International Journal of Managing Information Technology最新文献

筛选
英文 中文
Examining Impacts of Big Data Analytics on Consumer Finance : A Case of China 考察大数据分析对消费金融的影响:以中国为例
International Journal of Managing Information Technology Pub Date : 2017-08-31 DOI: 10.5121/IJMIT.2017.9302
Jiwat Ram, Hong Yang
{"title":"Examining Impacts of Big Data Analytics on Consumer Finance : A Case of China","authors":"Jiwat Ram, Hong Yang","doi":"10.5121/IJMIT.2017.9302","DOIUrl":"https://doi.org/10.5121/IJMIT.2017.9302","url":null,"abstract":"The use of Big Data analytics for business improvements is a vital strategy for survival. In this paper, we report a study that investigates the role of BD analytics on consumer finance, credit card finance in China—a research area that has largely remained unexplored. The largeness and diversity of Chinese consumer market merit an urgent attention and understanding of role of BD analytics is significant both theoretically and managerially. This study achieves that target. Given the exploratory nature of study, we take a qualitative approach. We conduct approximately 30 interviews with baking and finance sector respondents. The data will be recorded, transcribed and translated. We will analyze data using content analysis / thematic analysis technique.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"18 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Autonomic Framework for IT Security Governance IT安全治理的自治框架
International Journal of Managing Information Technology Pub Date : 2017-08-31 DOI: 10.5121/IJMIT.2017.9301
S. Venkatraman
{"title":"Autonomic Framework for IT Security Governance","authors":"S. Venkatraman","doi":"10.5121/IJMIT.2017.9301","DOIUrl":"https://doi.org/10.5121/IJMIT.2017.9301","url":null,"abstract":"With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizational operations and value creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a selflearning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133875324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Students' Perception of Using Social Networking Websites for Educational Purposes : Comparison Between Two Arab Universities 两所阿拉伯大学学生使用社交网站教育目的的看法
International Journal of Managing Information Technology Pub Date : 2017-05-30 DOI: 10.5121/IJMIT.2017.9202
Heba Mohammad, Hatem Tamimi
{"title":"Students' Perception of Using Social Networking Websites for Educational Purposes : Comparison Between Two Arab Universities","authors":"Heba Mohammad, Hatem Tamimi","doi":"10.5121/IJMIT.2017.9202","DOIUrl":"https://doi.org/10.5121/IJMIT.2017.9202","url":null,"abstract":"Higher education institutions are adopting innovative solutions and tools to enhance their educational outcomes and attract more learners. Social network websites (SNSs) are example about such technologies, which attracted the attention of instructors as well as students. This research aims to understand the students’ perceptions regarding using Social networking websites within their learning process. Also, to understand if student gender and nationality has influence on using SNSs. Data had been collected using an electronic questionnaire distributed among undergraduate students of two well-known universities’; Imam Mohammad Ibn Saud Islamic University which is located in Riyadh-Saudi Arabia and the second one is University of Jordan which is located in Amman-Jordan. Statistical analysis had been applied to the collected data. The results shows difference between students answers when it’s been compared on country basis.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Case Study on Auto Socialization in Online Platforms 网络平台上的汽车社会化案例研究
International Journal of Managing Information Technology Pub Date : 2017-02-28 DOI: 10.5121/IJMIT.2017.9101
Lars Aagaard-Kirkeby
{"title":"A Case Study on Auto Socialization in Online Platforms","authors":"Lars Aagaard-Kirkeby","doi":"10.5121/IJMIT.2017.9101","DOIUrl":"https://doi.org/10.5121/IJMIT.2017.9101","url":null,"abstract":"Auto socialization Theory[1][2]is a socialization theory, introduced by Swedish Social Psychology Professor Emeritus Lars Dencik, Roskilde University Center (RUC) on how humans socialize, attempting to be a part of a group by using a taxonomy in three stages. Even though the theory is based on socialization amongst minors, the adult human uses Auto socialization to navigate everyday life in all its aspects of interaction, including communications, collaborations through online platforms. By focusing on the Auto socialization aspect in an online context, it is possible to explain why online platforms e.g. Facebook, World of Warcraft are so successful in maintaining and increasing the numbers of stabile audience and why other platforms, offering learning on a massive scale, (MOOC) facing dropout rates in the high 80 -90’s[3][4][5].","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124879741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital society: a review of e-service and mobile technology in earthquakes relief operations 数字社会:地震救援行动中的电子服务和移动技术综述
International Journal of Managing Information Technology Pub Date : 2016-05-30 DOI: 10.5121/IJMIT.2016.8202
Kazeem Oluwakemi Oseni, K. Dingley, P. Hart, A. Adewole, Oluwakayode Dawodu
{"title":"Digital society: a review of e-service and mobile technology in earthquakes relief operations","authors":"Kazeem Oluwakemi Oseni, K. Dingley, P. Hart, A. Adewole, Oluwakayode Dawodu","doi":"10.5121/IJMIT.2016.8202","DOIUrl":"https://doi.org/10.5121/IJMIT.2016.8202","url":null,"abstract":"Developing countries lacking technology infrastructures experience most disasters such as tsunami, hurricane Katrina, earthquakes. Even though, many lives are saved in developed countries through the use of high-level or sophisticated technology, only the technology that is easy to use, inexpensive, durable and field-tested should be introduced and used during the relief operation. The effect of climate change and rapid population growth are probably exposed people inhabiting areas to substantial environmental risks. The authors highlight and identify current practices, particularities, and challenges in earthquakes relief operations with the aims of reviewing the roles E-Service and Mobile Technology tools in real-life situations and practices could do to help in disaster operations. This study focuses on victims of earthquakes worldwide. The study will review and provide insights into the roles of E-Service and Mobile Technologies in earthquakes relief operations and how the internally displaced person could benefit from these services. The limitations of these services will be discussed and how the technology could be used to further predict natural disaster such as earthquakes is also considered.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA : A N EMPIRICAL EVALUATION STUDY 移动银行在沙特阿拉伯的采用:一项实证评估研究
International Journal of Managing Information Technology Pub Date : 2016-05-30 DOI: 10.5121/IJMIT.2016.8201
A. Alkhaldi
{"title":"ADOPTION OF MOBILE BANKING IN SAUDI ARABIA : A N EMPIRICAL EVALUATION STUDY","authors":"A. Alkhaldi","doi":"10.5121/IJMIT.2016.8201","DOIUrl":"https://doi.org/10.5121/IJMIT.2016.8201","url":null,"abstract":"This study explores the adoption of mobile banking practices in Saudi Arabia. It focuses on the existence of sufficient infrastructure, and the possible challenges that m-banking services may face. Also, discovers the potential opportunities in the country. A sample of banks in Saudi Arabia was surveyed via questionnaire, with a particular focus on the staff in the related IT departments. The findings demonstrate that although m-banking is believed to be important, there is a general lack of awareness, and it is still not widely accepted by the public. M-banking services provided should be easier to use and offer more security to its users. Furthermore, findings reveal that cooperation among the concerned parties is currently not extensive. From this, the researcher recommends that governing regulations and policies should be properly identified and put in place, and proposes that banking decision-makers in Saudi Arabia should reevaluate their bank’s strategic plans.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122176869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
FRAMEWORK ARCHITECTURE FOR IMPROVING HEALTHCARE INFORMATION SYSTEMS USING AGENT TECHNOLOGY 使用代理技术改进医疗保健信息系统的框架体系结构
International Journal of Managing Information Technology Pub Date : 2015-02-28 DOI: 10.5121/IJMIT.2015.7102
H. Al-Sakran
{"title":"FRAMEWORK ARCHITECTURE FOR IMPROVING HEALTHCARE INFORMATION SYSTEMS USING AGENT TECHNOLOGY","authors":"H. Al-Sakran","doi":"10.5121/IJMIT.2015.7102","DOIUrl":"https://doi.org/10.5121/IJMIT.2015.7102","url":null,"abstract":"Due to diversity, heterogeneity and complexity of the existing healthcare structure, providing suitable healthcare services is a complicated process. This work describes the conceptual design of an e-healthcare system, which implements integration strategies and suitable technologies that will handle the interoperability problem among its essential components. The proposed solution combines intelligent agent technology and case based reasoning for highly distributed applications in healthcare environment. Intelligent agents play a critical role in providing correct information for diagnostic, treatment, etc. They work on behalf of human agents taking care of routine tasks, thus increasing speed and reliability of the information exchanges. CBR is used to generate advices to a certain e-healthcare problems by analyzing solutions given to previously solved problems and to build intelligent systems for disease diagnostics and prognosis. Preliminary experimental simulation based on Agent Development Framework (JADE) demonstrated the feasibility of this model.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127745780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR REDUCING ENERGY CONSUMPTION 基于粒子群优化的无线传感器网络聚类降低能耗
International Journal of Managing Information Technology Pub Date : 2014-11-30 DOI: 10.5121/IJMIT.2014.6401
Amin Rostami, Mohammad Hossin Mottar, I. Azad
{"title":"WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR REDUCING ENERGY CONSUMPTION","authors":"Amin Rostami, Mohammad Hossin Mottar, I. Azad","doi":"10.5121/IJMIT.2014.6401","DOIUrl":"https://doi.org/10.5121/IJMIT.2014.6401","url":null,"abstract":"Wireless sensor networks (WSN ) is composed of a large number of small nodes with limited functionality. The most important issue in this type of networks is energy constraints. In this area several researches have been done from which clustering is one of the most effective solutions. The goal of clustering is to divide network into sections each of which has a cluster head (CH). The task of cluster heads collection, data aggregation and transmission to the base station is undertaken. In this paper, we introduce a new approach for clustering sensor networks based on Particle Swarm Optimization (PSO) algorithm using the optimal fitness function, which aims to extend network lifetime. The parameters used in this algorithm are residual energy density, the distance from the base station, intra-cluster distance from the cluster head. Simulation results show that the proposed method is more effective compared to protocols such as (LEACH, CHEF, PSO-MV) in terms of network lifetime and energy consumption.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115109751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
EXTENDED PSO ALGORITHM FOR IMPROVEMENT PROBLEMS K-MEANS CLUSTERING ALGORITHM 改进问题的扩展粒子群算法k-means聚类算法
International Journal of Managing Information Technology Pub Date : 2014-08-31 DOI: 10.5121/IJMIT.2014.6302
M. Lashkari, Amin Rostami, Ferdows Branch
{"title":"EXTENDED PSO ALGORITHM FOR IMPROVEMENT PROBLEMS K-MEANS CLUSTERING ALGORITHM","authors":"M. Lashkari, Amin Rostami, Ferdows Branch","doi":"10.5121/IJMIT.2014.6302","DOIUrl":"https://doi.org/10.5121/IJMIT.2014.6302","url":null,"abstract":"The clustering is a without monitoring process and one of the most common data mining techniques. The purpose of clustering is grouping similar data together in a group, so were most similar to each other in a cluster and the difference with most other instances in the cluster are. In this paper we focus on clustering partition k-means, due to ease of implementation and high-speed performance of large data sets, After 30 year it is still very popular among the developed clustering algorithm and then for improvement problem of placing of k-means algorithm in local optimal, we pose extended PSO algorithm, that its name is ECPSO. Our new algorithm is able to be cause of exit from local optimal and with high percent produce the problem’s optimal answer. The probe of results show that mooted algorithm have better performance regards as other clustering algorithms specially in two index, the carefulness of clustering and the quality of clustering.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
BARRIERS TO GOVERNMENT CLOUD ADOPTION 政府采用云的障碍
International Journal of Managing Information Technology Pub Date : 2014-08-31 DOI: 10.5121/IJMIT.2014.6301
Samuel Tweneboah-Koduah, Anthony K. Tsetse, B. Endicott-Popovsky
{"title":"BARRIERS TO GOVERNMENT CLOUD ADOPTION","authors":"Samuel Tweneboah-Koduah, Anthony K. Tsetse, B. Endicott-Popovsky","doi":"10.5121/IJMIT.2014.6301","DOIUrl":"https://doi.org/10.5121/IJMIT.2014.6301","url":null,"abstract":"Besides the benefits are there possible challenges government agencies are likely to encounter should they decide to adopt cloud computing? What strategies should be deployed to overcome the inhibitors of cloud computing? These are but few questions this paper aims to investigate. Studies have shown that, cloud computing has become a strategic direction for many government agencies and is already being deployed in many critical areas of the government's cyber infrastructure. The benefits and the challenges of cloud adoption have heightened interest of academic research in recent times . We are however uncertain, per literature factors that hinder successful cloud adoption especially in the Ghanaian context. We posit that, understanding the challenges of cloud adoption and overcoming them must accompany the use of the technology in order to prevent unwanted technical consequences, and even greater problems from government information management. This study is based on unstructured interviews from selected government agencies in Ghana. The study is grounded on the theory of technology, organization and environment (TOE) framework. Major inhibiting factors identified include lack of basic infrastructure for cloud take-off, data security, unreliable internet connectivity, and general lack of institutional readiness.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128750921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信