Int. J. Technol. Diffusion最新文献

筛选
英文 中文
Management of Service Quality With Involvement of Technological Developments in Organizations 组织技术发展下的服务质量管理
Int. J. Technol. Diffusion Pub Date : 2023-03-17 DOI: 10.4018/ijtd.319975
Pratap Chandra Mandal
{"title":"Management of Service Quality With Involvement of Technological Developments in Organizations","authors":"Pratap Chandra Mandal","doi":"10.4018/ijtd.319975","DOIUrl":"https://doi.org/10.4018/ijtd.319975","url":null,"abstract":"Service companies should generate and deliver superior services and manage service quality. The objective of the study is to analyze the various aspects of management of service quality. The methodology adopted is a conceptual analysis of managing service quality in organizations. Companies should manage customer expectations and product-service bundles. They should appreciate and involve technological developments and information technology in management of service quality. They should implement self-service technologies and chatbots to improve service quality. Academicians may analyze the various aspects of management of service quality and suggest effective models. Practicing managers should manage customer expectations and product-service bundles, appreciate the involvement of technological developments, and implement latest technological developments like self-service technologies and chatbots for managing service quality effectively. All these initiatives will help companies to manage service quality, deliver superior services, and to achieve growth and business excellence.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Networking Sites (SNS): The Factors of User Intention Toward Online Self-Disclosure in the Kingdom of Bahrain 社交网站(SNS):巴林王国用户在线自我披露意向的影响因素
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.300747
R. Al-Kaabi, H. Ali, Khurram Salman, Roya Alsaati
{"title":"Social Networking Sites (SNS): The Factors of User Intention Toward Online Self-Disclosure in the Kingdom of Bahrain","authors":"R. Al-Kaabi, H. Ali, Khurram Salman, Roya Alsaati","doi":"10.4018/ijtd.300747","DOIUrl":"https://doi.org/10.4018/ijtd.300747","url":null,"abstract":"The use of Social Networking Sites (SNS) is increasing daily. These sites provide a virtual platform for the users to disclose their personal information such as their names, pictures, status etc. a phenomenon called Self-Disclosure. However, before the user decides to put their information online, some factors come into play and affect the amount of information that will be shared by the user. Even though there is a lot of Self-Disclosure occurring on SNS, the factors behind remain little understood. This research aimed to investigate the factors that can affect a user’s Self-Disclosure in the Kingdom of Bahrain. Toward this aim, a model was built, and a questionnaire was designed through which the model was tested with 607 users. The results revealed that risks, benefits, and social influence have a significant relationship with Self-Disclosure whereas trust does not have a strong impact on Self-Disclosure. It is confirmed that risk is determined by the perception of privacy and security and that enjoyment and relationship-building opportunities determine perceived benefits.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117125131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Reliable Framework for Land Registration Information System 基于区块链的土地注册信息系统可靠框架
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.300743
L. S. Umrao, S. Patel, Santosh Kumar
{"title":"Blockchain-Based Reliable Framework for Land Registration Information System","authors":"L. S. Umrao, S. Patel, Santosh Kumar","doi":"10.4018/ijtd.300743","DOIUrl":"https://doi.org/10.4018/ijtd.300743","url":null,"abstract":"One of the biggest problems in India is the land/property disputes for the land proprietorship issues. The main reason behind it could be the number of intermediaries in the process of land registry, which creates doubtful transactions and non-clarity of title. Maintaining transparency and tamper-proof of land titles are the challenging task, while data are moving through a number of channels. By using blockchain technology, one can solve these issues during land proprietorship transfer. This paper explains complexities in the present land registration procedure and how to resolve these issues by using blockchain technology. Furthermore, the paper provides a reliable framework configuration utilizing blockchain technology for the supports of the land proprietorship transfer in the nation. The proposed framework will remove the intermediaries and minimize the cause of fraud in the process. Using the framework, the land titles are unique and give valid and decisive authority to proprietorship.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Factors Influencing Behavioural Intention to Adopt the E-AgriFinance App Among Farmers: Extended UTAUT With Technology Readiness 影响农民采用电子农业金融应用程序行为意愿的因素:具有技术成熟度的扩展UTAUT
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.304383
Quistina Omar, Ching Seng Yap, Khin Than Myint, Poh-Ling Ho, William Keling
{"title":"Factors Influencing Behavioural Intention to Adopt the E-AgriFinance App Among Farmers: Extended UTAUT With Technology Readiness","authors":"Quistina Omar, Ching Seng Yap, Khin Than Myint, Poh-Ling Ho, William Keling","doi":"10.4018/ijtd.304383","DOIUrl":"https://doi.org/10.4018/ijtd.304383","url":null,"abstract":"This study examines the factors influencing behavioral intention of farmers to adopt a mobile agricultural finance application called e-AgriFinance. This study develops the conceptual framework from the Unified Theory of Acceptance and Use of Technology (UTAUT) and technology readiness. Via a questionnaire survey, data were collected from 278 farmers who are producing the three major crops, namely oil palm, rubber, and cocoa in Sarawak, Malaysia. The partial least squares structural equation modeling (PLS-SEM) technique with R plspm package was employed to analyze the data. The research revealed that the motivator dimension of technology readiness affects all the four UTAUT factors: performance expectancy, effort expectancy, social influence, and facilitating conditions but the inhibitor dimension negatively affects only two factors: performance expectancy and social influence. Besides, all the four UTAUT factors are found to be positively related to farmers’ behavioral intention to adopt the e-AgriFinance app, with social influence being the relatively strongest factor.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
View Materialization for Query Processing in IoT Systems 查看物化在物联网系统中的查询处理
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.300746
A. Sebaa
{"title":"View Materialization for Query Processing in IoT Systems","authors":"A. Sebaa","doi":"10.4018/ijtd.300746","DOIUrl":"https://doi.org/10.4018/ijtd.300746","url":null,"abstract":"In a highly dynamic environment like the Internet of Things, data is being continuously generated by IoT devices. These amounts of data make its processing and querying challenging tasks. Materialized views are ideal for query processing optimization by caching the results of queries. However, one of the main issues of the views materialization is their inconsistency with data sources. For this reason, we present a novel approach of query answering and data management in IoT systems. Our approach is based on new materialization and maintenance of views strategies. This last was carried out by factoring maintenance treatments of identical views and those sharing sources using a clustering technique. The results of experiments show that our approach is suitable for query processing under IoT environments.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Marketing Information and Marketing Intelligence: Generation of Customer Insights 营销信息和营销情报:客户洞察的产生
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.300745
Pratap Chandra Mandal
{"title":"Marketing Information and Marketing Intelligence: Generation of Customer Insights","authors":"Pratap Chandra Mandal","doi":"10.4018/ijtd.300745","DOIUrl":"https://doi.org/10.4018/ijtd.300745","url":null,"abstract":"Companies require understanding the needs, wants, and preferences of customers and generating relevant customer insights to serve them well. Customer insights can be generated only when companies have processes in place to collect marketing information and marketing intelligence. Companies collect marketing information from many and varied sources. They handle big data and extract insights. Companies manage marketing information with the help of marketing information systems. Marketing information systems help companies in assessment of information requirements, in developing the information, and in analyzing the information to generate customer insights. Companies collect competitive marketing intelligence to have a better understanding of competitors. Companies should adhere to ethical practices while collecting and analyzing marketing intelligence. Proper coordination and utilization of marketing information, marketing information systems, and marketing intelligence will help companies generate relevant customer insights, serve customers well, and achieve business excellence.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedded Systems Design Space Exploration Under Security Constraints 安全约束下的嵌入式系统设计空间探索
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.300744
Fateh Boutekkouk
{"title":"Embedded Systems Design Space Exploration Under Security Constraints","authors":"Fateh Boutekkouk","doi":"10.4018/ijtd.300744","DOIUrl":"https://doi.org/10.4018/ijtd.300744","url":null,"abstract":"Design space exploration (DSE) is a key activity in any embedded system design flow. With the remarkable increasing in the connectivity to the internet, embedded systems are becoming the target of different cyber-attacks. As security emerges as a major design concern, DSE should be aware of the security aspect at a higher level of abstraction. On the other hand and to our best knowledge, there is no a comprehensive survey on this topic, hence the need to establish a comprehensive survey for existing security-aware DSE approaches for embedded systems at the system level. To meet this objective, we first selected and summarized twenty-two pertinent works. They were analyzed based on a set of criteria. The outcomes of this survey are a set of recommendations that can help embedded systems designers to better dealing with security at system-level DSE stage. The presented survey ends by proposing some potential promising future trends that can be investigated by researchers to pursue the research in related topics.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122887599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Contextual Factors of User E-Commerce Adoption During Coronavirus 探索冠状病毒期间用户采用电子商务的背景因素
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.304382
Manal Y. Alduaij, Mariam A. Alterkait
{"title":"Exploring Contextual Factors of User E-Commerce Adoption During Coronavirus","authors":"Manal Y. Alduaij, Mariam A. Alterkait","doi":"10.4018/ijtd.304382","DOIUrl":"https://doi.org/10.4018/ijtd.304382","url":null,"abstract":"Due to the intense impact coronavirus has placed on businesses the study examines the effect of the pandemic on e-commerce adoption. The Purpose study is to explore user’s contextual factors and its effect on user fears, experience, perceived usefulness, perceived ease of use, and intention to use e-commerce during coronavirus. some users faced fears and hesitation to transition to e-commerce platforms from different segments of society. The study used a quantitative approach based on an electronically generated and distributed questionnaire to 402 participants.this research employed the TAM to examine user’s adoption of e-commerce amidst the pandemic. In terms of gender, results show females have greater fear than males when using e-commerce. Males feel greater perceived usefulness (PU), perceived ease of use (PEOU), and have gained a better experience than females when using e-commerce. In terms of age, participants 35 years and above gained a better experience","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology Trends and Cyber Security in Bangladesh: Myths and Reality 孟加拉国的技术趋势和网络安全:神话与现实
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.304381
M. M. Hasan, Fowjia Tajnin Muna
{"title":"Technology Trends and Cyber Security in Bangladesh: Myths and Reality","authors":"M. M. Hasan, Fowjia Tajnin Muna","doi":"10.4018/ijtd.304381","DOIUrl":"https://doi.org/10.4018/ijtd.304381","url":null,"abstract":"The world has now become truly a borderless territory with the rapid growth of Information and Communication Technology (ICT) in every sector of social and economic life. While the developed countries are very much concerned regarding ICT modernization and cybersecurity yet surprisingly most of the developing countries like Bangladesh are unaware of the maturity of their ICT use and vulnerability of cybercrimes. This study investigates the current trends and maturity of ICT use in various sectors in Bangladesh and their cybersecurity issues based on a literature review. The main contribution of this study is to assist the relative policymaker and tech leaders to understand the current situation regarding technology use and cybersecurity in Bangladesh in order to enact necessary action plans, policies, and regulations to the advancement of ICT and protect against cybercrimes.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124867714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog and Cloud Computing: A Solution for Business Application Deployment 雾和云计算:业务应用程序部署的解决方案
Int. J. Technol. Diffusion Pub Date : 2022-01-01 DOI: 10.4018/ijtd.300748
Aurore J. Kamssu, G. P. Marquis
{"title":"Fog and Cloud Computing: A Solution for Business Application Deployment","authors":"Aurore J. Kamssu, G. P. Marquis","doi":"10.4018/ijtd.300748","DOIUrl":"https://doi.org/10.4018/ijtd.300748","url":null,"abstract":"With the introduction of cloud computing, many organizations have reduced the costs and burdens of maintaining an on-site data center, migrating their data and applications to the cloud. The accessibility to companies’ data and applications via the Internet raises concerns about response time, service interruptions and security. To help address these concerns, intermediate data centers, also referred to as fog computing, are developed and implemented, between the end user (EU) and the cloud data center (DC). The purpose of this fog layer is to bring the processing operation closer to the edge of the network and to reduce response time for the EU. To address the concerns of latency and response time, the current paper proposes the implementation of a multilevel layer architecture, often called cloudlets, in these intermediate data centers.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"26 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信