{"title":"Corporate Social Responsibility (CSR) Business Practices and Stakeholders Considered Relevant for the Energy Sector: The Case of Romania","authors":"Buturoaga Cristina Mioara","doi":"10.5171/2017.597300","DOIUrl":"https://doi.org/10.5171/2017.597300","url":null,"abstract":"The energy we use is dependent on fossil fuels available in a limited supply (BP, 2015), while its production accounts for two thirds of the world's greenhouse gas emissions (International Energy Agency, 2015b). The European Union has a target of a 40 % reduction of emissions as compared to 1990 levels by 2030 (European Commission, 2014). On a global scale, companies operating in the energy sector face increasing expectations regarding environment (Crane et al, 2014). One of the current social priorities is to limit global warming to less than 2 o C and these companies are expected to monitor, measure, Abstract","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120974763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy and Security Issues in the Use of Clouds in e-Health in the Kingdom of Saudi Arabia","authors":"Emna Chikhaoui, Jawahitha Sarabdeen, R. Parveen","doi":"10.5171/2017.369309","DOIUrl":"https://doi.org/10.5171/2017.369309","url":null,"abstract":"Cloud computing is one of the most popular current trends in the field of information and communications technology (ICT). This technology allows more efficient computing by centralizing data storage and processing. Due to its tremendous advantages, this technology is maturing rapidly and is being adopted in many sectors including government, business, hospitals, and educational sectors. Information Technology plays a strong role in the health and patient care arenas with cloud computing slowly beginning to make its mark. However, despite the significant advantages for the utilization of cloud computing as part of Healthcare IT (HIT), security, privacy, reliability, integration and data portability are some of the significant challenges and barriers to implementation that are responsible for its slow adoption in the Kingdom of Saudi Arabia. When using the cloud for e-health security and privacy issues are most important, these areas should be addressed before cloud computing could be adopted successfully by all quarters. Patients, healthcare providers and other associated organizations are concerned about the privacy of customers’ information and would like to see proper measures to protect privacy. In this paper, the researchers will discuss privacy and security challenges in using cloud computing e-health and available legislations, possible solutions to address challenges related to security and privacy issues in the use of cloud in the Kingdom of Saudi Arabia.","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129485550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Power as a Mediator on Networking and Career Success: A Structural Equation Modeling Approach","authors":"Saodah Wok, Junaidah Hashim","doi":"10.5171/2017.424146","DOIUrl":"https://doi.org/10.5171/2017.424146","url":null,"abstract":"Information is power. Developing a network of contacts inside and outside of organization provides immense and valuable information which can be beneficial in many ways. Indeed, internal and external contacts can provide opportunities to advance in one’s career. Networking behaviors build and maintain informal contacts to enhance career success (Forret & Dougherty, 2004; Luthans, Rosenkrantz & Hennessey, 1985; Michael & Yukl, 1993). Networking is positively related to both objective and subjective measures of Abstract","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Review on the Strategic Utilization of Information Systems and IT Infrastructure Flexibility","authors":"N. Anwar, M. N. Masrek, M. K. J. A. Sani","doi":"10.5171/2017.518818","DOIUrl":"https://doi.org/10.5171/2017.518818","url":null,"abstract":"IT infrastructure is a crucial element in any organization across industry. It does not matter which industry are you in, i.e. manufacturing, education, cosmetic, automobile, health and much more required sufficient IT backbone to support these industries day-to-day operation. To remain relevant in their respective market, they need to be competitive with their competitors. It is recommended that the organization fully utilizes their information systems to forecast and measure their product or services offered. In a way, information systems are able to lead the managers or decision makers to maximize their ability, capability, wisely and strategically use information systems in assisting them to direct, evaluate, guide and suggest for better decision making. Therefore, this study attempts to identify the determinants of strategic utilization of information systems. Literally, most researchers identified determinants of any subject matters through literature review processes. The mechanism in capturing determinants over literature review processes varies to one another among researchers. Mainly in this study, the researchers decided to use systematic review as it is one of the best ways for the researchers to dig and evaluate which of the dimensions best suit both dependent variables (DV) and independent variables (IV). In the process of systematic review, five (5) components were involved, such as problem formulation; literature search; data evaluation; data analysis; and interpretation of results. Respective variable findings were drawn using schematic and it led the researchers to decide which dimension is best to represent respective variable.","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eu-Gene Siew, P. H. Yeow, T. C. Ling, Nicholas Grigoriou
{"title":"Factors affecting IT audit quality: an exploratory study","authors":"Eu-Gene Siew, P. H. Yeow, T. C. Ling, Nicholas Grigoriou","doi":"10.5171/2017.802423","DOIUrl":"https://doi.org/10.5171/2017.802423","url":null,"abstract":"An information technology audit is defined by Pathak (2005) as “the process of collecting and evaluating evidence to determine whether an information system safeguards assets, maintains data integrity, consumes resources efficiently, and achieves organisational goals effectively.” In Malaysia, according to Mahzan and Veerankutty (2011) 16% of audit firms perform IT audit assurance services. This trend towards IT audit is likely to increase as IT audit continues to be stressed by the accounting profession and the auditing standards. For example, International Standards of Auditing (ISA 315) requires auditors to examine and ascertain the IT procedures, processes, and controls when assessing the client’s controls environment. Abstract","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Commerce Adoption in North American Organizations: An Empirical Study of Organizational Factors","authors":"S. Grandhi, S. Wibowo","doi":"10.5171/2016.682007","DOIUrl":"https://doi.org/10.5171/2016.682007","url":null,"abstract":"In recent years, the shift from 2G/2.5G to 3G or 4G technologies has allowed for higher data transfers. In addition to these advancements, smart phones have opened up new ways to promote products and services. As a result, organizations have invested heavily in mobile shopping channels to disseminate content and promote their goods and services (Liu and Liou, 2011). Mobile commerce (mcommerce) can be viewed as electronic transactions that are conducted through the use of mobile devices such as cellular phones and other mobile devices (Jessup and Valacich, 2007) including tablet PCs. Tiwari and Buse (2007) have defined it as any transaction, involving the transfer of ownership or rights to use goods and services, which is initiated and/or completed by using mobiles’ access to computer-mediated networks with the help of mobile device. Abstract","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134524927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware-based software architecture for interactions in the smart learning environment","authors":"Z. Chaczko, W. Alenazy, C. Chan","doi":"10.5171/2016.979834","DOIUrl":"https://doi.org/10.5171/2016.979834","url":null,"abstract":"Traditional classrooms involve the use of face-to-face interaction and a whiteboard or projector, but the inabilities to micro manage the environment between the teaching staff and the student calls for a need for a smart interactive learning environment. The aim of this work is to develop evidence and experiments for an architecture for a smart learning environment. This paper discusses the design and implementation of integrating haptic technologies into the architecture of a smart learning environment by designing components of service oriented software middleware that defines a common gesture framework. The study utilised a software test-bed to confirm the feasibility of the architectural design based on the proposed framework. The results indicated that the new structural design allows multiple haptic and gesture peripherals to share a common protocol, as well as, facilitate individual devices to work and exist as standalone entities within the ambient setting to enhance collaborative learning.","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Rădulescu, G. Boca, Rita Toader, Cezar Toader, Gheorghe M. T. Rădulescu
{"title":"Social networking model Case: Transylvanian Furniture Cluster","authors":"C. Rădulescu, G. Boca, Rita Toader, Cezar Toader, Gheorghe M. T. Rădulescu","doi":"10.5171/2016.769097","DOIUrl":"https://doi.org/10.5171/2016.769097","url":null,"abstract":"The purpose of this paper was to explore how social networking can contribute to the improvement of cluster’s activity and how it represents one of the key success factors. A study was conducted to analyse the main performance indicators which derives from the social networking model. The aim of this research was to identify the most important indicators in establishing and developing the social networking in Transylvanian Furniture Cluster, a newly established Cluster, located in Transylvania-Romania.","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133324161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology for the Integration of Service Repositories","authors":"C. Batini, M. Comerio","doi":"10.5171/2016.790219","DOIUrl":"https://doi.org/10.5171/2016.790219","url":null,"abstract":"services, considered in the following, are characterized by the following properties: (i) a name; (ii) a set of functional properties; (iii) a set of nonfunctional properties; (iv) a data schema. Definition 4 (functional properties): functional properties FP(s)={fp1,...,fpn} of a service s define what the service does for the customer. Each fpi in FP(s) enables a change of state of the real world, coherently with the goals expressed by the users in requirements collection. Considering e.g., a service for “Hotel Reservation”, an associated functional property is “reserve a room” In the following, functional properties will be defined through natural language descriptions, in such a way that they can be seen as an extension of the service names. Definition 5 (non-functional properties): non-functional properties NFP(s)={nfp1,...,nfpm} of a service s define how the service performs the change of state associated with the functional properties. Non-functional properties have been investigated by several authors, such as (O’Sullivan et al., 2005), (Becha & Amyot 2012), and (Zeng et al., 2004) and they concern technical qualities, business terms and legal aspects of the service. Following our example on the “Hotel Reservation”, examples of NFPs are price and payment options. Let’s note that, since we are considering an abstract service, the NFPs do not assume specific values. Definition 6 (data schema) The data schema describes at a conceptual level, adopting the Entity Relationship model, the portion of real world on which the service operates. An example of data schema for the “Hotel Reservation” service is reported in Figure 2. 7 Communication of the IBIMA _________________________________________________________________________________","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134429171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effects of Governance Mechanisms on the Financial Information Quality","authors":"Ramzi Belhadj, Amina Omrane, Boutheina Regaieg","doi":"10.5171/2016.187526","DOIUrl":"https://doi.org/10.5171/2016.187526","url":null,"abstract":"Accounting and financial information is important for the users of financial statements. It is therefore an essential component of the economy. For this reason, any manipulation or fraud that affects the basic accounting information could affect the economy as a whole. This raises the question of whether the financial information provided by companies is reliable or not. Moreover, the financial scandals that marred some companies in the world, such as the \"Enron\" American oil company, the \"WorldCom\", \"Xerox\" and the Italian \"Parmalat\" dairy group, suggest the caution taken against the production and the use of financial information. Actually, the accounting regulatory agencies, the authorities acting on the financial markets and the different users of financial information questioned both the transparency and credibility of financial information. Therefore, controlling and preparing financial information have become more than essential.","PeriodicalId":187676,"journal":{"name":"Communications of the IBIMA","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116132546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}