Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Evaluation of Information Systems (2)
- Innovation (2)
- Knowledge,Proximity,Innovation and Learning (2)
- Mobile Data Services (2)
- Adoption Intention (1)
-
- Android (1)
- Big Data, Predictive Analytics, and Data Visualization in The Construction Engineering (1)
- Big data (1)
- Business Model (1)
- Computer science (1)
- Computing (1)
- Cost index (1)
- Cyber Security (1)
- Cyber security (1)
- Data Center Efficiency (1)
- Delone and Mclean IS Success Model (1)
- Digital research tools (1)
- E-skills (1)
- Economic Development (1)
- Energy costs; data center operation costs (1)
- Exploits (1)
- Hypervisors (1)
- I-Mode (1)
- Information Quality (1)
- Information systems (1)
- Innovation and Economic Growth (1)
- Innovation and Learning (1)
- Knowledge Networks (1)
- Knowledge gatekeepers; informal and formal organisations; Trust (1)
- Linkages (1)
Articles 1 - 12 of 12
Full-Text Articles in Computer Engineering
Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha
Big Data, Predictive Analytics, And Data Visualization In The Construction Engineering, Joseph Shrestha
Joseph Shrestha
Innovation And Learning Through Knowledge Gatekeepers:A Critical Examination Of The Relationship Betweentrust, Openness, And The Use Of Gatekeepers, Deogratias Harorimana Dr
Innovation And Learning Through Knowledge Gatekeepers:A Critical Examination Of The Relationship Betweentrust, Openness, And The Use Of Gatekeepers, Deogratias Harorimana Dr
Dr Deogratias Harorimana
The term ‘gatekeeper’ is widely used to represent a class of those who collect information, knowledge and contextualise this before they can share with the rest of the members of the organisation knowledge networks-both formal and informal organisations. In this study, it was found:
1 that there is a strong relationship between the openness of a given firm, as regards its knowledge sharing culture and level trust, and that firm’s use of knowledge gatekeepers
2 that the stage of a given firm’s growth corresponds to its strategic use of different types of gatekeeping.
In early and decline (renewal) stages, for …
Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald
Engineering Innovative Mobile Data Services: Developing A Model For Value Network Analysis And Design, Mutaz M. Al-Debei, Enas M. Al-Lozi, Guy Fitzgerald
Dr. Mutaz M. Al-Debei
Purpose – This study aims to analytically develop a reference model for engineering (i.e. analysis, design, development, evaluation, delivery, maintenance, modification, and management) powerful value networks capable of creating innovative mobile data services. Design/methodology/approach – The paradigm followed is that of Design-Science Research (DSR) which incorporates two main iterative processes: build and evaluate. For building the model (i.e. the design science artifact in this research), we followed three iterations: (1) Literature Review Analysis; (2) Semi-Structured Interviews analyzed through content analysis; and (3) examination of real-life case studies. But for evaluating the model, we utilized the NTT DoCoMo’s i-mode case. Findings …
A Value-Based Approach For Explaining The Adoption Intention Of Mobile Data Services, Mutaz M. Al-Debei
A Value-Based Approach For Explaining The Adoption Intention Of Mobile Data Services, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
This study aims at explaining the factors affecting the adoption intention of mobile data services from the perspective of consumers as users. In this study we focus on the value users can potentially gain from using these services. We hypothesize that if we can examine users' utilitarian, hedonic, uniqueness, epistemic and economic value, then we can explain and predict their intention to use mobile data services. Our results show that utilitarian value is according to previous studies an important adoption factor. Additionally, economic value is also important and significant. Nevertheless, it seems that in our context, hedonic, uniqueness, and epistemic …
Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr
Cfp: Handbook Of Research On Technological Applications And Innovation For Economic Development, Deogratias Harorimana Mr
Dr Deogratias Harorimana
The innovation in the 21st century goes significantly beyond the high-tech picture driven by small or large industry clusters in a specific region-typically Silicon Valley and M4Corridor. The future of innovation will lie within knowledge management and seamless technological applications. These will be supported by planned funding strategies, possibly with clients as drivers of the innovation. This view seems to be supported by the UK government “Technology and Innovation Futures” (2011); the USA government (2011), study into which leading scholars concede that the future innovation and technological applications for economic growth will include products and processes, improvements in areas such …
The Effective Use Of Research Tools And Resources, Nader Ale Ebrahim
The Effective Use Of Research Tools And Resources, Nader Ale Ebrahim
Nader Ale Ebrahim
This presentation is prepared to help scholars who seek to reduce the search time by extending the knowledge of researchers to more effectively use the “Research Tools" that are available through the Net.
The Quality And Acceptance Of Websites: An Empirical Investigation In The Context Of Higher Education, Mutaz M. Al-Debei
The Quality And Acceptance Of Websites: An Empirical Investigation In The Context Of Higher Education, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The aim of this study is to explain the main factors affecting behavioural intentions of students to regularly use university websites in the future. Universities are investing millions of dollars in developing high quality websites as they believe that this course of action can provide them with significant strategic benefits. Notwithstanding, little is known about what attracts students to regularly use university websites and our understanding in this context is by no means complete. Aiming to advance our knowledge in this domain, this study utilises a novel model that is developed on the basis of three well-established theories in the …
Developing And Implementing A Web Portal Success Model, Dima Jalal, Mutaz M. Al-Debei
Developing And Implementing A Web Portal Success Model, Dima Jalal, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The emergence and subsequent spreading of new technologies, such as Web portals, has changed the way people handle information, communicate, share knowledge, and perform tasks. The use of different information technologies and systems offers the potential for substantially improving performance not only at the organizational level but also at the individual level. However, performance gains are often obstructed by users' unwillingness to accept and use available systems and technologies. This paper aims at examining the role of Web portals in improving the overall performance at the individual level in terms of task productivity and innovation, customer satisfaction, and management control. …
Measuring Web Portals Success: A Respecification And Validation Of The Delone And Mclean Information Systems Success Model, Mutaz M. Al-Debei, Dima Jalal, Enas Al-Lozi
Measuring Web Portals Success: A Respecification And Validation Of The Delone And Mclean Information Systems Success Model, Mutaz M. Al-Debei, Dima Jalal, Enas Al-Lozi
Dr. Mutaz M. Al-Debei
The main aim of this research is to investigate the role of web portals in improving job performance at the individual level from the perspective of employees as users. This is deemed significant as yet little research has assessed the success of web portals in delivering benefits at the individual level in terms of improved performance in developing countries. The DeLone and McLean IS success model was used as a foundational theory and then was refined to match the context of the current research. In fact, the functions and features of portals were identified, clustered and then linked to portals’ …
Energy Costs For Data Center Operations, Heather M. Brotherton
Energy Costs For Data Center Operations, Heather M. Brotherton
Heather M Brotherton
This document answers the questions: What are relative energy costs for data center operations (energy per unit computing) and how do sources of fuel impact data center operation costs geographically across the US?
Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson
Transforming Information Systems And Computer Science Education With Virtualization, Maurice E. Dawson Jr., Jorja Wright, Jonathan Abramson
Maurice Dawson
This paper will propose an innovative method to transform information systems (IS) and computer science education on a global scale. This method will introduce the use of virtualization and cloud computing combined with open source software (OSS) in higher education. This will allow for those studying IS and computer science to work independently on projects anywhere in the world from a baseline image that has been developed with information assurance (IA) controls. Additionally, this will allow professors and course developers to deploy their own customized virtual machines (VMs) to be used with the course. These VMs will host their own …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …