{"title":"The Effect of Perceived Interactivity and Social Norm to the Continuance Use of Mobile Wellness Apps","authors":"Ahmad Fadhil Yusof, N. A. Iahad","doi":"10.1109/ICRIIS48246.2019.9073344","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073344","url":null,"abstract":"Usage of Mobile Wellness Applications (MWA) has been proven to be one of the ways to overcome obesity thorough the practice of self-monitoring. However, based on the literature, users have difficulties in prolonging the usage of MWA. Study of MWA continuance use seems to be one of the less explored and least examined topics in Information Systems (IS) domains. Also, most of the existing research regarding MWA are not guided by IS theories. Thus, this study aims to identify the factors that influence continuance use of MWA in the context of Malaysia by adapting the Information Systems Continuance Model (ISCM) as a post adoption IS theory. A pilot study was applied using the purposive sampling technique and data were collected from 30 MWA users who had undergone a wellness program. Partial Least Squares (PLS) method based on Structural Equation Modelling (SEM) was used for analyzing the survey data. The outcome of this study offered a theoretical model for encouraging the continuance use of MWA. This pilot study research reveals that Perceived Interactivity and Social Norm influence the Continuance Intention to use MWA and Satisfaction is found to be the strongest factor.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130853621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Follower Factors That Influence Purchase Intention In Social Commerce","authors":"Humaira Hairudin, Halina Mohamed Dahlan, Md. Hafiz Selamat","doi":"10.1109/ICRIIS48246.2019.9073627","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073627","url":null,"abstract":"Social commerce is an e-commerce platform where online shopper can shop and purchase online through social networking platforms such as Facebook, Instagram, and Twitter. There are many factors that influence online shopper to make a purchase through social commerce and one of the factors is follower. The follower is a social commerce user that can communicate with other follower through like, comment, and share another follower’s post. There are many types of follower in social commerce, such as trusted follower and fake follower. The trusted follower can influence online shoppers’ trust to purchase in social commerce. However, usually online shoppers do not know which follower is the trusted follower. Therefore, the aim of this paper is to identify the trusted follower factors that can influence purchase intention in social commerce. From the literature review, the trusted follower factors are identified, which is self-presentation, selfconfidence, social interaction, self-expressive and social sharing. Then, a questionnaire has been developed and distributed to the 33 experts who have the knowledge and experience regarding purchasing in social commerce. Based on the data received from the questionnaire, TOPSIS method has been applied in order to rank the trusted follower factors. The final rank shows that self-presentation is receiving the highest rank, followed by social sharing, self-confidence, social interaction and self-expressive. From the rank of trusted follower factors, we can recognize which one of the follower factors is the most influence factor that can influence purchase intention in social commerce.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128568249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Student Satisfaction and Perceived Learning Outcomes in Computerized Audit Course","authors":"Riana Novita, R. Widuri","doi":"10.1109/ICRIIS48246.2019.9073674","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073674","url":null,"abstract":"This study aims to analyze the student-perceived learning outcomes and satisfaction in Method and Practice of Computerized Audit Course at BINUS University. The Unified Theory of Acceptance and Use of Technology model (UTAUT) was used as the basis for the research framework. The variables involved in this study are attitude, performance expectancy, effort expectancy, hands-on training, course structure, perceived instructor knowledge, and self-reported knowledge. The research questionnaires were adopted from previous studies. SmartPLS was used to test the measurement and structural models using a convenience sample of 102 students. The results showed that all variables are significant towards student’s perceived learning outcomes and satisfaction except for effort expectancy, hands-on training, and perceived instructor knowledge. The result of this study can become a suggestion to the institutions to evaluate the aspects that influence the student’s satisfaction and learning outcomes.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"146-147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132990722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Media facilitate Compliance Communication in Higher Education Institutions","authors":"Nurlydia Natasha Md Hatta, S. Abdullah, S. Miskon","doi":"10.1109/ICRIIS48246.2019.9073676","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073676","url":null,"abstract":"Managing compliance is never an easy task for the institutions to handle. Over the past decade, regardless of any increasingly expanding range of regulatory regulations that govern the higher ed, the institutional organizations must manage countless compliance obligations without losing focus on the institution’s vision, mission and culture. Any implications of non-compliance warrant major media attention and significant negative consequences. Given that the success rate of institutional’s compliance is highly depending on their reliability communication system. Recent benchmark studies evidenced that higher ed is contemplating the communication system failures between the compliance stakeholders that prevents them from having an effective compliance framework in place. Hence, this paper presents a systematic literature review (SLR) of 26 relevant published studies related to topics in compliance communication dated from 2010 to 2019 to review the problems. By addressing three specific research questions, this SLR shows the following evidence gathered of these studies: (1) an overview of compliance communication challenges in HEIs and aspects which need to be improved, (2) current compliance communication in practice, and (3) the fact on how current social media tools used to facilitate compliance communications. The findings suggest that compliance communication in HEIs still has severe limitations in terms of exercising effective and proactive ongoing oversight on communicating compliance-related issues as an important part of compliance initiatives. However, through correctly identifying and understanding the compliance communication requirements (future work), it is possible to develop an effective social media-based compliance communication model for HEIs.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116119099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zarina Din, Dian Indrayani Jambari, M. Yusof, J. Yahaya
{"title":"Challenges in Managing Information Systems Security for Internet of Things-enabled Smart Cities","authors":"Zarina Din, Dian Indrayani Jambari, M. Yusof, J. Yahaya","doi":"10.1109/ICRIIS48246.2019.9073661","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073661","url":null,"abstract":"Smart Cities (SC) initiative involving Internet of Things (IoT) is forcing drastic changes to IT management approaches. A significant change occurs in the aspect of security management, particularly in the Information Systems (IS) security within the SC ecosystem. The Information Systems’ security management approach evolves as the organisation model changes. As public sector organisations prepare for SC with the adoption of IoT, revision on the existing security management approach remains critical. The preliminary phase of such revision requires an understanding of the specific challenges that pose risks to the IS security. Therefore, this study identifies the potential challenges by conducting a document analysis method on relevant literature. The findings showed that the IS security management for IoTenabled SC is challenged in terms of governance, integrity, interoperability, personalization, and self-organizing. Understanding these challenges initiates the effort towards revising the management approach, specifically for managing the IS security in IoT-enabled SC.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126169508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Usability of Browsing Songs by Mood using Visual Texture","authors":"Adzira Husain, M. F. Shiratuddin, K. Wong","doi":"10.1109/ICRIIS48246.2019.9073406","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073406","url":null,"abstract":"Recently, extensive use of digital music has led to an increase in songs in online music applications and personal music libraries. In large music libraries, songs which are not listened to regularly, most probably will go unnoticed. There are many ways of browsing songs in an online music library. In the field of Music Information Retrieval (MIR), some type of visual forms such as colour, avatar, mood picture and album cover to visualise music, have been introduced. However, there is no research focusing explicitly on textures. To create new method of browsing music, we proposed a framework to visualise music mood using visual texture. In order to determine how well people can interact with the visual texture to browse songs in music library, usability testing was conducted. In this paper, we will present the results of the usability testing.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. R. Ismail, Ilham Fitriah Ahmad Shukri, Azri Azmi, Yazriwati Yahya, Saiful Adli Ismail, Mohd Suffian Sulaiman
{"title":"Development of Agronomist Station System for Water Table Management at Peatland","authors":"M. R. Ismail, Ilham Fitriah Ahmad Shukri, Azri Azmi, Yazriwati Yahya, Saiful Adli Ismail, Mohd Suffian Sulaiman","doi":"10.1109/ICRIIS48246.2019.9073651","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073651","url":null,"abstract":"The palm oil sector has been criticized globally for being the source of diverse negative impacts on the surrounding environment due to the increasing rate of land development in the peatland. Scientific evidence shows that the peatland becomes less tolerant of subsidence once the existing water is over drained for agriculture development. To overcome this problem, planters had established a water gate system in the vegetation area so that the distribution of water is possible to recover an area with a low water table. Commonly, a piezometer is deployed to evaluate the water table at the problematic zone. Unfortunately, this approach has limitations in which the manual reading assessment is prone to human error and requires a lot of time and effort. Therefore, the Agronomist Station (AGROST) is developed to counter these drawbacks. The purpose of this study is to improve water table management in the agriculture sector by developing a near real-time system, AGROST that continuously monitors water level at a remote area for data analysis and visualization. This project utilized probes that will be stationed on-site to automate the sensing process. At the central server, the collection of data is computed for analysis by displaying a rich graphical and visualization presentation style to improve end-user understanding. In conclusion, AGROST provides a clear understanding of the water table at the remote site, encouraging effective controls of the water level and predicts the possible water table pattern and trend in the future.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Jabar, Salfarina Abdullah, Y. Y. Jusoh, S. Mohanarajah, Norhayati Mohd. Ali
{"title":"Adaptive and Dynamic Characteristics in Hybrid Agile Management Model for Software Development Project Success","authors":"M. Jabar, Salfarina Abdullah, Y. Y. Jusoh, S. Mohanarajah, Norhayati Mohd. Ali","doi":"10.1109/ICRIIS48246.2019.9073337","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073337","url":null,"abstract":"The management of traditional software development methodologies and agile software development methodologies over the decades have not worked to its expectation in increasing the success rates of software projects. The Agile Manifesto in 2001 had promised to better manage IT projects with its 4 values and 12 principles but project success still appears to be elusive. The study and application of critical success and failure factors have been done by researchers but these factors are quick remedy solutions and not long-term robust improvements in the management of development methodologies. More research is required into the management of traditional and agile methodologies characteristics instead of success and failure factors. The coexistence of these characteristics as hybrid methods has also provided evidence of an increase in productivity and further research is required to strengthen and close current gaps in the management of hybrid methodologies. An empirical method with a quantitative approach is adopted to collect data with questionnaires from software development focus groups involved in industry projects. The data collected is analyzed using the Statistical Package for the Social Sciences (SPSS) technique and the Partial Least Squares (PLS) tool. The findings provide a set of significant characteristics of adaptive and dynamic features, which are combined with organizational objectives to prove there is a strong relationship between project success with hybrid methods and hybrid combination patterns.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Humairath Km Abu Bakar, R. Razali, Dian Indrayani Jambari
{"title":"Implementation Phases in Modernisation of Legacy Systems","authors":"Humairath Km Abu Bakar, R. Razali, Dian Indrayani Jambari","doi":"10.1109/ICRIIS48246.2019.9073628","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073628","url":null,"abstract":"Legacy systems continue to play an important role in the implementation of information systems in organisations. Many large organisations still rely heavily on these systems in delivering critical services. Legacy systems are important assets of organisations as they contain important business logics and data over several years. Although these systems are critical to the business yet organisations have to face technical difficulties and unnecessary expenses in maintaining the systems. In order to continue providing quality services in line with the global changes, legacy systems need to be refreshed through modernisation. This study therefore reviewed the phases involved in legacy systems modernisation to identify gaps and their insufficiencies. It aims to provide an overall guidance to the organisations in performing legacy systems modernisation.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123835678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Magiswary Dorasamy, Genevieve Clarinda Joanis, Liow Wen Jiun, Manimekalai Jambulingam, Rahimah Samsudin, Ng Jun Cheng
{"title":"Cybersecurity Issues Among Working Youths in an IoT Environment: A Design Thinking Process for Solution","authors":"Magiswary Dorasamy, Genevieve Clarinda Joanis, Liow Wen Jiun, Manimekalai Jambulingam, Rahimah Samsudin, Ng Jun Cheng","doi":"10.1109/ICRIIS48246.2019.9073644","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073644","url":null,"abstract":"Recent alarming IoT-based cybersecurity incidents indicates that organisations are unimaginably exposed to potential impacts beyond simple economic or opportunity loss. As such, managers are giving high priority to cybersecurity vulnerabilities and measures. This paper aims to present perception of working adults on cybersecurity challenges surrounding IoT environment. Qualitative data from 20 working adults using design thinking method are presented in this paper based on its five stages, empathy, define, ideate, prototype and test. Data were collected using flash card interview technique on five key terms associated with cybersecurity challenges, cyber-attacks, IoT, safer society, privacy and password. Finding shows low level of cybersecurity awareness on IoT, which further warranted an innovative solution, a cybersecurity e-brocure cum playbook. We present the solution and concluded with recommendations.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}