Int. J. Strateg. Inf. Technol. Appl.最新文献

筛选
英文 中文
Information Systems Security Policy Compliance: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence 信息系统安全政策合规性:管理层员工人际关系及其威慑影响分析
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2015-04-01 DOI: 10.4018/IJSITA.2015040102
Michael Warah Nsoh, Kathleen M. Hargiss, Caroline Howard
{"title":"Information Systems Security Policy Compliance: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence","authors":"Michael Warah Nsoh, Kathleen M. Hargiss, Caroline Howard","doi":"10.4018/IJSITA.2015040102","DOIUrl":"https://doi.org/10.4018/IJSITA.2015040102","url":null,"abstract":"The article describes research conducted to assess and address some key security issues surrounding the use of information technology from employee behavioral standpoint. The aim of the study was to determine additional security measures to reduce security incidents and maximize effective use of information systems. The research is an extension of several recent empirical studies in information systems security policy behavioral compliance, which have generally found people to be a weak link in information security. A mix of theoretical frameworks resulted in a model based on the Theory of Planned Behavior TPB, which was used to test the impact that management and employee relationship has on deterrence. Results indicate that management has a significant stake in influencing the behavior of their employees, and that the issue of employee disgruntlement nevertheless is not paramount of top management's Information systems security challenges.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
eBusiness: Critical Success Factors 电子商务:成功的关键因素
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-10-01 DOI: 10.4018/ijsita.2014100102
N. Baporikar
{"title":"eBusiness: Critical Success Factors","authors":"N. Baporikar","doi":"10.4018/ijsita.2014100102","DOIUrl":"https://doi.org/10.4018/ijsita.2014100102","url":null,"abstract":"Internet has made a spectacular impact on all organization, creating completely new challenges on one hand and on the other offering entirely new conveniences. Through the establishment of digital networks, a considerably faster and less expensive way is created to exchange information with others. Moreover spatiotemporal borders disappear. Hence, entirely new business models are being developed and companies are discovering completely new strategies to gain competitive advantage in this information age. Traditional economies defined by regions and countries have shifted to more globally oriented markets. As the convergence of information, communication and technology (ICT) becomes imperative, global collaboration will drive modern management, making it indispensable to understand the critical success factors (CSFs) of doing it the e-way. Through in depth observation and desk analysis the paper aims to identify and understand the critical success factors vital for the success of eBusiness in these networked economies.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Logic of Growth: Business Model versus Strategy 增长的逻辑:商业模式与战略
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-10-01 DOI: 10.4018/ijsita.2014100103
A. Najmaei
{"title":"Logic of Growth: Business Model versus Strategy","authors":"A. Najmaei","doi":"10.4018/ijsita.2014100103","DOIUrl":"https://doi.org/10.4018/ijsita.2014100103","url":null,"abstract":"Business literature has paid a remarkable deal of attention to the growth of the firm. Despite the enormity of research about this phenomenon the role of business model in this context has surprisingly received little attention. In some cases, it has also been mistakenly equated with the strategy of the firm. In this research the authors address these two issues in two steps. First the authors clarify the concept of business model and distinguish it from the concept of strategy. Second the authors show what roles these two can play in the growth of the firm separately and jointly. Therefore this research can serve two purposes: 1) to advance understanding of growth as a complicated phenomenon from the perspective of business model and its interactions with strategy and 2) to provoke further empirical and theoretical research on this emergent area of inquiry. The main conclusion drawn from this analysis is that, although business model is not strategy however these two are intertwined and their interactions form the underlying assumptions by which a firm grows.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Market Factors, Training Programs, Strategic Management and Performance: An Empirical Study of the Iranian Insurance Companies 市场因素、培训计划、战略管理与绩效:伊朗保险公司的实证研究
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-10-01 DOI: 10.4018/ijsita.2014100101
M. Zamani, C. Valmohammadi, M. Moshiri
{"title":"Market Factors, Training Programs, Strategic Management and Performance: An Empirical Study of the Iranian Insurance Companies","authors":"M. Zamani, C. Valmohammadi, M. Moshiri","doi":"10.4018/ijsita.2014100101","DOIUrl":"https://doi.org/10.4018/ijsita.2014100101","url":null,"abstract":"The main purpose of this study is to carry out an empirical research to investigate the relationship between market factors (competitive intensity and industry attractiveness), training programs development, strategic management and organizational performance of insurance companies in Iran. nda clarify the importance role of market forces as an essential factor influencing training programs development, strategic management and organizational performance in insurance companies in the context of Iran. This research is based on an empirical survey of marketing and sales experts in four private insurance companies, namely Saman, Parsian, Karafarin and Pasargad in capital city of Iran, Tehran. Questionnaire is the main data collection instrument for this research. Exploratory and confirmatory factor analyses as well as structure equation modeling were employed for data analysis. Statistical analyses revealed that competitive intensity, industry attractiveness, training programs development and strategic management have a positive and significant relationship with the organizational performance of the surveyed companies.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131271760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physics Based on Energy Transfer Postulate 基于能量传递假设的物理学
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-10-01 DOI: 10.4018/ijsita.2014100104
D. Ciulin
{"title":"Physics Based on Energy Transfer Postulate","authors":"D. Ciulin","doi":"10.4018/ijsita.2014100104","DOIUrl":"https://doi.org/10.4018/ijsita.2014100104","url":null,"abstract":"By considering the space as a function of time, we accept that the space may have a ‘geometry' that fit better to the given situation, the authors accept that the space change in time continuously and also we make a bridge to the fact that any interaction correspond to an exchange of energy. Then, an equivalent mathematical model of physical representation may be based on elliptical and ultra-elliptical functions that are generated by energy based deferential equations. These functions are based on elliptic coordinates where each coordinate is represented by complex angles. More, the complex exponential functions those are used actually with success, in electro-technique, mechanic, electronic and also to represents signals are degenerated elliptical functions. From this point of view, the paper presents an extension of the quantized theorem to elliptic functions and some applications to fields, atomic particle and waves that may constitute a kind of ‘bridges' to the classical theory. As results, another kind of interpretation of some physical phenomena seems lead to the (theoretical) possibility to overpass the speed of the light and also, to have an ‘intuitive understanding' for some physical phenomena. A technology that overpass the speed of the light may leads to the possibility to find out, during a human life-time, of a new planet similar to our earth and extend in this manner, the human knowledge and territory. This will leads to an important enrichment of human possibilities and knowledge. For this goal, a solid-state electric to gravitation actuator is also presented. Associated with a good and convenient technology, all these are of strategic importance. Applications may be found in strategic forecast, interplanetary telecommunications and treks. The presented tools may be used for modeling the fields and matter structures but also to insure their more comprehensive understanding.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"63-65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Strategic Impact of ICT on Modern Day Banking in Nigeria 信息通信技术对尼日利亚现代银行业的战略影响
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-10-01 DOI: 10.4018/ijsita.2014100105
Stella E. Igun
{"title":"Strategic Impact of ICT on Modern Day Banking in Nigeria","authors":"Stella E. Igun","doi":"10.4018/ijsita.2014100105","DOIUrl":"https://doi.org/10.4018/ijsita.2014100105","url":null,"abstract":"This paper examined impact of ICT on modern day banking relating to Ecobank Plc, Abraka Nigeria. The scope of the study covered staff of Ecobank Plc Abraka. The descriptive survey research design was used for the study. The population of the study was 72 respondents. Questionnaire were used to collect data from 72 respondents. Simple percentage and frequency count were used to analyse the data. It was found out that computers, internet scanners photocopiers, printers, e-mails, telecommunication, ATM and www are the ICT facilities available for use in Ecobank Plc Abraka. It was also found out that ICT has impacted the activities of the bank in the areas of speed delivery, on-line financial transaction, mobile banking services, reduction of long queues and congestion in the banking hall, easy communication between staff and customers, etc. The paper recommended that more adequate ICT facilities should be provided in the bank for utilization and staff should be adequately trained on the use of ICT facilities for greater efficiency.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Image Encryption Based on Development of Hénon Chaotic Maps using Fractional Fourier Transform 基于hsamnon混沌映射的分数阶傅里叶变换图像加密
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-07-01 DOI: 10.4018/IJSITA.2014070105
M. Mursi, HossamEl-din H. Ahmed, F. El-Samie, A. A. El-Aziem
{"title":"Image Encryption Based on Development of Hénon Chaotic Maps using Fractional Fourier Transform","authors":"M. Mursi, HossamEl-din H. Ahmed, F. El-Samie, A. A. El-Aziem","doi":"10.4018/IJSITA.2014070105","DOIUrl":"https://doi.org/10.4018/IJSITA.2014070105","url":null,"abstract":"In this paper, the authors propose an image encryption scheme based on the development of a Henon chaotic map using fractional Fourier transform FRFT which is introduced to satisfy the necessity of high secure image. This proposed algorithm combines the main advantages of confusion and diffusion with FRFT, it use Arnold Cat map for confusion and Henon chaotic map or one of the proposed Henon chaotic maps for diffusion. The proposed algorithm is compared with some image encryption algorithms based on Arnold Cat map, Baker chaotic map, Henon chaotic map and RC6. The authors perform a comparison between them in several experimental tests as statistical analyses, processing time and security analysis. The authors find from these comparison tests that the proposed algorithm demonstrates good result even better than RC6 and other chaotic maps in some cases.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving Performance and Convergence Rates in Multi-Layer Feed Forward Neural Network Intrusion Detection Systems: A Review of the Literature 改进多层前馈神经网络入侵检测系统的性能和收敛速度:文献综述
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-07-01 DOI: 10.4018/ijsita.2014070102
L. Ray, H. Felch
{"title":"Improving Performance and Convergence Rates in Multi-Layer Feed Forward Neural Network Intrusion Detection Systems: A Review of the Literature","authors":"L. Ray, H. Felch","doi":"10.4018/ijsita.2014070102","DOIUrl":"https://doi.org/10.4018/ijsita.2014070102","url":null,"abstract":"Today's anomaly-based network intrusion detection systems IDSs are plagued with detecting new and unknown attacks. The review of the literature builds ideas for researching the problem of detecting these attacks using multi-layered feed forward neural network MLFFNN IDSs. The scope of the paper focused on a review of the literature from primarily 2008 to the present found in peer-review and scholarly journals. A key word search was used to compare and contrast the literature to find strengths, weaknesses and gaps. The significance of the research found that further work is needed to improve the performance and convergence rates of MLFFNN IDSs. This literature review contributes to the area of intrusion detection by looking at the effects of architecture, algorithms, and input data on the performance and convergence rates of MLFFNN IDSs.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124704178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy Prediction of Insolvent Customers in Mobile Telecommunication 移动通信资不抵债客户的模糊预测
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-07-01 DOI: 10.4018/ijsita.2014070101
W. Moudani, Grace Zaarour, F. Mora-Camino
{"title":"Fuzzy Prediction of Insolvent Customers in Mobile Telecommunication","authors":"W. Moudani, Grace Zaarour, F. Mora-Camino","doi":"10.4018/ijsita.2014070101","DOIUrl":"https://doi.org/10.4018/ijsita.2014070101","url":null,"abstract":"This paper presents a predictive model to handle customer insolvency in advance for large mobile telecommunication companies for the purpose of minimizing their losses. However, another goal is of the highest interest for large mobile telecommunication companies is based on maintaining an overall satisfaction of the customers which may have important consequences on the quality and on the consume return of the operations. In this paper, a new mathematical formulation taking into consideration a set of business rules and the satisfaction of the customers is proposed. However, the customer insolvency is defined to be a classification problem since our main purpose is to categorize the customer in one of the two classes: potentially insolvent or potentially solvent. Therefore, a model with precise business prediction using the knowledge discovery and Data Mining techniques on an enormous heterogeneous and noisy data is proposed. Moreover, a fuzzy approach to evaluate and analyze the customer behavior leading to segment them into groups that provide better understanding of customers is developed. These groups with many other significant variables feed into a classification algorithm based on Rough Set technique to classify the customers. A real case study is considered here, followed by analysis and comparison of the results for the reason to select the best classification model that maximizes the accuracy for insolvent customers and minimizes the error rate in the misclassification of solvent customers.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Bidder Strategy System for Online Auctions Trust Measurement 基于竞价策略的在线拍卖信任度量系统
Int. J. Strateg. Inf. Technol. Appl. Pub Date : 2014-07-01 DOI: 10.4018/ijsita.2014070103
E. El-Kenawy, A. El-Desoky, A. Sarhan
{"title":"A Bidder Strategy System for Online Auctions Trust Measurement","authors":"E. El-Kenawy, A. El-Desoky, A. Sarhan","doi":"10.4018/ijsita.2014070103","DOIUrl":"https://doi.org/10.4018/ijsita.2014070103","url":null,"abstract":"In this paper, the authors investigate trust of the online auctions one of most e-commerce fields used today, with online auctions; users could buy/sell items all over the world. Compared to traditional auctions, online auctions bring greater convenience while dramatically decreasing the transaction cost., Participants' trust more important one, this paper propose new algorithm that depends on bidder Strategy SystemBSS.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126259852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信