{"title":"The Relationship between Mobile Marketing and Customer Relationship Management (CRM)","authors":"Kiandokht Hadadi, Mahmoud Khalid Almsafir","doi":"10.1109/ACSAT.2014.18","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.18","url":null,"abstract":"Mobile marketing refers to different kinds of marketing that contain operation of mobile phone technology to achieve the target spectators. Commonly, people associate mobile marketing with SMS and MMS marketing, pay per call mobile marketing, mobile banner ads, quick response code, location based marketing, Mobile applications and mobile website design. Among the variety of mobile services, considerable attention has been dedicated to mobile marketing specifically to mobile customer relationship management services. The mobile medium is well matched to improve classical CRM as it has a great influence and interactivity and may permit the firm to improve close relationships with clients. The main objective of this research is to investigate the relationship between mobile marketing and CRM. This paper concentrates on different types of mobile marketing and CRM to investigate which type of mobile marketing has a significant relationship on which type of CRM. This research has a quantitative approach and data which is used in this research is primary data. Data were collected by distributing questionnaire among one hundred students, especially those who are in the middle of 17-18 from international high school which is located in the Klang Valley area. The result of this research shows that teenagers are more influenced by mobile banner ads and mobile applications followed by other types of mobile marketing. Mobile applications have a wealthier mobile capability than mobile web. Deep associating of mobile apps is a great occasion for each industry to improve the loyalty of their customers. The results of this research proposed some important inferences which will support marketers to produce better mobile marketing and enhance the mobile customer relationship management services. Also, this research found that there would be a brighter future for mobile advertising rather than any other types of advertising.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh
{"title":"Software Process Improvement Initiatives in Small and Medium Firms: A Systematic Review","authors":"M. Almomani, S. Basri, Saipunidzam Mahamad, A. Bajeh","doi":"10.1109/ACSAT.2014.35","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.35","url":null,"abstract":"Nowadays, software firms are playing very important roles in economies all over the world, and majority of these firms are Small and Medium Enterprises (SMEs). The SMEs recognize that it is important to improve their development processes and activities in order to produce software with high quality and to be competitive in the software industry. However, several studies have shown that the SMEs used ad-hoc manner in their development processes and they suffer from lack of the knowledge and resources to do Software Process Improvement (SPI). In this paper, a Systematic Literature Review (SLR) is used to identify and discuss the SPI initiatives in SME software firms. The results of the systematic review showed that the majority of software process improvement initiatives in SME firms are carried out in America and Europe. Only in one Asian country, Hong Kong was the SPI initiative considered and CMM Fast-Track was the model developed. The developed model did not cover all the CMM levels, only levels 1 and 2 were considered. In conclusion, many Software Process Improvement initiatives have been proposed for SME software firms but they have shortcomings such as lack of generalizability and take a lot of time to gain the benefits/advantage of the SPI model after implementation.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123600548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods","authors":"Issa Qabajeh, F. Thabtah","doi":"10.1109/ACSAT.2014.29","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.29","url":null,"abstract":"Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128760819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arabic-Malay Cognates as a Computer Assisted Language Learning","authors":"R. Shehab, A. Zeki","doi":"10.1109/ACSAT.2014.39","DOIUrl":"https://doi.org/10.1109/ACSAT.2014.39","url":null,"abstract":"This paper aims to build an Arabic WEB-based learning system for Malaysian learners focusing on cognate words in the Arabic language and Malay language. This paper focuses only on the highlighted cognates in the lessons interface in the WEB-based system. The paper starts by the importance of Computer-Assisted Language Learning (CALL), benefits of using cognates in leaning a foreign language, and the bower of highlighting vocabulary strategy in language learning. Finally, the paper concluded by the technical details of building the present WEB-based system.","PeriodicalId":137452,"journal":{"name":"2014 3rd International Conference on Advanced Computer Science Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}