{"title":"Success factors of online training","authors":"J. Kuzic, J. Mesaric","doi":"10.2498/iti.2013.0514","DOIUrl":"https://doi.org/10.2498/iti.2013.0514","url":null,"abstract":"Critical success factors of online training is enticing a lot of interest in business, health, education and many other types of organizations [6, 1, 2, 10, 11, 15, 16, 19, 22, 24, 26, 27, 29]. The research reported in this paper is looking at the use of online training in large corporations in Australia. It focuses on Critical Success Factors (CSF) of online training in Australia's Finance and banking industry. This research represents an exploratory study into the online training issues in large organizations in Australia and is accomplished through a survey of top 500 large organizations in Australia in 2011. The findings from this research confirm the findings from the literature about major critical success factors of online training such as : top management support, skilled work force [23]; financial support, cross-functional team, alignment of the software and organisational standards [8]; just in time training [6]; and usability and transferability [27]. Additionally, the findings also confirm the findings from the literature about major benefits of OT such as: cost effectiveness; efficiency, competitive advantage, receiving training any time, any place, ability to provide custom tailored solutions, etc.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the potential use of m-learning in higher education","authors":"R. Picek, Matija Grcic","doi":"10.2498/iti.2013.0583","DOIUrl":"https://doi.org/10.2498/iti.2013.0583","url":null,"abstract":"Rapid development of mobile technology and the increasing availability of wireless mobile devices in everyday life have created new acronym known as mobile learning (m-learning) which has emerged as a potential educational environment to support learning and make significant contributions as extension of e-learning. Taking into account the strengths and weaknesses of using m-learning and key factors for successful adoption of mobile learning that are analyzed through this article, the paper focuses on the evaluation of the potential use of m-learning. For this purpose, a research was conducted on the population of students who, during the whole higher education, where using e-learning as an obligatory element of education at University of Zagreb. Results of our research shows that students, as mobile users, are not yet ready to become a mobile learners.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121071105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context relevant persuasive interaction and design: Consideration of human factors influencing B2C persuasive interaction","authors":"Muna M. Alhammad, S. Gulliver","doi":"10.2498/iti.2013.0493","DOIUrl":"https://doi.org/10.2498/iti.2013.0493","url":null,"abstract":"The revolutions of electronic and mobile commerce have opened up unique opportunities for global marketing and business to consumer (B2C) persuasive interaction; with the aim of influencing user behavior. The success or failure of such persuasive interaction is impacted by cultural, social, and personal dimensions. Accordingly, failure to consider such dimensions risks the user forming a negative attitude towards retailer's websites or mobile applications, which subsequently threatens customer behavior. A better understanding of human factors influencing the way people perceive B2C persuasive interaction is needed. This paper is introduces the concept of a context relevant persuasive interaction and proposes a guideline for designing relevant B2C persuasive interaction.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129469101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of packet fragmentation on Internet-of-Things enabled systems","authors":"James Pope, R. Simon","doi":"10.2498/iti.2013.0588","DOIUrl":"https://doi.org/10.2498/iti.2013.0588","url":null,"abstract":"The Internet of Things (IoT) refers to a collection of technologies designed to interconnect physical devices with the Internet. Due to device resource constraints IoT connectivity requires the redesign of several basic Internet protocols. This paper studies the impact of packet fragmentation at the data link level on the end-to-end performance of some of these redesigned protocols. Our results show that fragmentation can seriously degrade the performance of a typical IoT device to gateway communication modality. On the other hand, our results also show that with proper design of data broadcast mechanisms, gateway-to-device communication can be maintained at high performance levels. These results can be used as a guide for IoT network engineers.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129667778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of geographic information systems and geo-spatial modeling in environmental epidemiology","authors":"J. Vena, S. Wagner, S. Rathbun","doi":"10.2498/iti.2013.0590","DOIUrl":"https://doi.org/10.2498/iti.2013.0590","url":null,"abstract":"The ability of environmental epidemiology to determine the relationships between health and environmental insults has become exceedingly difficult. The multifactorial nature of disease and the diversity of the insults, which include biologic, physical, social and cultural factors, combined with genetic susceptibility, suggest the need to incorporate comprehensive perspectives of multidisciplinary epidemiologic investigation; utilize tools, such as geographic information systems (GIS) and other geospatial methods, which can integrate multi-level, spatial, and temporal factors and can help limit the potential for misclassification of exposure estimates; and to encourage collaborations and creativity in the field of environmental epidemiology. Examples of applications in cancer epidemiology will be presented. Statistical challenges to linking spatial pattern of cancer to radiation exposure will be discussed.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nenad Anchev, M. Gusev, S. Ristov, Blagoj Atanasovski
{"title":"Some optimization techniques of the matrix multiplication algorithm","authors":"Nenad Anchev, M. Gusev, S. Ristov, Blagoj Atanasovski","doi":"10.2498/iti.2013.0572","DOIUrl":"https://doi.org/10.2498/iti.2013.0572","url":null,"abstract":"Dense matrix-matrix multiplication algorithm is widely used in large scientific applications, and often it is an important factor of the overall performance of the application. Therefore, optimizing this algorithm, both for parallel and serial execution would give an overall performance boost. In this paper we overview the most used dense matrix multiplication optimization techniques applicable for multicore processors. These methods can speedup the multicore parallel execution focusing on reducing the number of memory accesses and improving the algorithm according to hardware architecture and organization.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT-initiatives for empowering difficult geographies: A review","authors":"K. Ghanshala, D. Pant","doi":"10.2498/iti.2013.0556","DOIUrl":"https://doi.org/10.2498/iti.2013.0556","url":null,"abstract":"While studying the effectiveness of IT-initiatives in Uttarakhand state, a hill state in the central Himalayan region in India, it was realized that unless technology reaches and benefits the last man, it is way beyond its intended role. The present paper puts forward the concept of Inclusive-IT which can counter the asymmetries cropping up because of the rising differentiation between informatics haves and have-nots. The present work takes into account the conceptual issues related to the information technology initiatives in the state of Uttarakhand.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125908233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Marketing model of humanitarian and religious organizations in terms of developed e-Business","authors":"B. Dukic, D. Ruzic, Stojanka Dukic","doi":"10.2498/iti.2013.0579","DOIUrl":"https://doi.org/10.2498/iti.2013.0579","url":null,"abstract":"The underlying assumption for making a conceptual descriptive model of e-Marketing of humanitarian and religious organizations in information society is transformation of marketing into an information-communication process with a goal of creating information superiority via communication processes within consumer relations management frames. An important assumption of this model is the creation of a value chain for offers made by humanitarian and religious organizations in order to ensure additional benefits for appropriate consumers. Such a model should utilize potentials offered by modern ICT and follow e-Marketing process principles on the one hand, and parameters defined by possible forms of e-Commerce on the other. The final conceptual descriptive model of e-Marketing suitable to such organizations has to be applicative, take into account the basic principles of social marketing, i.e. it has to be adapted to specific nature of their `business', since their primary goal is not profit creation; rather, they aim to satisfy certain social and spiritual needs of their users (transfers).","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134439129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Selection and Training Framework (STF) for managers in (e-)business innovation transformation projects The business Transformation Manager's profile","authors":"A. Trad, D. Kalpić","doi":"10.2498/iti.2013.0551","DOIUrl":"https://doi.org/10.2498/iti.2013.0551","url":null,"abstract":"One of the riskiest factors in transforming a traditional Business Environment (BE) into an innovative and dynamic BE is the role of the business and (e-)business Transformation Manager (BTM). The basic profile of such a manager has not been sufficiently investigated in a holistic and educational manner. The specification of the optimal BTM profile is the main goal of the authors' research. This paper deals with the profile of a preferred BTM that has to cope with complex automation projects. These projects need specific skills for the difficult implementation phase; these skills must encompass the knowledge of real-time business environments, organizational behaviour knowledge and implementation phase know-how. The researchers recommend technocrats as a base profile for such projects that need cross-functional skills.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benchmarking cloud databases for the requirements of the Internet of Things","authors":"Adrian Copie, Teodor-Florin Fortiş, V. Munteanu","doi":"10.2498/iti.2013.0546","DOIUrl":"https://doi.org/10.2498/iti.2013.0546","url":null,"abstract":"The Internet, since its inception, has been continuously evolving, creating both problems and solutions. Recent trends show that an increasing number of uniquely identifiable things (objects, sensors and devices) are making their way to this medium. A unique opportunity for integration within the already existing landscape of cloud services has been created. Further challenges related to the management and governance of these devices have been identified. The work presented in this paper addresses the issue of storing information received from different things in cloud databases in order to facilitate further exploitation in the context of cloud services.","PeriodicalId":262789,"journal":{"name":"Proceedings of the ITI 2013 35th International Conference on Information Technology Interfaces","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132201951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}