprise A does not use all the functionalities of the Information System employed, while the large enterprises B and C explore all the capacities of the IS in the company internal structure.
SMUPI-BIS: a synthesis model for users’ perceived impact of business intelli...nooriasukmaningtyas
Business intelligence is a collection of methodologies, methods, architectures, and technologies that convert raw data into significant and useful information used by organizations to enable more effective strategic, tactical, and operational insights and decision-making. In spite of several studies have examined the critical success factors and development of business intelligence system, but few relevant studies have investigated perceptions of end-user’s business intelligence systems. Furthermore, none of those studies was performed in a higher education sector in Iraq. Consequently, the study aims to determine the business intelligence system features influencing perceived impact end users’ and of using business intelligence systems in Iraqi educational institutes. A technology acceptance model and technology organization environment framework were syntheses as a basis to develop a research model for business intelligence users' perceived impact and adopt of business intelligence systems named (SMUPIBIS). Later, an online instrument (questionnaire) was designed to gather data from the business intelligence system users in five Iraqi universities. Twentyone hypotheses were proposed and later tested. The main outcomes of this study suggest that decision support, information quality, and real-time reporting are the most significant system characteristics influencing end users' perceived impact and their usage of business intelligence systems.
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
Today, the function of the chief information officer (CIO) has become part of the flow charts of many Moroccan companies [1]. Based on this statement, we did an empirical study in the first part of this work on the state of information systems (IS) Moroccan to know their strengths and weaknesses. The aim of the second part is to propose an approach based on the IT (information technology) frameworks helping CIOs to form their own repository of good practices to be applied in order to have good IT governance.
Similar to Thriving information system through business intelligence knowledge management excellence framework (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
Thriving information system through business intelligence knowledge management excellence framework
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 1, February 2022, pp. 506~514
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i1.pp506-514 506
Journal homepage: http://ijece.iaescore.com
Thriving information system through business intelligence
knowledge management excellence framework
Abdul Karim Mohamad1
, Mailasan Jayakrishnan1
, Mokhtar Mohd Yusof2
1
Centre for Advanced Computing Technology, Faculty of Information and Communication Technology, Universiti Teknikal Malaysia
Melaka, Malaysia
2
Faculty of Computer and Information Technology, Al-Madinah International University, Kuala Lumpur, Malaysia
Article Info ABSTRACT
Article history:
Received Feb 15, 2021
Revised Jun 17, 2021
Accepted Jun 29, 2021
In the current digitalization dilemma of an organization, there is a need for
the business intelligence and knowledge management element for enhancing
a perspective of learning and strategic management. These elements will
comprise a significant evolution of learning, insight gained, experiences and
knowledge through compelling theoretical impact for practitioners,
academicians, and scholars in the pertinent field of interest. This
phenomenon occurs due to digitalization transformation towards industry
revolution 5.0 and organizational excellence in the information system area.
This research focuses on the characteristic of a comprehensive performance
measure perspective in an organization that conceives information
assessment and key challenges of Business Intelligence and Knowledge
Management in perceiving a relevant organizational excellence framework.
The dynamic research focusing on the decision-making process and
leveraging better knowledge creation. The future of organization excellence
seemed to be convergent in determining the holistic performance measure
perspective and its factors towards industry revolution 5.0. The research
ends up with a typical basic excellence framework that will mash up some
characteristics in designing an organizational strategic performance
framework. The output is a conceptual performance measure framework for
a typical decision-making application for organizational strategic
performance management dashboarding.
Keywords:
Business intelligence
Decision support system
Information management
Information system
Knowledge management
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mailasan Jayakrishnan
Centre for Advanced Computing Technology, Faculty of Information and Communication Technology,
Universiti Teknikal Malaysia
Melaka, Malaysia
Email: m031620010@student.utem.edu.my
1. INTRODUCTION
The fundamental capability or component of an organization is about the ability of its members at
all levels to communicate effectively [1]. The history and discipline of information system (IS) had
introduced several vital roles in knowledge and perspective sciences of information for dramatically
changing the spectrum of the information disciplines into information sciences, informatics and knowledge
management (KM) [2]. Unfortunately, divergent disciplines utilize contradictory phases for the equivalent
standards, such as the research of software is known as computer sciences (CS) or software engineering (SE).
The human level of computing is even more complex, where engineers manipulate the term information
technology (IT) to introduce to real user applications, organizations or businesses propose using IS, whereby
academic or education exploit information and communication technology (ICT) and health professionals
2. Int J Elec & Comp Eng ISSN: 2088-8708
Thriving information system through business intelligence … (Abdul Karim Mohamad)
507
contrive the term of informatics to meet their needs. The above scenarios have their significant roles, all are
referring to the human level of computing and digitalization transformation towards Industry Revolution 5.0.
The disciplines of emergence often have a remarkable impact on the characteristic of the information
disciplines that commence from them, however, various kinds of perspectives and knowledge called for are
dramatically divergent from the perspectives of the home disciplines. Therefore, the relationship between a
specific information discipline and its home academic discipline may be much more complex than is typical
for conventional modern disciplines. Today’s organizations are so eager to aspire in prospecting their
organization in a digital world [3]. Thus, most organizations are stuck in the automation stage [4]. Many
organizations still have a legacy of isolated automated systems based on outdated technologies [5]. They
have made no real changes in the way they work or are organized. Much of the new sophisticated hardware is
used to automate more of the existing procedures to speed up outdated tasks rather than to rethink them from
scratch [6]. Only a few organizations had a coherent understanding of how to realize the potential of the data
collected by their automated systems for industry revolution 5.0 [7]. Whereby these data can be combined or
integrated to produce knowledge that can be utilized to enhance not only the process of production but also
business coordination and control. The challenge was primarily managerial, that is more valuable ways of
evaluating and measuring white-collar productivity, IT, and quality was needed [8]. There is no influence
from IT is yet tangible in the macro-economic data present [9]. A few individual firms are evident better off
and there is a massive group of isolated examples of successful IT exploitation in precise individual function
or business units. Nevertheless, on average the predicted interest is not yet visible. Making the transition will
be difficult without major changes in the way IT is managed, in employee competencies, and in management
processes [10]. The research had stressed that IT cannot be considered in isolation, its potential for business
transformation can only be understood if IT was viewed within its organizational context. The stages of IT
development are not advanced enough to exploit the potential of transformation [11]. It was clear that soft
thinking of the IT benefits could be highlighted by integrating business intelligence (BI), data analytics, and
operational system that leads towards KM excellence for organizational performance. Therefore, this study
identified these IT-related problem-solving mechanism elements and discovering the adoption of soft
thinking characteristic of an integrated framework towards developing a conceptual framework for strategic
performance through observing several available excellence frameworks, data analytics, and business
intelligence approach. Proposing the relevant key performance indicator (KPI) reporting model using data
analytic and business intelligence and designing an online real-time organizational executive dashboard. Thus,
the research focuses on a heuristic view of an organization's approach to problem-solving management issues with
an integrated framework towards developing a performance monitoring framework and assessment model.
2. THE PROPOSED FRAMEWORK
IS in organizations are interconnected structures, where improving one part can influence many
others [12]. Therefore, to execute changes successfully, the organization must adopt an integrated strategy by
analyzing the impact of the propound interchange and employ the results of changes within the organization's
performance strategy [13]. Knowledge sharing in IS that included a part of the knowledge base of an
organization has to be used from the learner’s point of view [14]. Furthermore, it contributes to enhancing the
assimilation of the relation between the information, changes and risk concept and the Data-Information-
Knowledge-Wisdom (DIKW) elements, to strengthen the premise of the meaning and characterization of
changes risk and in this way assigning a basis for better understanding, retrieval information, changes and
risk management in an organization informatics [15] as shown in Figure 1.
Based on Figure 1, the DIKW model of the hierarchy had emphasized two (2) domains as:
i) Theoretical domain focusing on data as collecting, organizing, and naming; information as interpreting and
organizing and knowledge as understanding, interpreting, and integrating and ii) Application or practice
domain focusing on wisdom as applying with reflection, compassion, judgment, and understanding. The
main concerns are about adding value, transforming information into knowledge, and representing properties
of the data and information. The taxonomy of KM in DIKW is shown in Table 1. Based on Table 1, the cycle
of organizational activities focuses on information management (IM), as an effective operation for storing,
archiving, collecting, manipulating, and disseminating data and information in BI and KM. According to
Matarneh [16], many IS are viewed as important contemporary sources of KM for working with large
amounts of data and allowing the information to be presented with a certain value. Moreover, KM is
systematic management in meeting tactical and creating value approaches for the strategic requirements of an
organization [17]. Shehabat and Berrish [18] stated that KM is an integrated process of distributing,
evaluating, identifying, retrieving, sharing, and capturing knowledge using BI tools effectively. Besides,
practitioners need to design a system, which can help a complex organization's strategic decision-making
process by the goal and performance function [19]. This is about focusing on knowledge seeking especially
upon strategic performance diagnostic variables and relevant indicators that can be generated.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 506-514
508
Figure 1. DIKW model of hierarchy
Table 1. Taxonomy of knowledge management in DIKW elements
IS Domain Elements Justification Philosophy Knowledge
Management
IS
Perspective
IS Nexus
Application
or practical
domain
Wisdom Adding value to the
organization's function with
strategic judgment.
Know why Explicability in
the wisdom of
an organization
Choice of the
menu system
Business
intelligence
system
Theoretical
domain
Knowledge Transformation of
information into knowledge.
Know-how Effectiveness in
knowledge
Choice of
decisions
Decision
support system
Information Classify as description
answer that inferred from
data.
Know what Efficiency in
information
Choice of
information
Management
information
system
Data Indicates symbols that
represent properties of the
environment and objects that
need observation.
Know-
nothing
Muddling
through
information
Choice of
data
Electronic data
processing
2.1. Organizational information system views
The journey of IS also leads towards the development of informatics body of knowledge through
software engineering (SE), IM, KM, artificial intelligence (AI), and BI for transforming into meaningful
information. Adaption of IS to provide new insights and organizational transformation through IS packaging
is a game-changer. IS typically include the following organizational components for i) communication that
requires people to communicate rapidly using effective and efficient information, ii) operations emphasize
upon the data provides insights into the organization’s performance, iii) decisions with regards to delivering
all the information needed and modeling results for decisions and iv) records that stores information,
documents, and documentation about the organizational data. Ideally, strategic decisions can be more
productive in managing information overload by ensuring excellent knowledge sharing and KM of the multi-
level management and related departments [20]. Therefore, we need the new IS 5.0 that has merged the two
conceptual components: enterprise resource and the information system for the control system for observing
certain performances. The data of the transactions, machines activities, components, and facilities are
processed and managed at a respective centralized operational location [21]. This empowers such as
planning, controls, management, and operation of the value chain in real-time [22]. The IS 5.0 refers to the
prerequisite for the systematic implementation of the linked digital world-industrial revolution 5.0. All
information about transactions, orders, customers, products, reports, bills, and suppliers are managed by the
automated features of IS and visualized or displayed clearly in form of dashboarding. Besides, the IS
comprises relevant data of operations, utilities, facilities, machines, and system components in real-time
towards optimizing the planning, running, controlling, and monitoring of those critical operations through
visualization. Furthermore, conceptualized IT development of IS 5.0 stages can be categorized and
implemented in an organization as shown in Table 2.
4. Int J Elec & Comp Eng ISSN: 2088-8708
Thriving information system through business intelligence … (Abdul Karim Mohamad)
509
Based on Table 2, the focus of IS has required an efficient and open software architecture with
development perspectives and flexible process control for the future. Therefore, many subsystems like ERP
and PCS, which were mere island software products and often only synchronized overnight, must be
connected to the integrated information system landscape in providing visualization of all data analytics and
performance measures in real-time in managing information and knowledge.
Table 2. IT development of IS 5.0 transition stages
IT Development
Stages
Transition Stages IS 5.0 Transformation
Stage 1: Automation IT is used for short-term tactical reasons as a reactive business IT strategy.
Administrative IT concentrating on efficiency and back-office function,
which is the policy-based or account-based systems for static, administrative,
and paper-based management information systems.
Creation of data.
Stage 2: Towards
Integration
IT as part of a long-term strategic plan to gain a competitive edge as an
integrated business IT strategy. Marked-led IT focusing on improved quality
of service and flexibility of response on the integration of client
administration, POS, marketing, and branch systems and continuously
updated quality management information systems.
Active use of information
and integration of IM with
the business.
Stage 3: Towards
Transformation
Digital IT as part of a long-term strategic plan to gain intelligence
information as an intelligence business IT strategy. Market-led IT focusing
on smart data turning into insights, actions, and resulting outcomes for BDA.
Digital transformation of analytics expertise on autonomous learning with
intelligence systems and the evolution of intelligent IS.
Adaptation of information
and visualization to provide
new insights.
2.2. Theoretical background
The research emphasizes two theoretical models as McKinsey 7S’s and MIT90’s model. Bain [23],
stressed that the MIT90 model conceptualizes the organization’s efficacy in employing ICT for the
management process with six (6) inter-related components: management processes, technology, strategy,
external environment, structure, and individual and roles as shown in Figure 2. Besides, McKinsey 7S’s
framework has recognized seven (7) indicators for the successful performance of organization strategies:
structures, systems and strategies, style, skills, shared values, and staff [24], as shown in Figure 3.
Figure 2. MIT90s model Figure 3. McKinsey 7s model
2.3. Conceptual framework development
Initially, we have observed the general frameworks for excellence. Both models had shared the
generic elements that contributed important components for the organizational performance measures. This
effort was an important approach to relating many sources of data within an organization that could be
critical to the BI-KM excellence framework. Based upon the recent operational activities and processes, we
have conceived a typical adaptation of frameworks that had signified six (6) elements as; i) workforce
engagement system, ii) customer management system, iii) leadership system, iv) knowledge management
system, v) Strategic planning system; and vi) Operations focus system, as shown in Figure 4. This is an
integrating the potential KPIs for organizational BI framework of an organization standard as KPIs for
measurements indicating that the BI-KM framework for a typical higher learning institution strategic plan.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 506-514
510
We have derived the view by having a preliminary study on a few organizational excellence, big data, and BI
models.
Figure 4. Adaption of generic BI-KM system model
3. RESEARCH METHOD
The philosophy of IS research deals along with the generalized explanation of the component and
hinges on the dispense of experience about the organization world in which people’s approaches diverge
from one another [25]. IS research has perpetually prevailed multi-cultural and multi-perspective in
complexion which assists in providing varied content about ways to ideally interpret the organization world.
Basic philosophical approaches or underpinnings of IS research paradigms contain the philosophical analysis
of epistemology, ontology, and methodology [26]. To elaborate on the synergic phenomena, the domain of
knowledge in BI and KM needs to be understood as ideologies. Perhaps relevant, ideologies can be further
perceived as the ontological, epistemological, and methodological points of view as shown in the following
Table 3.
Table 3 has summarized the strategic research paradigm that influences strategic decision-making
especially for the positivism paradigm that emphasized seeking on operation level. The interpretivism
paradigm seeks on the tactical level and the critical realism paradigm seeks on the strategic level. The
conceptual framework of this study will be focusing on the cause-and-effect relationships on the strategic
level. Yet, the outcome will be grouped quantitatively. A survey will be conducted to gain a holistic view of
the context. Then the prototype of the project named the organization dashboard will be tested to verify the
conceptual framework, especially in the dashboard design. For the validating phase, secondary data from the
organization is applied to validate the proposed prototype. The sample size desired for this study is 331
respondents, if the population size given is 2400. Therefore, we perform the data collection from the present
academic staff and administration of University X. The questionnaire contains eight (8) sections: section one
(1) of Demographic Profile of University X, section two (2) strategy factors, section (3) structure factors,
section (4) systems factors, section (5) skills factors, section (6) staff factors, section (7) style factors and
section (8) shared values.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Thriving information system through business intelligence … (Abdul Karim Mohamad)
511
Table 3. Strategic research paradigm of IS in organization
Assumption Positivism (Operational) Interpretivism (Tactical) Critical realism (Strategic)
Ontology: The position
on the personality of
matter
External, independent, and
objective. (Process Efficiency)
Philosophically compose,
intuitive, may diversity and
various. (Enlightenment)
Endure independently of people
thinking and information.
(Organizational Effectiveness)
Epistemology: The
perspective on what
comprises sufficient
information.
The only noticeable situation can
present a rational clue and data.
Emphasis on act-like conclusion
and causality, compressing the
situation to the smooth
components.
Personal context and analysis
experience. Emphasis the factor
of the incident, subjective
meanings, motivating actions, and
the reality behind these
components.
The only evident situation can
furnish credible features and
data. Emphasis on interpreting
within a situation.
Methodology: The
design urging the
research approach
Quantitative (Organizational
Cybernetics)
Qualitative (Hard Systems
Thinking)
Quantitative or Qualitative
(Soft Systems Thinking)
Outcome Functionality Architecture (To
facilitate the accurate, reliable,
efficient processing of data and
communication of information)
Systems Capabilities Framework
(To assist the productive use of
knowledge resources and
information)
Data transfer technology
framework (To engage in
organizational learning,
innovation, and adaptation)
Culture or Structure (Knowledge Infrastructure
Building)
(Knowledge Organization) (Knowledge Creation and Use)
4. RESULTS AND DISCUSSION
The study obtains feedback from 474 respondents of University X. The respondent’s characteristics
are shown in Table 4. Based on Table 4, University X has 53% (250) administration staff’s grades 11-40,
24% (114) academia staffs, and 23% (110) administration staff’s grade 41-54. The working duration
indicates that 49% (230) of staff has been working more than 8 years, followed by 31% (150) of the staff
working period between 4 to 7 years, and 20% (94) working less than 3 years in the University X. The
university has 67% (315) permanent staff and 33% (159) contract staff, respectively. Moreover, we have
measured the internal consistency for its reliability, as shown in Table 5.
Table 4. Characteristics of the respondents
Characteristics N = 474 %
Job Perspective
− Administration (Grade 11-40)
− Academia
− Administration (Grade 41-54)
250
114
110
53
24
23
Working Duration
− < 3 years
− 4 – 7 years
− > 8 years
94
150
230
20
31
49
Working Status
− Permanent
− Contract
315
159
67
33
Table 5 indicates that internal consistency 0.705 for strategy factors, 0.705 for structure factors,
0.796 for systems factors, 0.715 for style factors, 0.750 staff factors, 0.709 for skills factors, and 0.811 for
shared values. Based upon the Figure 5, the most significant yield is that insufficient effort and commitment
(63.5%) was highlighted, followed by the lacking of appreciation among the staff (56.3%). These are critical
indicators of excellence system and strategic planning system respectively. Besides, unclear control and
monitoring (56.5%) and passive and lack of interest (56.1%) had also been highlighted as critical components
for further observations. All the indicators have required a platform in form of visualization that captures and
monitors data and information for measuring performances.
Table 5. Internal consistency
Variables Items Questionnaire Cronbach’s Alpha Internal comment
Strategy Factors 3 Q5 0.705 Good (Low-Stakes testing)
Structure Factors 3 Q6 0.705 Good (Low-Stakes testing)
Systems Factors 3 Q7 0.796 Good (Low-Stakes testing)
Style Factors 3 Q8 0.715 Good (Low-Stakes testing)
Staff Factors 3 Q9 0.750 Good (Low-Stakes testing)
Skills Factors 3 Q10 0.709 Good (Low-Stakes testing)
Shared Values 3 Q11 0.811 Excellent (High-Stakes testing)
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 506-514
512
Figure 5. The hard and soft elements in the BI matrix
5. CONCLUSION
In this research, the conceptual framework design emphasizes the models from the behavioral
decision and heuristics view in an organization. This work has also emphasized developing BI-KM
intelligence. Moreover, we have outlined an enterprise excellence framework based on the philosophy
research approach for IS developers and arguing that philosophy can simulate an important character in
educating professional practitioners. We aim to employ philosophy to assist inexperienced students and
practitioners in becoming more professional. We do not want to make philosophers out of IS developers, but
rather to motivate them to philosophies. The challenge ahead is to perceive the knowledge emergence in a
form of a BI framework that is suitable for specific assessment needs of an organization such as a university
performance diagnostic tool. We had defined the model of its KPIs reporting using BI and big data analytics
by proposing a suitable information architecture model of performance management, as a representation of
knowledge repository and data architecture in a form of a performance diagnostics dashboard. In the future,
the important goal in the strategic approach of decision-making design will be fully addressing the demands
and performance monitoring requirements in a complex working environment. Without such an effective
strategic decision-making diagnostic model and monitoring design, it may affect the upper management for
example the Vice-Chancellor or high-level stakeholders in executing their decision-making tasks efficiently.
ACKNOWLEDGEMENTS
The authors would like to thank Universiti Teknikal Malaysia Melaka (UTeM) for the research grant
funding PJP/2016/FTMK/HI3/S01471 that makes this research work possible. The authors also would like to
thank the editor and the anonymous reviewers for their constructive and suggestions to improve the quality of
the paper.
REFERENCES
[1] S. Tkatek, S. Bahti, O. Abdoun, and J. Abouchabaka, “Intelligent system for recruitment decision making using an alternative
parallel-sequential genetic algorithm,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 22,
no. 1, pp. 385-395, 2021, doi: 10.11591/ijeecs.v22.i1.pp385-395
[2] M. Jayakrishnan, A. K. Mohamad, and M. M. Yusof, “Business architecture model in strategic information system management
for effective railway supply chain perspective,” International Journal of Engineering Research and Technology, vol. 13, no. 11,
pp. 3927-3933, 2020.
[3] T. O. Oladele, R. O. Ogundokun, A. A. Adegun, E. A. Adeniyi, and A. T. Ajanaku, “Development of an inventory management
system using association rule,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 21, no. 3,
pp. 1868-1876, 2021, doi: 10.11591/ijeecs.v21.i3.pp1868-1876.
[4] F. Sievers, H. Reil, M. Rimbeck, J. S.-Wollersheim, and M. Leyer, “Empowering employees in industrial organizations with IoT
in their daily operations,” Computers in Industry, vol. 129, 2021, Art. no. 103445, doi: 10.1016/j.compind.2021.103445.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Thriving information system through business intelligence … (Abdul Karim Mohamad)
513
[5] P. T. Nguyen, M. K. Nguyen, and H. T. Dang, “The factors affecting technology transaction value in Vietnam: technology
demand approach,” International Journal of Productivity and Performance Management, vol. 69, no. 2, pp. 344-360, 2019,
doi: 10.1108/IJPPM-07-2018-0278.
[6] M. Langer, C. J. König, D. R.-P. Sanchez, and S. Samadi, “Highly automated interviews: applicant reactions and the
organizational context,” Journal of Managerial Psychology, vol. 35, no. 4, pp. 301-314, 2019, doi: 10.1108/JMP-09-2018-0402.
[7] H. Mahami, F. Nasirzadeh, A. H. Ahmadabadian, F. Esmaeili, and S. Nahavandi, “Imaging network design to improve the
automated construction progress monitoring process,” Construction Innovation, vol. 19, no. 3, pp. 386-404, 2019,
doi: 10.1108/CI-07-2018-0059.
[8] M. Palvalin, “What matters for knowledge work productivity?,” Employee Relations, vol. 41, no. 1, pp. 209-227, 2019,
doi: 10.1108/ER-04-2017-0091.
[9] G. Zhou and X. Xia, “Present situation and development prospect of the digital orchard technology,” China’s e-Science Blue Book
2020, Singapore: Springer Singapore, 2021, pp. 443-458, doi: 10.1007/978-981-15-8342-1_25.
[10] M. Jayakrishnan, A. K. Mohamad, and M. M. Yusof, “Digitalization railway supply chain 4.0: enterprise architecture
perspective,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 5, pp. 9056-9063,
2020, doi: 10.30534/ijatcse/2020/310952020.
[11] K. T. Liou and Q. Hu, “Technology development and public organization management,” International Journal of Organization
Theory & Behavior, vol. 22, no. 2, pp. 114-122, 2019, doi: 10.1108/IJOTB-07-2018-0086.
[12] V. U. T. Sfenrianto, M. Jibril, K. Nainggolan, “Strategic planning of information systems in a timber company,” International
Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 1, pp. 274-278, 2020,
doi: 10.30534/ijatcse/2020/41912020.
[13] R. Kurniawan, D. Budiastuti, M. Hamsal, and W. Kosasih, “The impact of balanced agile project management on firm
performance: the mediating role of market orientation and strategic agility,” Review of International Business and Strategy,
vol. 30, no. 4, pp. 457-490, 2020, doi: 10.1108/RIBS-03-2020-0022.
[14] D. I. Sensuse, V. Suwiyanto, S. Lusa, A. Gandhi, M. Mishbah, and D. Elisabeth, “Designing knowledge sharing system for
statistical activities in BPS-statistics Indonesia,” Data, vol. 6, no. 5, 2021, Art. no. 48, doi: 10.3390/data6050048
[15] L. Ardito, A. M. Petruzzelli, U. Panniello, and A. C. Garavelli, “Towards industry 4.0: mapping digital technologies for supply
chain management-marketing integration,” Business Process Management Journal, vol. 25, no. 2, pp. 323-346, 2019,
doi: 10.1108/BPMJ-04-2017-0088.
[16] S. Matarneh, M. Danso-Amoako, S. Al-Bizri, M. Gaterell, and R. Matarneh, “BIM-based facilities information: streamlining the
information exchange process,” Journal of Engineering, Design and Technology, vol. 17, no. 6, pp. 1304-1322, 2019,
doi: 10.1108/JEDT-02-2019-0048.
[17] D. Mishra, “A study of business knowledge requirements for software projects,” Journal of Global Operations and Strategic
Sourcing, vol. 14, no. 2, pp. 291-311, 2021, doi: 10.1108/JGOSS-07-2020-0041.
[18] I. M. Shehabat and M. Berrish, “Integration between knowledge management and total quality management in Jordanian
Universities,” Research Anthology on Preparing School Administrators to Lead Quality Education Programs, IGI Global, 2021,
pp. 1405-1436, doi: 10.4018/978-1-7998-3438-0.ch062.
[19] M. Jayakrishnan, A. K. Mohamad, and A. Abdullah, “Enterprise architecture embrace digital technology in Malaysian
transportation industry,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 8, no. 4, pp. 852-859,
2019.
[20] M. Jayakrishnan, A. K. Mohamad, and M. M. Yusof, “Strategic information system for decision making in railway supply chain
management,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 3, pp. 3988-3994,
2020, doi: 10.30534/ijatcse/2020/223932020.
[21] S. Alla and S. K. Adari, “Getting started: data analysis,” Beginning MLOps with MLFlow, Berkeley, CA: Apress, pp. 1-39, 2021.
[22] R. Lombardi, R. Trequattrini, F. Schimperna, and M. Cano-Rubio, “The impact of smart technologies on the management and
strategic control: a structured literature review,” Management Control, vol. 1, pp. 11-30, 2021.
[23] C. Bain, A. Goswami, S. Lloyd, and L. Davis, “Post-implementation evaluation of a digital dictation system in a large health
service using HOT-fit framework,” Asia Pacific Journal of Health Management, vol. 15, no. 4, pp. 60-70, 2020,
doi: 10.24083/apjhm.v15i4.339.
[24] J. Razmi, M. Mehrvar, and A. Hassani, “An assessment model of McKinsey 7s model-based framework for knowledge
management maturity in agility promotion,” Journal of Information and Knowledge Management, vol. 19, no. 04, 2020,
Art. No. 2050036, doi: 10.1142/S0219649220500367.
[25] M. Jayakrishnan, A. K. Mohamad, and M. M. Yusof, “Understanding big data analytics (BDA) and business intelligence (BI)
towards establishing organizational performance diagnostics framework,” International Journal of Recent Technology and
Engineering (IJRTE), vol. 8, no. 1, pp. 128-132, 2019.
[26] K. Takeda, “Introduction to the real-world data circulation paradigm,” Frontiers of Digital Transformation, 2021, pp. 3-10,
doi: 10.1007/978-981-15-1358-9_1.
BIOGRAPHIES OF AUTHORS
Abdul Karim Mohamad is a senior lecturer under the Department of Intelligent
Computing and Analytics at the Faculty of Information Technology and Communication,
Universiti Teknikal Malaysia Melaka (UTeM). He received his Ph.D. Degree in Information
Technology from UTeM. His research interest is in an artificially intelligent system. He can be
contacted at email: karim@utem.edu.my.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 506-514
514
Mailasan Jayakrishnan is currently a Doctoral Student at Universiti Teknikal
Malaysia Melaka (UTeM). He earned his B.Sc in Information Technology from Universiti Utara
Malaysia (UUM) and Diploma in Technology Management from Universiti Teknologi Malaysia
(UTM). He can be contacted at email: m031620010@student.utem.edu.my.
Mokhtar Mohd Yusof is currently a Professor at the Faculty of Computer and
Information Technology, Al-Madinah International University. He received his Ph.D. Degree in
Information System from the University of Salford, the UK in 1996. He can be contacted at
email: mokhtaryusof@gmail.com.