{"title":"Management of Service Quality With Involvement of Technological Developments in Organizations","authors":"Pratap Chandra Mandal","doi":"10.4018/ijtd.319975","DOIUrl":"https://doi.org/10.4018/ijtd.319975","url":null,"abstract":"Service companies should generate and deliver superior services and manage service quality. The objective of the study is to analyze the various aspects of management of service quality. The methodology adopted is a conceptual analysis of managing service quality in organizations. Companies should manage customer expectations and product-service bundles. They should appreciate and involve technological developments and information technology in management of service quality. They should implement self-service technologies and chatbots to improve service quality. Academicians may analyze the various aspects of management of service quality and suggest effective models. Practicing managers should manage customer expectations and product-service bundles, appreciate the involvement of technological developments, and implement latest technological developments like self-service technologies and chatbots for managing service quality effectively. All these initiatives will help companies to manage service quality, deliver superior services, and to achieve growth and business excellence.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Networking Sites (SNS): The Factors of User Intention Toward Online Self-Disclosure in the Kingdom of Bahrain","authors":"R. Al-Kaabi, H. Ali, Khurram Salman, Roya Alsaati","doi":"10.4018/ijtd.300747","DOIUrl":"https://doi.org/10.4018/ijtd.300747","url":null,"abstract":"The use of Social Networking Sites (SNS) is increasing daily. These sites provide a virtual platform for the users to disclose their personal information such as their names, pictures, status etc. a phenomenon called Self-Disclosure. However, before the user decides to put their information online, some factors come into play and affect the amount of information that will be shared by the user. Even though there is a lot of Self-Disclosure occurring on SNS, the factors behind remain little understood. This research aimed to investigate the factors that can affect a user’s Self-Disclosure in the Kingdom of Bahrain. Toward this aim, a model was built, and a questionnaire was designed through which the model was tested with 607 users. The results revealed that risks, benefits, and social influence have a significant relationship with Self-Disclosure whereas trust does not have a strong impact on Self-Disclosure. It is confirmed that risk is determined by the perception of privacy and security and that enjoyment and relationship-building opportunities determine perceived benefits.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117125131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-Based Reliable Framework for Land Registration Information System","authors":"L. S. Umrao, S. Patel, Santosh Kumar","doi":"10.4018/ijtd.300743","DOIUrl":"https://doi.org/10.4018/ijtd.300743","url":null,"abstract":"One of the biggest problems in India is the land/property disputes for the land proprietorship issues. The main reason behind it could be the number of intermediaries in the process of land registry, which creates doubtful transactions and non-clarity of title. Maintaining transparency and tamper-proof of land titles are the challenging task, while data are moving through a number of channels. By using blockchain technology, one can solve these issues during land proprietorship transfer. This paper explains complexities in the present land registration procedure and how to resolve these issues by using blockchain technology. Furthermore, the paper provides a reliable framework configuration utilizing blockchain technology for the supports of the land proprietorship transfer in the nation. The proposed framework will remove the intermediaries and minimize the cause of fraud in the process. Using the framework, the land titles are unique and give valid and decisive authority to proprietorship.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quistina Omar, Ching Seng Yap, Khin Than Myint, Poh-Ling Ho, William Keling
{"title":"Factors Influencing Behavioural Intention to Adopt the E-AgriFinance App Among Farmers: Extended UTAUT With Technology Readiness","authors":"Quistina Omar, Ching Seng Yap, Khin Than Myint, Poh-Ling Ho, William Keling","doi":"10.4018/ijtd.304383","DOIUrl":"https://doi.org/10.4018/ijtd.304383","url":null,"abstract":"This study examines the factors influencing behavioral intention of farmers to adopt a mobile agricultural finance application called e-AgriFinance. This study develops the conceptual framework from the Unified Theory of Acceptance and Use of Technology (UTAUT) and technology readiness. Via a questionnaire survey, data were collected from 278 farmers who are producing the three major crops, namely oil palm, rubber, and cocoa in Sarawak, Malaysia. The partial least squares structural equation modeling (PLS-SEM) technique with R plspm package was employed to analyze the data. The research revealed that the motivator dimension of technology readiness affects all the four UTAUT factors: performance expectancy, effort expectancy, social influence, and facilitating conditions but the inhibitor dimension negatively affects only two factors: performance expectancy and social influence. Besides, all the four UTAUT factors are found to be positively related to farmers’ behavioral intention to adopt the e-AgriFinance app, with social influence being the relatively strongest factor.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"View Materialization for Query Processing in IoT Systems","authors":"A. Sebaa","doi":"10.4018/ijtd.300746","DOIUrl":"https://doi.org/10.4018/ijtd.300746","url":null,"abstract":"In a highly dynamic environment like the Internet of Things, data is being continuously generated by IoT devices. These amounts of data make its processing and querying challenging tasks. Materialized views are ideal for query processing optimization by caching the results of queries. However, one of the main issues of the views materialization is their inconsistency with data sources. For this reason, we present a novel approach of query answering and data management in IoT systems. Our approach is based on new materialization and maintenance of views strategies. This last was carried out by factoring maintenance treatments of identical views and those sharing sources using a clustering technique. The results of experiments show that our approach is suitable for query processing under IoT environments.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marketing Information and Marketing Intelligence: Generation of Customer Insights","authors":"Pratap Chandra Mandal","doi":"10.4018/ijtd.300745","DOIUrl":"https://doi.org/10.4018/ijtd.300745","url":null,"abstract":"Companies require understanding the needs, wants, and preferences of customers and generating relevant customer insights to serve them well. Customer insights can be generated only when companies have processes in place to collect marketing information and marketing intelligence. Companies collect marketing information from many and varied sources. They handle big data and extract insights. Companies manage marketing information with the help of marketing information systems. Marketing information systems help companies in assessment of information requirements, in developing the information, and in analyzing the information to generate customer insights. Companies collect competitive marketing intelligence to have a better understanding of competitors. Companies should adhere to ethical practices while collecting and analyzing marketing intelligence. Proper coordination and utilization of marketing information, marketing information systems, and marketing intelligence will help companies generate relevant customer insights, serve customers well, and achieve business excellence.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122594635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded Systems Design Space Exploration Under Security Constraints","authors":"Fateh Boutekkouk","doi":"10.4018/ijtd.300744","DOIUrl":"https://doi.org/10.4018/ijtd.300744","url":null,"abstract":"Design space exploration (DSE) is a key activity in any embedded system design flow. With the remarkable increasing in the connectivity to the internet, embedded systems are becoming the target of different cyber-attacks. As security emerges as a major design concern, DSE should be aware of the security aspect at a higher level of abstraction. On the other hand and to our best knowledge, there is no a comprehensive survey on this topic, hence the need to establish a comprehensive survey for existing security-aware DSE approaches for embedded systems at the system level. To meet this objective, we first selected and summarized twenty-two pertinent works. They were analyzed based on a set of criteria. The outcomes of this survey are a set of recommendations that can help embedded systems designers to better dealing with security at system-level DSE stage. The presented survey ends by proposing some potential promising future trends that can be investigated by researchers to pursue the research in related topics.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122887599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Contextual Factors of User E-Commerce Adoption During Coronavirus","authors":"Manal Y. Alduaij, Mariam A. Alterkait","doi":"10.4018/ijtd.304382","DOIUrl":"https://doi.org/10.4018/ijtd.304382","url":null,"abstract":"Due to the intense impact coronavirus has placed on businesses the study examines the effect of the pandemic on e-commerce adoption. The Purpose study is to explore user’s contextual factors and its effect on user fears, experience, perceived usefulness, perceived ease of use, and intention to use e-commerce during coronavirus. some users faced fears and hesitation to transition to e-commerce platforms from different segments of society. The study used a quantitative approach based on an electronically generated and distributed questionnaire to 402 participants.this research employed the TAM to examine user’s adoption of e-commerce amidst the pandemic. In terms of gender, results show females have greater fear than males when using e-commerce. Males feel greater perceived usefulness (PU), perceived ease of use (PEOU), and have gained a better experience than females when using e-commerce. In terms of age, participants 35 years and above gained a better experience","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology Trends and Cyber Security in Bangladesh: Myths and Reality","authors":"M. M. Hasan, Fowjia Tajnin Muna","doi":"10.4018/ijtd.304381","DOIUrl":"https://doi.org/10.4018/ijtd.304381","url":null,"abstract":"The world has now become truly a borderless territory with the rapid growth of Information and Communication Technology (ICT) in every sector of social and economic life. While the developed countries are very much concerned regarding ICT modernization and cybersecurity yet surprisingly most of the developing countries like Bangladesh are unaware of the maturity of their ICT use and vulnerability of cybercrimes. This study investigates the current trends and maturity of ICT use in various sectors in Bangladesh and their cybersecurity issues based on a literature review. The main contribution of this study is to assist the relative policymaker and tech leaders to understand the current situation regarding technology use and cybersecurity in Bangladesh in order to enact necessary action plans, policies, and regulations to the advancement of ICT and protect against cybercrimes.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124867714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fog and Cloud Computing: A Solution for Business Application Deployment","authors":"Aurore J. Kamssu, G. P. Marquis","doi":"10.4018/ijtd.300748","DOIUrl":"https://doi.org/10.4018/ijtd.300748","url":null,"abstract":"With the introduction of cloud computing, many organizations have reduced the costs and burdens of maintaining an on-site data center, migrating their data and applications to the cloud. The accessibility to companies’ data and applications via the Internet raises concerns about response time, service interruptions and security. To help address these concerns, intermediate data centers, also referred to as fog computing, are developed and implemented, between the end user (EU) and the cloud data center (DC). The purpose of this fog layer is to bring the processing operation closer to the edge of the network and to reduce response time for the EU. To address the concerns of latency and response time, the current paper proposes the implementation of a multilevel layer architecture, often called cloudlets, in these intermediate data centers.","PeriodicalId":208567,"journal":{"name":"Int. J. Technol. Diffusion","volume":"26 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}