|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
June 2016 | Vol. 88 No.1 |
Title: |
A MODEL FOR MEASURING ARTICLES KNOWLEDGEABILITY LEVELS |
Author: |
AHMAD ABEDAL-HAYY AL-DALAIEN, MOAMIN A. MAHMOUD, MOHD SHARIFUDDIN AHMAD |
Abstract: |
Universities have traditionally provide teaching, research and consultancy
supports in the development and advancement of various industries. Such supports
are manifested in the tacit knowledge of academic staff with which they
accomplish teaching, research, and consulting activities. Articles are the major
explicit knowledge resources that improve the tacit knowledge levels of academic
staff in order to enhance the performance of teaching, research, and consulting
activities. The main challenge that faces academic staff is the difficulty of
sharing accurate or valuable articles based on the working contexts due to the
large number of articles published in various sources. Consequently, the main
aim of this paper is to evaluate the knowledgeability level of articles based on
several measurement variables. We identify and analyze the measurement methods
and variables using two main data collection methods which are literature review
and interview with experts in knowledge management field. We formulate the
proposed model in this paper based on several components (i.e. variables,
attributes, and formulas). The results show that the proposed model is useful in
distinguishing the knowledgeability levels of articles. |
Keywords: |
Knowledge Accuracy, Knowledgeability, Knowledge Management, Explicit Knowledge,
Knowledge Measurement |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
CUCKOO SEARCH ALGORITHM FOR CAPACITATED VEHICLE ROUTING PROBLEM |
Author: |
MANSOUR ALSSAGER, ZULAIHA ALI OTHMAN |
Abstract: |
The cuckoo search algorithm is a novel metaheuristic based on the reproduction
behavior of some cuckoo species in combination with the Lévy flight behavior of
some birds and fruit flies. It has been applied to a wide range of optimization
problems with good performance such as a TSP; nonetheless, it has yet to be
applied to the vehicle routing problem, specifically the capacitated vehicle
routing problem. In this study cuckoo search is proposed to solve the
capacitated vehicle routing problem. The proposed algorithm uses a set of twelve
neighborhood structures process based on λ-interchanges scheme and
cross-exchange operators with the aim of gaining significant improvements in
solution quality. The result shows that the performance of the proposed
algorithm is comparable to that of the other algorithms and is able to find
near-optimal solution in reasonable time, which indicates that cuckoo search has
the potential to solve the capacitated vehicle routing problem. |
Keywords: |
Optimization, Cuckoo Search, Capacitated Vehicle Routing Problem, Neighborhood
Structures, Levy Flight. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
FAST HANDOVER FOR MICROCELL DISCOVERY IN WIRELESS NETWORKS |
Author: |
A. M. Miyim, Mahamod Ismail, Rosdiadee Nordin |
Abstract: |
Considered as low-powered cellular base stations, Microcells (Femtocells) are
found to be deployed in homes and public places. They provide good coverage for
very high user data throughputs and operate on licensed spectrum. This paper
propose cell reselection transmit beacon (CRTB) transmitted by microcell on the
cellular frequency to aid quick discovery of microcell. The performance of
microcell discovery is achieved by setting a proximity threshold for the
macrocell high enough to impact on mobile user equipment (UE) in the network.
Simulation results demonstrate the effectiveness of the beacon in triggering
cell reselection while impacting little on the macrocell UE throughput and
facilitate the handover procedure at the microcell base station. |
Keywords: |
Microcell; Beacon; Cell-Edge; Macrocell; Throughput. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
DUAL BAND NOTCHED PLANAR PRINTED ANTENNA WITH SERRATED DEFECTED GROUND STRUCTURE |
Author: |
K V L BHAVANI, HABIBULLA KHAN, D SREENIVASA RAO, B T P MADHAV, V RASAGNA REDDY,
M MONIKA, Y DHANUSH CHAND |
Abstract: |
A low profile printed antenna with defected ground structure (DGS) is presented
in this work. Initially a square patch radiating element is constructed on one
side of the substrate and the other end of the substrate is etched with serrated
shape DGS. Three different iterations are examined in this work by changing the
number of serrated edges on the ground plane. To improve the gain of the
designed antenna models a frequency selective surface is placed beneath the
antenna structure as a reflecting surface. The overall performance
characteristics of the proposed antenna models are simulated using commercial
electromagnetic tool HFSS. Optimized proposed antenna model is fabricated on FR4
substrate and measured results are compared with simulation results for
validation. |
Keywords: |
Dual Band, Notched Antenna (NA), Defected Ground Structure (DGS), Serrated
Shape, FR4, High Frequency Structure Simulator (HFSS). |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
SECURING MANETS USING THE INTEGRATION OF CONCEPTS FROM DIVERSE IMMUNE THEORIES |
Author: |
ANASS KHANNOUS, ANASS RGHIOUI, FATIHA ELOUAAI, MOHAMMED BOUHORMA |
Abstract: |
Mobile ad hoc network (MANET) is a dynamic and promising research domain that
contributes to the development of wireless networks. MANET characteristics such
as dynamic topology, open media access, wireless communication, and resource
limitations introduce several security threats. The MANET security is then
Vulnerable. The use of traditional security techniques cannot be directly
applied for the case of MANET, hence the need to develop more suitable methods
and security algorithms. Artificial immune systems have been widely used in the
field of MANET security. Several immune algorithms were used and implemented as
intrusion detection systems (IDS). This paper gives an overview of major immune
algorithms like Negative Selection Algorithm, Clonal Selection, and the danger
theory. It then describes our approach to implement an IDS based on the
combination of these immune algorithms to better simulate the human defense
mechanism. The proposed algorithm is named “Combined Immune Theories Algorithm”
(CITA), and is implemented with the AODV routing protocol. CITA is designed to
be an auto evolutionary algorithm with some learning capabilities in order to be
able to recognize and exclude unknown intruders based on deviations from normal
behaviors. Simulations are done using Network simulator 2 (NS2) with
increasingly insertion of malicious nodes running Resource consumption attacks.
Simulation results show improved performance of the proposed CITA algorithm
compared to SAODV routing protocol in terms of better detection rates, low false
positive detection rates, higher throughput and packet delivery ratio. |
Keywords: |
MANET Security, Artificial Immune System (AIS), Negative Selection Algorithm (NSA),
Clonal Selection, Danger Theory, Dendritic Cell Algorithm (DCA), Intrusion
Detection System (IDS). |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
LEAST-MEAN DIFFERENCE ROUND ROBIN (LMDRR) CPU SCHEDULING ALGORITHM |
Author: |
D. ROHITH ROSHAN, DR. K. SUBBA RAO |
Abstract: |
This article presents a variant of Round Robin Algorithm called Least
Mean-Difference Round Robin (LMDRR) Algorithm. First, it calculates the mean of
all processes burst times. Then it obtains the difference of each process burst
time with the calculated mean. From those differences, it selects the least
difference and assigns it to the CPU for executing it for a time slice. When the
time slice is expired it suspends the process and checks the remaining burst
time of the process if it is less than time quantum then it immediately executes
the process, if the remaining time is greater than time quantum then it selects
the process with next least difference and execute it for another time slice.
This entire process will be repeated until all the processes in the ready queue
are finished. The experimental results are compared with Round Robin and
Mean-Difference Round Robin algorithms and found that proposed algorithm
succeeded in improving CPU efficiency. |
Keywords: |
Burst Time, Turnaround Time, Waiting Time, CPU Scheduling, Pre-emptive
Scheduling, non Pre-emptive Scheduling, LMDRR. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
OPERATING AN APPLICATION FOR MODELING PERSONA BY USING ONTOLOGIES |
Author: |
GAOU SALMA , EL MABROUK MAROUANE |
Abstract: |
Personas are a model used to describe users, the objectives of the creation and
use of characters are centered on the possible user and communicate what we have
learned with great design team. The problem of persona Being user-centered is
not natural, users are complex and varied, those who may be doing user and
market research are generally not the people who actually design and build the
product and especially make a dinamic application pesona.
Semantic Web or any Web resources are described by metadata, which allows
machines better use of these resources. Considering FOAF specification
foundation (friend of a friend), we use semantic structures (RDFa) to create an
ontology and technologies in which it operates. Using personas, we can develop
an understanding of the goals of our users in specific contexts- an essential
tool for the use of user research to inform and justify our designs. Create a
conceptual model (ontology) for personas and their uses in the context of
human-computer interaction, we present some screenshots of the application
execution catches. In this article, we present the implementation we did, which
was the first in the edition of our OWL ontology, followed by operations in an
annotation application and creates a platform for working character who was
developed in JSP, and the integration of the application developed in the
persona platform, mak a dinamic site for persona. |
Keywords: |
Semantic Web, FOAF, Persona, Vocabulary, Ontology, Application. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
BUILDING FAULT TOLERANCE WITHIN CLOUDS FOR PROVIDING UNINTERRUPTED SOFTWARE AS
SERVICE |
Author: |
S. L. SUSHMITHA, Dr. D. B. K. KAMESH, Dr. J.K. R. SASTRY, V. V. N. SRI RAVALI,
Y. SAI KRISHNA REDDY |
Abstract: |
Use of clouds for availing various IT based services (Software, Platform,
Infrastructure platform) has been in rampage. The way IT computing is done has
been in radical change. However, many challenges are thrown when one needs to
use the clouds for their IT computing. The challenges include security and
privacy of the Information stored on the cloud and to provide continued services
during the occurrence of the faults within the clouds. This paper addresses
architectural framework for implementing fault tolerance at software as service. |
Keywords: |
Cloud Computing, Virtual Machine(VM), Fault-Tolerance, Check Point,
Software-As-A-Service, Redundancy. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
METHODOLOGICAL FRAMEWORK FOR ANALYSIS AND SYNTHESIS OF A SET OF SECURE SOFTWARE
DEVELOPMENT CONTROLS |
Author: |
ALEXANDER VLADIMIROVICH BARABANOV, ALEXEY SERGEEVICH MARKOV, VALENTIN
LEONIDOVICH TSIRLOV |
Abstract: |
This article discusses the issues of standardizing commercial production of
secure software products. It studies administrative and technical controls for
minimizing the number of vulnerabilities during development and operational
support of secure automated systems software. We classified standards and
guidelines on secure software development. We analysed applicability of the
available methodological approaches to secure software development during
evaluation of conformance to the information security requirements, including
during certification of the software products. The article proves feasibility of
harmonizing the developed regulatory requirements and practical measures with
the methods stipulated in ISO 15408 and ISO 12207 international standards. We
introduced the notion of secure software and developed a basic set of
requirements that allows, among other things, evaluating the conformance of the
software development processes to secure software requirements. We prove that
the set of requirements shall rest, first of all, on the accepted security
policies and up-to-date threats. Sample requirements under development are
provided. We developed an original conceptual model for analysis and synthesis
of a set of controls for secure software development that rests on a set of
generated requirements. The article shows that the conceptual model gives the
software developers an opportunity to make a science-based choice of software
development controls. We developed general methods for selecting a set of secure
software development controls. We provide indirect proof of efficiency of the
suggested approach. It should be noted that the suggested approach was used as a
basis for the national standard on development and production of secure
software. |
Keywords: |
Software Security, Secure Software Development Lifecycle, Certification,
Information Security, Vulnerabilities |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
INFORMATION LOSS MINIMIZATION USING AUTOMATA BASED ASSOCIATIVE CLASSIFICATION |
Author: |
MOHAMMAD ABRAR, ALEX TZE HIANG SIM, HEE JEE MEI |
Abstract: |
Associative Classification (AC) is one of the most prominent classification
techniques that attain the attention of many researchers in last decade. AC uses
the strongest association rules from the dataset in classifiers that results in
improved accuracy. The exponential set of rules makes it difficult to make an
efficient classifier, therefore, the rule pruning is used to reduce the number
of rules during classification. This pruning result, in the loss of meaningful
that might contribute to improving the accuracy. In this article, we propose the
ACA based approach that minimizes the loss of information in the Associative
Classification by introducing the concept of merging Automata instead of rule
pruning. The merging achieves double advantages. Firstly, it reduces the set of
rules as a classifier and secondly, by avoiding pruning, the risk of information
loss also reduces. The experimental results over 10 datasets from the UCI
repository show that the resultant classifiers are comparatively more accurate
than the Jrip, LAC, AODE and others mentioned in the results. |
Keywords: |
Associative Classification, Data Mining, Classification, Automata |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
IDS IN CLOUD COMPUTING A NOVEL MULTI-AGENT SPECIFICATION METHOD |
Author: |
R.ROMADI, S.EDDAHMANI, B.BOUNABAT |
Abstract: |
Intrusion detection systems (IDS) are most efficient way of defending against
network-based attacks aimed at computer systems. These systems are used in
almost all large-scale IT infrastructures. As part of the migration to cloud
services, the situation is even more complex because of the characteristics of
cloud, everything is virtual. The number of virtual machines (VM) changes
dynamically according to the resource requirement of the requested processing
and can be of the order of thousands to tens of thousands. Each VM has an IDS
adapted to its services (web server, mail server, ftp server, etc.) and to
increase the performance we can use different types of IDS (signature-based IDS,
anomaly-based IDS) in one machine. Due to their complex nature, IDS in a cloud
environment are extremely difficult to specify and validate. In this paper, we
propose a new formal model for the specification and the validation of such
systems. This approach considers these Systems as a Multi-Agent System
consisting of concurrent reactive agents that cooperate with each other to
achieve the desired functionality. In addition, this approach uses formal
synchronous specification and verification tools in order to specify and to
verify the systems behaviors. |
Keywords: |
Cloud computing, IDS/IPS, Multi-Agents System |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
DETERMINING THE ECG 1 CYCLE WAVE USING DISCRETE DATA |
Author: |
SABAR SETIAWIDAYAT, M. RASJAD INDRA, DJANGGAN SARGOWO, SETYAWAN SAKTI |
Abstract: |
The objective of this article is to present the recording results of the ECG
examination intended to obtain the wave of each cycle. A method to represent
each cycle duration of the wave from the discrete data ECG record has been made.
The duration from R-peak to R-peak is used as a period of each cycle. The
retreat time shift of the half HR is the last wave from the previous cycle. The
discrete data from the MIT-BIH and the results of the measurement itself are
used as the data to obtain the number of the cycle in the ECG record, the R
position of each cycle, the duration of each cycle and the heart rate value. |
Keywords: |
Cycle Duration ,Count Of Cycle, Discrete Data, ECG |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
FACE RECOGNITION AGAINST VARYING LIGHTING CONDITIONS USING ORIENTED PHASE
CONGRUENCY IMAGE FEATURES |
Author: |
HENDRA KUSUMA, WIRAWAN, ADI SOEPRIJANTO |
Abstract: |
Although face recognition has become a topic of active research in recent
decades, an accurate face recognition is still a tough job and still struggle
with its performance especially if it is unconstrained lighting variations. The
external conditions present during the facial image acquisition stage deeply
influence the appearance of a face in the acquired image and hence affect the
performance of the recognition system. This paper presents an efficient method
for robust face recognition against varying lighting condition by using Oriented
Phase Congruency features. The extracted features, derived from the Gabor Phase
Congruency response are concatenated to construct a feature vector to be used
for classification by Subspace LDA. We demonstrate the effectiveness and
superiority of our proposed method by conducting some experiments on Yale B face
databases and our proposed method shows robust face recognition performance in
the presence of severe lighting changes. |
Keywords: |
Face Representation, Varying Lighting Conditions, Oriented Gabor Phase
Congruency Features, Gabor Phase High Energized Point, Subspace LDA. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
ANALYZING SHARING EXPERIENCES IN GOVERNMENT SECTOR BASED ON SHARED SERVICE
PERSPECTIVES |
Author: |
RAVIKA HAFIZI, SURAYA MISKON, AZIZAH ABDUL RAHMAN, ALEX TZE HIANG SIM, NORRIS
SYED ABDULLAH, NORASNITA AHMAD |
Abstract: |
Shared service exists both in private and in public sectors. The promising
benefits of shared service make many governments try to implement it in
different ways. This paper describes the experiences of using shared service in
government sector from i) process; ii) technical; and iii) strategic
perspectives. It is done by describing sharing as well as technology and
organizational performance of those shared service perspectives in the
government sectors. The relevant information was gathered by using conventional
content analysis from three selected online databases. Overall, shared services
in government have demonstrated significant effort toward successful
implementation. Those shared services have aim to reduce cost and increase the
effectiveness of services for many public users and business partners. It is
done whether by focusing on implementation approach, technology, or step by step
of implementation process. The researchers also found that there are some
differences in treating shared service from different perspectives. Future
research shall do identification the differences of success factors from those
shared service perspectives. Future research also might identify the risks and
values for each of those shared service perspectives. |
Keywords: |
Shared Service (SS), Perspectives, Government, Conventional, Content Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
REFERENCE MANAGEMENT SOFTWARE (RMS) IN AN ACADEMIC ENVIRONMENT: A SURVEY AT A
RESEARCH UNIVERSITY IN MALAYSIA |
Author: |
MOHAMMAD OSMANI, ROZAN MZA, BAKHTYAR ALI AHMAD, ARI SABIR ARIF |
Abstract: |
Reference Management Software is used by researchers in academics to manage the
bibliographic citations they encounter in their research. With these tools,
scholars keep track of the scientific literature they read, and to facilitate
the editing of the scientific papers they write. This study presents the results
of a quantitative survey performed at a research university in Malaysia. The
aims of the survey were to observe how much these softwares are used by the
scientific community, to see which softwares are most known and used, and to
find out the reasons and the approaches behind their usage. Manually
questionnaire was distributed to the Master and PhD students at all faculties in
Jun 2014. The data collected were analysed through a constant comparative
analysis, and the following categories were drawn: a basic practical approach to
the instrument, the heavy impact of the time factor, the force of habit in
scholars, economic issues, the importance of training and literacy, and the role
that the library can have in this stage. Describing the present situation, the
study gives final directions to the libraries to better perform effective tasks
about the matter. This study presented here is the first survey of the actual
distribution and usage of Reference Management Software in a research university
in Malaysia. This picture can give an important glance to Reference Management
Software as one of the elements in the academic digital libraries. |
Keywords: |
Reference Management Softwares, Citation Managers, Academic Libraries, Virtual
Collaboration, RMS. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
FACTORS INFLUENCING BEHAVIORAL INTENTION TO USE THE INTERACTIVE WHITE BOARD
AMONG TEACHERS |
Author: |
LOH WAI LING, WAN FATIMAH WAN AHMAD, TERMIT KAUR RANJIT SINGH |
Abstract: |
The education system around the world has gone through diverse transformation
with the introduction, innovation and adoption of the Interactive White Board (IWB).
Using the Unified Theory of Acceptance and Use of Technology model (UTAUT)
model, countless research exploring the factors that determine the behavioral
intentional to use the IWB among teachers have been carried out in western
countries. This primary aim of this research is to review and test UTAUT’s
applicability in Malaysia by exploring the factors that depict influence on the
teachers’ behavioral intention to use the IWB in SMK St. Bernadette’s Convent
Secondary School, Batu Gajah in the state of Perak Darul Ridzuan in Malaysia. A
questionnaire was distributed to 55 teachers to investigate whether the UTAUT
model 4 key constructs , namely Performance Expectancy (PE), Effort Expectancy
(EE), Social Influence (SI) and Facilitating Conditions (FC) influence the
teachers’ behavioral intention (BI) to use IWB. This paper also proposes a new
construct for the modified conceptual model for UTAUT; ‘Motivators’(MOT). To
determine the reliability, validity and applicability of the revised model, the
Partial Least Squares analysis results showed that the independent variables PE
and Motivators are positively associated and interrelated to teachers’
Behavioral Intention to use the IWB, the only dependent variable in this
research. |
Keywords: |
Behavioral Intention To Use The IWB, Teachers, UTAUT, Motivators, Partial Least
Squares |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
EXPLORING THE NEEDS OF OLDER ADULT USERS FOR SPIRITUAL MOBILE APPLICATIONS |
Author: |
Nahdatul Akma Ahmad, Azaliza Zainal, Saliyah Kahar, Mohammad Ashri Abu Hassan,
Roziyani Setik |
Abstract: |
The increasing number of aging populations worldwide versus the vast
developments in mobile technology creates questions on how older adults adapt
and apply mobile technology in their daily life. As older adults are said to be
more spiritually inclined in the ageing process, thus, mobile spiritual
applications can work as medium for serving the older adults spiritual needs. In
this study, a series of workshop was conducted with fifteen volunteered older
adults’ participants to give exposure and experiences of using mobile spiritual
android application. After about a week, an interview session was then conducted
with the participants to investigate the older adults’ design requirements for
developing mobile spiritual application and also to investigate the older
adults’ interests in using mobile spiritual applications. As a result, these
older adults appreciated and agreed on the benefits of the application. However,
several issues arise in the existing mobile spiritual applications such as
improper design for older adults, lack of exposure and fear towards technology
deter their interests. Participation in the workshop is seen as one of effective
way to reduce technology anxiety among the participants hence increased
enthusiasm in learning new mobile applications, particularly for spiritual
applications. Feedbacks that were gathered from interview session with the
interviewees were highlighted in this paper to be the input in developing mobile
spiritual application for older adult users in future. |
Keywords: |
Older People, Elderly, Spirituality, Mobile Phones, Techno-Spiritual,
Qualitative |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
THE STATE OF VIRTUAL COMMUNITY COHESION: THE VERTICAL DIMENSION |
Author: |
NOR IADAH YUSOP, ZAHURIN MAT AJI, ZULKHAIRI MD. DAHALIN, MOHD KHAIRUDIN KASIRAN,
HUDA IBRAHIM |
Abstract: |
This paper presents findings on a study on virtual community cohesion with the
aim to determine the state of cohesion between the administrators and members of
virtual community (i.e. vertical dimension). A vertical virtual community
cohesion instrument from a previous study was adopted. It measures cohesion
based on two constructs namely the Trust in administrators and Political
participation. A survey was conducted involving 235 users of the social media.
Descriptive data analysis was carried out on the respondents’ demography and
perceptions with regards to the state of cohesion of the virtual community they
were involved with. The overall mean scores of both constructs were found to
fall into the low cohesion category, and this indicates that the state of
vertical community cohesion is low. This reflects the non-political purpose of
users of the social media in engaging in virtual community. However, more
studies need to be carried out to confirm this. Nevertheless, both dimensions
were found to be significantly influencing virtual community cohesion. |
Keywords: |
Virtual Community, Community Cohesion, Trust in Public Figures, Political
Participation, Vertical Dimension. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
THE DEVELOPMENT OF INFOSTRUCTURE MATURITY MODEL FOR APPLICATION IN DISASTER
MANAGEMENT |
Author: |
ALIZA ABDUL LATIF, NOOR HABIBAH ARSHAD, NORJANSALIKA JANOM |
Abstract: |
Disaster management aims to reduce the impact of disaster by having a good
management of resources and responsibilities in providing better coordination
and collaboration. Organizations involved in disaster need to be able to measure
its competency and capabilities in ensuring the right response is given during
disaster. Successful disaster management relies heavily on right information to
be used at the right time by the right agencies. Based on the concept of
continuous process improvement and the Capability Maturity Model (CMM), in this
paper, an infostructure maturity model is constructed. This paper highlights the
constructs of infostructure that will be applied to disaster management, and
later to propose a suitable measurement using the concept of maturity model. It
can be used to assess the infostructure components of information, systems and
technologies. The research also aims to serves as a foundation to produce a
complete infostructure maturity model for application in the disaster management
area. |
Keywords: |
Information management, Information Sharing, Capability Maturity Model, Maturity
Assessment. |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
Title: |
ENTERPRISE ARCHITECTURE DEVELOPMENT AND IMPLEMENTATION IN PUBLIC SECTOR: THE
MALAYSIAN PERSPECTIVE |
Author: |
NUR AZALIAH A.BAKAR, NAZRI KAMA, HARIHODIN S |
Abstract: |
Enterprise Architecture (EA) is gaining the attention from the public sector as
a solution to improve the function of e-Government. However, public sector
agencies are having difficulties with its development and implementation due to
inflexibility and complexity of the agencies’ business function and information
technology structures. The objective of this paper is to identify the challenges
faced by the Malaysian public sector agencies that are in development and
implementation phase of EA. In order to get the holistic perspective of EA
development and implementation scenario in each organisation, a Balanced
Scorecard (BSC) approach is applied. A multiple case study research approach is
utilized to achieve this study objective. Data were collected through interviews
with the agencies EA team, general observation during the EA workshops as well
as review of EA related documents. The result shows there are twenty challenges
identified which is consistent with other challenges stated in literature except
for talent management issue. Thus, this provides a new insight on how the public
sector should implement their EA as compared to any other organisation. |
Keywords: |
Enterprise Architecture, public sector, Balanced Scorecard, EA development, EA
implementation |
Source: |
Journal of Theoretical and Applied Information Technology
10th June 2016 -- Vol. 88. No. 1 -- 2016 |
Full
Text |
|
|
|