{"title":"A firm and individual characteristic-based prediction model for E2.0 continuance adoption","authors":"Qiong Jia, F. Xin, Yue Guo, S. Barnes","doi":"10.1109/ICRIIS.2017.8002483","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002483","url":null,"abstract":"Enterprise-level 2.0 applications (E2.0) built on cloud computing Web 2.0 infrastructure offer promising new business models. However, recent studies show that most E2.0 firms experience a low free-to-paid conversion rate. Based on accumulated archival data and literature on predictive models and data mining, in this paper, we develop a logit model to predict the likelihood of E2.0 user continuance. The proposed model includes firm-specific and individual characteristics and estimates coefficients relating predictor variables to E2.0 continuance decisions. The sample includes information on 575 paid customers (i.e. firms) with 65,407 individual users and 2,286 previous customers with 99,807 individual users from 2011-2016. The resulting model can help business managers of E2.0 service providers to identify effectively reliable customers, optimize their sales efforts, and increase the free-to-paid conversion rate.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fiza Abdul Rahim, Z. Ismail, Ganthan Narayana Samy
{"title":"Healthcare employees' perception on information privacy concerns","authors":"Fiza Abdul Rahim, Z. Ismail, Ganthan Narayana Samy","doi":"10.1109/ICRIIS.2017.8002498","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002498","url":null,"abstract":"Healthcare organisations process massive amount of electronic medical records (EMR) utilised by their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees' concerns on privacy in the use of EMR. The purpose of this paper is to identify the factors that influence information privacy concerns (IPC), subsequently to design and evaluate the proposed model. An explanatory study was employed in the research with a Malaysian hospital under the Statutory Body as a case study. The unit of analysis comprised of healthcare employees. The quantitative data were analysed using Structural Equation Modeling (SEM), ascertained only privacy awareness was positively related to IPC and also mediate the relationship between privacy policy and IPC, demonstrating the significance of privacy policy in elevating privacy awareness. Hence, this study contributed by validating IPC in Malaysian healthcare setting, subsequently facilitates the healthcare organisations to understand IPC from employees' perspective in ensuring the compliance with Personal Data Protection Act 2010. In addition, healthcare organisations should deem upon inculcating pertinent awareness initiatives among their employees in upholding IPC in the use of EMR.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding knowledge management behavior from a social exchange perspective","authors":"C. Hsu, Hui-Tzu Min, S. Chou","doi":"10.1109/ICRIIS.2017.8002492","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002492","url":null,"abstract":"This study draws on dedication/constraint mechanisms of social exchange theory to understand how knowledge outcomes are formed in relational virtual communities (RVCs). We propose a model to explain how knowledge outcomes are affected by interpersonal relationship development, which is in turn affected by information technology (IT)-supported environments. We conceptualize interpersonal relationship as relationship rewards and guanxi, and IT-supported environments as presence and community involvement. The proposed model was validated through empirical data. Our results support this model. We provide discussion of these results.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amjad Mahfuth, S. Yussof, Asmidar Abu Baker, N. Ali
{"title":"A systematic literature review: Information security culture","authors":"Amjad Mahfuth, S. Yussof, Asmidar Abu Baker, N. Ali","doi":"10.1109/ICRIIS.2017.8002442","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002442","url":null,"abstract":"Human behavior inside organizations is considered the main threat to organizations. Moreover, in information security the human element consider the most of weakest link in general. Therefore it is crucial to create an information security culture to protect the organization's assets from inside and to influence employees' security behavior. This paper focuses on identifying the definitions and frameworks for establishing and maintaining information security culture inside organizations. It presents work have been done to conduct a systematic literature review of papers published on information security culture from 2003 to 2016. The review identified 68 papers that focus on this area, 18 of which propose an information security culture framework. An analysis of these papers indicate there is a positive relationship between levels of knowledge and how employees behave. The level of knowledge significantly affects information security behavior and should be considered as a critical factor in the effectiveness of information security culture and in any further work that is carried out on information security culture. Therefore, there is a need for more studies to identity the security knowledge that needs to be incorporated into organizations and to find instances of best practice for building an information security culture within organizations.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring developers' understanding on Building Information Modelling (BIM) and its impact on Return on Investment (ROI)","authors":"A. Latiffi, N. H. Tai","doi":"10.1109/ICRIIS.2017.8002494","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002494","url":null,"abstract":"Building Information Modelling (BIM) is the current trend in the construction industry globally, and Malaysia, is not an exception too. BIM has been in Malaysia for the past ten (10) years, and in the future, BIM will be an industry standard, instead of an optional service. Even though BIM is already in the industry for ten (10) years, many developers are still reluctant to implement it because they could not see the benefits of BIM especially in monetary terms. This paper aims to explore the understanding developers of BIM and its impact on Return on Investment (ROI). A literature review is carried out to review the linkage between BIM and ROI. The study engages qualitatively with four (4) respondents who held the title of BIM managers in their respective companies that have experience in BIM. Data was collected through face-to-face semi-structured interview sessions and was analysed using qualitative content analysis techniques. From the findings, the respondents do understand BIM and that BIM is not a tool for visualisation only. It is, in fact, able to help them in project control. The findings show that BIM had impacted on the ROI of both the project and organisation. At present, these findings support the argument that BIM does have an impact on the ROI both positively and negatively. However, the findings prove that BIM is worthy of its pricey initial investment. It is, therefore, suggested that Malaysian developers invest in BIM though the initial investment may seem pricey.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133449857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ahsan, F. Chowdhury, M. Sabilah, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris
{"title":"An efficient fuzzy keyword matching technique for searching through encrypted cloud data","authors":"M. Ahsan, F. Chowdhury, M. Sabilah, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris","doi":"10.1109/ICRIIS.2017.8002456","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002456","url":null,"abstract":"Cloud user intends to encrypt data before outsourcing sensitive data to the cloud which prevents data searching utility. Hence the necessity for searching through encrypted data appears. But in practice, it is very common for the user to misspell keywords while typing the words. Thus, fuzzy keyword search on encrypted data becomes an essential feature in searchable encryption. However, existing schemes suffer either from efficient handling of multi-letter errors or cannot distinguish anagrams. In this paper, we propose a scheme for fuzzy keyword search on encrypted data focusing on fuzzy word matching among dictionary words. Our proposed scheme construct a transformed keyword (monogram set) based on each letter and its position in the word, which enables to find out original word from its typo with maximum similarity matric. As a similarity metric, we have chosen a modified version of Jaccard similarity which ensures maximum similarity for the nearest word possibly the original one. Our experiment also suggests the applicability of our scheme.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134103140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system","authors":"Shammi Ishara Hewamadduma","doi":"10.1109/ICRIIS.2017.8002440","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002440","url":null,"abstract":"With the current technological expansions customers wish to use online banking facilities due to its convenience and worldwide accessibility. The main challenge of going online for a bank is to provide sufficient security for the online customers and their accounts. The dramatic growth of the number of online banking customers has attracted cyber criminals and identity theft is a severe threat to online banking services. Phishing is a famous and easiest method to steal user credential of online customers where the sole intention is to obtain confidential information for the purpose of monetary gain. In such a situation the main purpose of this research paper is to analysis the usage of phishing attacks and the dangers it poses to customers and the bank, then to find out the available methods to detect and prevent unauthorized login attempts, the technologies and security weaknesses of those methods and finally to propose a solution to detect and prevent unauthorized login attempts using behavioral based analysis, IP and device identification technologies.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Moghavvemi, Ainin Sulaiman, A. A. Aziz, Phoong Seuk Wai
{"title":"The impact of Facebook usage on academic performance","authors":"S. Moghavvemi, Ainin Sulaiman, A. A. Aziz, Phoong Seuk Wai","doi":"10.1109/ICRIIS.2017.8002518","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002518","url":null,"abstract":"This research intends to examine how spending time on Facebook affect students' academic performance. It explores behavioural factors affecting students utilising Facebook. Questionnaires were personally distributed to 667 undergraduate and postgraduate students from the University of Malaya to determine their intentions for using Facebook, which will allow us to discern the symptoms related to excessive Facebook usage by students. The AMOS software was used to hypothesise the relationship between the variables. The results show that students use Facebook for entertainment, relaxing/escaping, and passing time, but not for socialising and social information. Spending time on Facebook has a positive effect on their academic performance, which indicated that the time spent on Facebook did not affect their education. It is anticipated that the findings from this study would provide clear insights on how the behavioural factors of a student affect their academic performance. This research would help educationists, parents, and the students themselves development appropriate measures to control and curb excessive usage of Facebook or using Facebook as a learning tool.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resolving data duplication, inaccuracy and inconsistency issues using Master Data Management","authors":"Faizura Haneem, R. Ali, Nazri Kama, Sufyan Basri","doi":"10.1109/ICRIIS.2017.8002453","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002453","url":null,"abstract":"The management of scattered datasets over multiple data sources has led to data quality issues in an organization. Master Data Management (MDM) has been used to resolve this issue by providing “a single reference of truth” to reduce data redundancy in an organization. To the best of our knowledge, there is lack of study reviewing the progress of MDM research. Therefore, this paper intends to fill in the gap by conducting a systematic literature review to summarize the progress of MDM research domain. We also synthesize the data quality issues on multiple data sources management and how MDM tends to resolve them. We strategized our literature methods through relevant keywords searching from nine (9) databases including journals, proceedings, books, book chapters and industry research. The strategy has shown seven hundred and seventy-seven (777) articles were found during the initial searching stage and three hundred and forty-seven (347) relevant articles were filtered out for the analysis. The review shows that currently, MDM research has received a slope of enlightenment hence it still relevant to be explored. MDM is not just about a technology, it is an approach through a combination of processes, data governance, and technical implementation to resolve data quality issues on multiple data sources management such as duplication, inaccuracy and inconsistency of information.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Syadhila Bt Che Lah, Ab Razak Che Hussin, H. M. Dahlan
{"title":"A concept-level approach in analyzing review readership for E-Commerce persuasive recommendation","authors":"Nur Syadhila Bt Che Lah, Ab Razak Che Hussin, H. M. Dahlan","doi":"10.1109/ICRIIS.2017.8002443","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002443","url":null,"abstract":"A rapid development of E-Commerce platforms has allowed retailers to introduce online product recommendations to persuade consumers purchase decisions. Recommendations system in E-Commerce can be implemented through development of opinion review or feedback system. The visibility of opinion review as a persuasive communication tool in recommendation context has been proven as an important role in purchasing process, which then triggers much attention recently among research scholars. To expand the current discussion on persuasive potential of online review system, this paper aims to explore how the quality of text message may affects the persuasiveness of online recommendation. A concept-level approach will be used in analyzing text readability ease towards generating persuasive communication message. A theoretical model is proposed to measure the effect of review length based on number of concept review towards opinion review readership and its persuasive features. In order to validate the model, we applied basic readability measure of Gunning-Fox Index (FOG) to examine readability ease of opinion review to a dataset containing 1054 reviews extracted from Amazon.com product review. The interrelationship between concept-level analysis, review readership and its persuasive review is further discussed in this paper.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}