Michael Warah Nsoh, Kathleen M. Hargiss, Caroline Howard
{"title":"Information Systems Security Policy Compliance: An Analysis of Management Employee Interpersonal Relationship and the Impact on Deterrence","authors":"Michael Warah Nsoh, Kathleen M. Hargiss, Caroline Howard","doi":"10.4018/IJSITA.2015040102","DOIUrl":"https://doi.org/10.4018/IJSITA.2015040102","url":null,"abstract":"The article describes research conducted to assess and address some key security issues surrounding the use of information technology from employee behavioral standpoint. The aim of the study was to determine additional security measures to reduce security incidents and maximize effective use of information systems. The research is an extension of several recent empirical studies in information systems security policy behavioral compliance, which have generally found people to be a weak link in information security. A mix of theoretical frameworks resulted in a model based on the Theory of Planned Behavior TPB, which was used to test the impact that management and employee relationship has on deterrence. Results indicate that management has a significant stake in influencing the behavior of their employees, and that the issue of employee disgruntlement nevertheless is not paramount of top management's Information systems security challenges.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"eBusiness: Critical Success Factors","authors":"N. Baporikar","doi":"10.4018/ijsita.2014100102","DOIUrl":"https://doi.org/10.4018/ijsita.2014100102","url":null,"abstract":"Internet has made a spectacular impact on all organization, creating completely new challenges on one hand and on the other offering entirely new conveniences. Through the establishment of digital networks, a considerably faster and less expensive way is created to exchange information with others. Moreover spatiotemporal borders disappear. Hence, entirely new business models are being developed and companies are discovering completely new strategies to gain competitive advantage in this information age. Traditional economies defined by regions and countries have shifted to more globally oriented markets. As the convergence of information, communication and technology (ICT) becomes imperative, global collaboration will drive modern management, making it indispensable to understand the critical success factors (CSFs) of doing it the e-way. Through in depth observation and desk analysis the paper aims to identify and understand the critical success factors vital for the success of eBusiness in these networked economies.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Logic of Growth: Business Model versus Strategy","authors":"A. Najmaei","doi":"10.4018/ijsita.2014100103","DOIUrl":"https://doi.org/10.4018/ijsita.2014100103","url":null,"abstract":"Business literature has paid a remarkable deal of attention to the growth of the firm. Despite the enormity of research about this phenomenon the role of business model in this context has surprisingly received little attention. In some cases, it has also been mistakenly equated with the strategy of the firm. In this research the authors address these two issues in two steps. First the authors clarify the concept of business model and distinguish it from the concept of strategy. Second the authors show what roles these two can play in the growth of the firm separately and jointly. Therefore this research can serve two purposes: 1) to advance understanding of growth as a complicated phenomenon from the perspective of business model and its interactions with strategy and 2) to provoke further empirical and theoretical research on this emergent area of inquiry. The main conclusion drawn from this analysis is that, although business model is not strategy however these two are intertwined and their interactions form the underlying assumptions by which a firm grows.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Market Factors, Training Programs, Strategic Management and Performance: An Empirical Study of the Iranian Insurance Companies","authors":"M. Zamani, C. Valmohammadi, M. Moshiri","doi":"10.4018/ijsita.2014100101","DOIUrl":"https://doi.org/10.4018/ijsita.2014100101","url":null,"abstract":"The main purpose of this study is to carry out an empirical research to investigate the relationship between market factors (competitive intensity and industry attractiveness), training programs development, strategic management and organizational performance of insurance companies in Iran. nda clarify the importance role of market forces as an essential factor influencing training programs development, strategic management and organizational performance in insurance companies in the context of Iran. This research is based on an empirical survey of marketing and sales experts in four private insurance companies, namely Saman, Parsian, Karafarin and Pasargad in capital city of Iran, Tehran. Questionnaire is the main data collection instrument for this research. Exploratory and confirmatory factor analyses as well as structure equation modeling were employed for data analysis. Statistical analyses revealed that competitive intensity, industry attractiveness, training programs development and strategic management have a positive and significant relationship with the organizational performance of the surveyed companies.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131271760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physics Based on Energy Transfer Postulate","authors":"D. Ciulin","doi":"10.4018/ijsita.2014100104","DOIUrl":"https://doi.org/10.4018/ijsita.2014100104","url":null,"abstract":"By considering the space as a function of time, we accept that the space may have a ‘geometry' that fit better to the given situation, the authors accept that the space change in time continuously and also we make a bridge to the fact that any interaction correspond to an exchange of energy. Then, an equivalent mathematical model of physical representation may be based on elliptical and ultra-elliptical functions that are generated by energy based deferential equations. These functions are based on elliptic coordinates where each coordinate is represented by complex angles. More, the complex exponential functions those are used actually with success, in electro-technique, mechanic, electronic and also to represents signals are degenerated elliptical functions. From this point of view, the paper presents an extension of the quantized theorem to elliptic functions and some applications to fields, atomic particle and waves that may constitute a kind of ‘bridges' to the classical theory. As results, another kind of interpretation of some physical phenomena seems lead to the (theoretical) possibility to overpass the speed of the light and also, to have an ‘intuitive understanding' for some physical phenomena. A technology that overpass the speed of the light may leads to the possibility to find out, during a human life-time, of a new planet similar to our earth and extend in this manner, the human knowledge and territory. This will leads to an important enrichment of human possibilities and knowledge. For this goal, a solid-state electric to gravitation actuator is also presented. Associated with a good and convenient technology, all these are of strategic importance. Applications may be found in strategic forecast, interplanetary telecommunications and treks. The presented tools may be used for modeling the fields and matter structures but also to insure their more comprehensive understanding.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"63-65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategic Impact of ICT on Modern Day Banking in Nigeria","authors":"Stella E. Igun","doi":"10.4018/ijsita.2014100105","DOIUrl":"https://doi.org/10.4018/ijsita.2014100105","url":null,"abstract":"This paper examined impact of ICT on modern day banking relating to Ecobank Plc, Abraka Nigeria. The scope of the study covered staff of Ecobank Plc Abraka. The descriptive survey research design was used for the study. The population of the study was 72 respondents. Questionnaire were used to collect data from 72 respondents. Simple percentage and frequency count were used to analyse the data. It was found out that computers, internet scanners photocopiers, printers, e-mails, telecommunication, ATM and www are the ICT facilities available for use in Ecobank Plc Abraka. It was also found out that ICT has impacted the activities of the bank in the areas of speed delivery, on-line financial transaction, mobile banking services, reduction of long queues and congestion in the banking hall, easy communication between staff and customers, etc. The paper recommended that more adequate ICT facilities should be provided in the bank for utilization and staff should be adequately trained on the use of ICT facilities for greater efficiency.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mursi, HossamEl-din H. Ahmed, F. El-Samie, A. A. El-Aziem
{"title":"Image Encryption Based on Development of Hénon Chaotic Maps using Fractional Fourier Transform","authors":"M. Mursi, HossamEl-din H. Ahmed, F. El-Samie, A. A. El-Aziem","doi":"10.4018/IJSITA.2014070105","DOIUrl":"https://doi.org/10.4018/IJSITA.2014070105","url":null,"abstract":"In this paper, the authors propose an image encryption scheme based on the development of a Henon chaotic map using fractional Fourier transform FRFT which is introduced to satisfy the necessity of high secure image. This proposed algorithm combines the main advantages of confusion and diffusion with FRFT, it use Arnold Cat map for confusion and Henon chaotic map or one of the proposed Henon chaotic maps for diffusion. The proposed algorithm is compared with some image encryption algorithms based on Arnold Cat map, Baker chaotic map, Henon chaotic map and RC6. The authors perform a comparison between them in several experimental tests as statistical analyses, processing time and security analysis. The authors find from these comparison tests that the proposed algorithm demonstrates good result even better than RC6 and other chaotic maps in some cases.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Performance and Convergence Rates in Multi-Layer Feed Forward Neural Network Intrusion Detection Systems: A Review of the Literature","authors":"L. Ray, H. Felch","doi":"10.4018/ijsita.2014070102","DOIUrl":"https://doi.org/10.4018/ijsita.2014070102","url":null,"abstract":"Today's anomaly-based network intrusion detection systems IDSs are plagued with detecting new and unknown attacks. The review of the literature builds ideas for researching the problem of detecting these attacks using multi-layered feed forward neural network MLFFNN IDSs. The scope of the paper focused on a review of the literature from primarily 2008 to the present found in peer-review and scholarly journals. A key word search was used to compare and contrast the literature to find strengths, weaknesses and gaps. The significance of the research found that further work is needed to improve the performance and convergence rates of MLFFNN IDSs. This literature review contributes to the area of intrusion detection by looking at the effects of architecture, algorithms, and input data on the performance and convergence rates of MLFFNN IDSs.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124704178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Prediction of Insolvent Customers in Mobile Telecommunication","authors":"W. Moudani, Grace Zaarour, F. Mora-Camino","doi":"10.4018/ijsita.2014070101","DOIUrl":"https://doi.org/10.4018/ijsita.2014070101","url":null,"abstract":"This paper presents a predictive model to handle customer insolvency in advance for large mobile telecommunication companies for the purpose of minimizing their losses. However, another goal is of the highest interest for large mobile telecommunication companies is based on maintaining an overall satisfaction of the customers which may have important consequences on the quality and on the consume return of the operations. In this paper, a new mathematical formulation taking into consideration a set of business rules and the satisfaction of the customers is proposed. However, the customer insolvency is defined to be a classification problem since our main purpose is to categorize the customer in one of the two classes: potentially insolvent or potentially solvent. Therefore, a model with precise business prediction using the knowledge discovery and Data Mining techniques on an enormous heterogeneous and noisy data is proposed. Moreover, a fuzzy approach to evaluate and analyze the customer behavior leading to segment them into groups that provide better understanding of customers is developed. These groups with many other significant variables feed into a classification algorithm based on Rough Set technique to classify the customers. A real case study is considered here, followed by analysis and comparison of the results for the reason to select the best classification model that maximizes the accuracy for insolvent customers and minimizes the error rate in the misclassification of solvent customers.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bidder Strategy System for Online Auctions Trust Measurement","authors":"E. El-Kenawy, A. El-Desoky, A. Sarhan","doi":"10.4018/ijsita.2014070103","DOIUrl":"https://doi.org/10.4018/ijsita.2014070103","url":null,"abstract":"In this paper, the authors investigate trust of the online auctions one of most e-commerce fields used today, with online auctions; users could buy/sell items all over the world. Compared to traditional auctions, online auctions bring greater convenience while dramatically decreasing the transaction cost., Participants' trust more important one, this paper propose new algorithm that depends on bidder Strategy SystemBSS.","PeriodicalId":201145,"journal":{"name":"Int. J. Strateg. Inf. Technol. Appl.","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126259852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}