|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
September 2019 | Vol. 97
No.17 |
Title: |
A FRAMEWORK FOR ARABIC SENTIMENT ANALYSIS USING MACHINE LEARNING CLASSIFIERS |
Author: |
AHMAD HAWALAH |
Abstract: |
In recent years, the use of Internet and online comments, expressed in natural
language text, have increased significantly. However, it is difficult for humans
to read all these comments and classify them appropriately. Consequently, an
automatic approach is required to classify the unstructured data. In this paper,
we propose a framework for Arabic language comprising of three steps:
pre-processing, feature extraction and machine learning classification. The main
aim of the proposed framework is to exploit the combination of different Arabic
linguistic features. We evaluate the framework using two benchmark Arabic tweets
datasets (ASTD, ATA), which enable sentiment polarity detection in general
Arabic and Jordanian dialects. Comparative simulation results show that machine
learning classifiers such as Support Vector Machine (SVM), Naive Bayes,
MultiLayer Perceptron (MLP) and Logistic Regression-based produce the best
performance by using a combination of n-gram features from Arabic tweets
datasets. Finally, we evaluate the performance of our proposed framework using
an Ensemble classifier approach, with promising results. |
Keywords: |
Arabic, Sentiment Analysis, NLP |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
GAMIFICATION: STRENGTHENING THE RELATIONSHIP BETWEEN THE GOVERNMENT AND THE
CITIZENS |
Author: |
GUNAWAN WANG, ARFANIE YANU ARIYANTO |
Abstract: |
The level of internet utilization in the field of public services in the form of
complaint reports is still very low. Although the e-Government program has been
carried out by the Jakarta Capital City Provincial Government since 2015 through
Jakarta Smart City, by implementing Citizen Relationship Management (CiRM)
through eight complaint channels, where citizens can participate in city
development. But in the past three years the number of complaints has continued
to decline. On the other hand, the use of social media in the field of
governance is a major trend in e-government practices throughout the world, in
an effort to support public information disclosure, efficiency, effectiveness,
and accountability of governance. The gamification effect is believed to be able
to overcome this problem, many studies have shown that the gamification effect
has a major influence in activating individual motivation. We are using the
Octalysys Gamification Framework to analyze Gamification in implementing CiRM.
We obtained data from observations of the current system, interviews with
related parties, and questionnaires to citizens of Jakarta as users of the
complaint channel. The results of the analysis show the lack of use of game
design elements in the CiRM complaint channel, additional gamification
techniques is needed to increase citizens engagement and participation. The
conclusion of our study is that Gamification is very instrumental in supporting
the implementation of CiRM. So that hopes to strengthening the relationship
between the Government and Citizens can be achieved. |
Keywords: |
Gamification, Social Media, Citizen Relationship Management, Octalysis
Gamification Framework |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
HEURISTIC BASED REGRESSION TEST CASE PRIORITIZATION ALGORITHM WITH ANALYSIS FOR
TEST COST REDUCTION AND OPTIMIZED COST PATH GENERATION |
Author: |
DR. PRITI, KAVITA |
Abstract: |
Regression testing applies the selective test method on software system to
identify the faults in modified software system in the maintenance phase. The
observation criteria, test case priority and sequence of test conductance affect
the testing efforts, cost and efficiency. In this paper, a level prioritized and
weight processed dynamic programming method to optimize the regression test
sequence. In this proposed model, the work is divided in three integrated
stages. In first stage, the graph based dependency and branch analysis is done.
At this stage, the prioritization of modules and module-segments is done under
graph degree and dependency evaluation. In second stage, various aspects of
fault and code change are analyzed collectively to assign the priority code
segments. The module weights are also integrated with priority vector to
generate the collective weights for each stage. In the final stage, the dynamic
programming approach with back aggregative evaluation is conducted to identify
the optimized test sequence. The comparative evaluation is conducted against
fault based and dependency based evaluation methods applied using greedy and
dynamic programming approaches. The analysis results verified that the proposed
model reduced the cost and number of testcases required to perform the
regression testing for software projects. The overall performance of regression
testing is improved by this proposed approach. |
Keywords: |
Regression Testing, Prioritization, Graph based, Dynamic Programming |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
A DETAILED ANALYSIS OF NEW INTRUSION DETECTION DATASET |
Author: |
MOHAMMED HAMID ABDULRAHEEM, NAJLA BADIE IBRAHEEM |
Abstract: |
The increasing use of Internet networks has led to increased threats and new
attacks day after day. In order to detect anomaly or misused detection,
Intrusion Detection System (IDS) has been proposed as an important component of
secure network. Because of their model free properties that enable them to
identify the network pattern and discover whether they are normal or malicious,
Machine-learning technique has been useful in the area of intrusion detection.
Different types of machine learning models were leveraged in anomaly-based IDS.
There is an increasing demand for reliable and real-world attacks dataset among
the research community. In this paper, a detailed analysis of most-recent
dataset CICIDS2017 has been made. During the analysis, many problems and
shortcoming in a dataset were found. Some solutions are proposed to fix these
problems and produce optimized CICIDS2017 dataset. A 36-feature has been
extracted during the analysis, and compared to 23-featured extracted by the
dataset from literatures. The 36-features gave the best result of losses,
accuracy and F1-score metrics for the testing model. |
Keywords: |
CICIDS2017, Network Anomaly Detection, Imbalance Dataset, Quantile Transform,
Machine Learning. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
TEMPERATURE AND POWER INVESTIGATION OF 6LOWPAN AND RPL PROTOCOLS FOR LOW POWER
INTERNET OF THINGS |
Author: |
CHETNA DABAS, GAURAV KUMAR NIGAM |
Abstract: |
Internet of Things (IoT) is a technology which enables the connection,
communication and interaction of a huge number of complex heterogeneous devices
without human intervention. The communication involved in IoT targets from micro
applications to the macro ones while managing vertical through horizontal
scalability. Huge number of smart devices connected in the IoT possesses
connection mechanisms which may be wireless or wired in nature. The wireless
mechanisms in the IoT come with lots of challenges associates with them. There
are crucial IoT protocols in the IoT protocol stack namely Low Power Wireless
Personal Area Networks (6LoWPAN) and Routing Protocol for Low Power and Lossy
Area Networks (RPL) which makes the wireless communications amongst these
numerous IoT smart things having low power and limited memory happen. In such a
constrained IoT scenario, it becomes very important to evaluate the performance
of these protocols in terms of various performance affecting parameters. In the
light of the same, this research paper investigates the power and temperature
analysis along with comparison of 6LoWPAN and RPL protocols in terms of consumed
power. It is observed that the choice of which protocol to use clearly relies on
the application of context. Further, temperature and power of the nodes plays
vital role in the performance of protocols in the IoT systems. The results are
plotted in form of graphs. |
Keywords: |
Internet of Things, 6LoWPAN, RPL, Low power |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
LOCALIZING MULTIPLE SCLEROSIS LESIONS FROM T2W MRI BY UTILIZING IMAGE HISTOGRAM
FEATURES |
Author: |
BAYDAA TAHA AL-HAMADANI |
Abstract: |
Multiple Sclerosis (MS) is one of the most frequent causes of permanent
disability in young adults by damaging the central nervous system through the
demyelinating process. As most of the demyelinating diseases, MS is
asymptomatic. Hence, to diagnose and monitor the progress of MS patients, brain
Magnetic Resonance Imaging (MRI) is used in order to localize MS lesions.
According to McDonald’s criteria, white lesions, appeared in T2W MRIs, in
callosum and periventricular areas are typical. In this context, this paper
proposed a fast localization and segmentation algorithms to localize MS lesions
based on histogram features besides morphological features such as place, area,
and intensity of the lesions appeared in the monitored places. The segmentation
algorithm supplies the radiologist with the area of the detected lesions which
considered to be valuable information in the process of monitoring the progress
of the disease. The evaluation procedures were carried out using two
different clinical databases with 664 brain MR images. The results showed that
the proposed technique achieved competitive sensitivity, specificity,
predictive, and accuracy with 90.4, 95.6, 96.4, and 92.1 respectively. The
average overall execution time with 12.3ms is considered to be fast compared
with other proposals.
|
Keywords: |
Multiple Sclerosis, Histogram Equalization, Morphological Features, Magnetic
Resonance Imaging, Texture Features, Localizing Lesions, Segmenting Lesions. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
ONLINE MOBILE-BASED PERSONAL TOUR APPLICATION USING ARTIFICIAL BEE COLONY
OPTIMIZATION ALGORITHM |
Author: |
SAWSAN ALSHATTNAWI, IYAD ABU DOUSH , ANAS ALSOBEH |
Abstract: |
Tourists that visit multiple locations need to have prior knowledge about
interesting and attractive destinations. Selecting the most suitable tour plan
for any tourist is not an easy task. Building a schedule of proposed
destinations may allow the tourist to navigate between these destinations
efficiently based on his/her time and budget. This paper applies the Artificial
Bee Colony optimization algorithm (ABC) to build a tour plan by selecting the
Points of Interest (POIs). The algorithm is applied to the user mobile phone.
Tourist must specify the start place, the end place, the stay period (number of
days) and the preferred POIs, if any, and some other preferences. The objective
is to maximize the tourist satisfaction by selecting several POIs which satisfy
the provided time and budget. The system is built on top of Android for its
simplicity, popularity, and availability of web services. To evaluate the
efficiency of the proposed technique, we build a dataset of 50 attractions in
Jordan. The algorithm fitness function is tuned based on comparing the resulted
tour plan with a tour plan generated by an expert. The evaluation shows that the
proposed technique gives the maximum number of POI within the provided time and
budget. |
Keywords: |
Mobile Application, Artificial Intelligence, BEE Colony Algorithm, Web Service,
Tour Plan. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
COMPLEX NETWORKS BASED ALGORITHM FOR INFECTIOUS DISEASES SPREAD MODELING |
Author: |
KHATAR ZAKARIA , BOUATTANE OMAR , BENTALEB DOUNIA |
Abstract: |
In this paper we propose a new algorithm to model the spread of infectious
diseases in the population. Through a combination of the
Susceptible-Infected-Recovered (SIR) epidemiology model and Small World social
network. The model helps to understand the dynamics of infectious diseases in a
population, and to identify the main characteristics of epidemic transmission
and its evolution over time. Simulations were conducted to evaluate the proposed
model. The obtained results were analyzed in order to explore how the evolution
of the network influences the spread of the disease also statistical test was
applied to validate our model. This model allows health policy makers to better
understand the epidemic spread and to implement relevant control strategies. |
Keywords: |
SIR model, Complex networks, Infectious diseases, Influenza. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
DEVELOPMENT OF SOFTWARE ARCHITECTURE FOR A 3D VIRTUAL ENVIRONMENT WITH THE
INCORPORATION OF A REACTIVE INTELLIGENT AGENT |
Author: |
TANIA JEZABEL LOPEZ GARCIA, ROSA MARIA RODRIGUEZ-AGUILAR , JESUS ANTONIO
ALVAREZ-CEDILLO , TEODORO ALVAREZ-SANCHEZ |
Abstract: |
The development of applications with Virtual Reality technology is currently on
the rise. However, there is no formal methodology or architecture for the
creation of this type of systems. However, to solve the problem, traditional
information systems methodologies, traditional information systems methodologies
are used that have been adapted to the development of this type of applications,
which has caused a waste of the resources that these technologies offer. That is
why we propose the design of architecture specifically for a 3D Virtual
Environment, using an artificial intelligence technique, in this case, an
Intelligent Reactive Agent. The proposed architecture was developed from a
Videogame architecture. |
Keywords: |
Systems architecture, Intelligent agent, 3D virtual environment. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
MESSAGE FRAMING STRATEGY AND BRAND ATTACHMENT FOR IT PRODUCTS |
Author: |
SEUNGBAE PARK, SANGCHUL WOO, JAEWON HONG |
Abstract: |
The objective of this study is to understand the relationship between type of
advertising and brand attachment in IT products. For this purpose, 4
experimental groups in total were structured by applying 2 (Gain and Loss) × 2
(Reference and Scarcity Pressure) between-subjects factorial design for IT and
non-IT products. The results showed that the gain-loss frame and scarcity
pressures on brand attachment were not statistically significant in IT products.
And, interaction effect of gain-loss frames and scarcity pressure on brand
attachment was found in IT products. However, in non-IT products, only the
effect of gain-loss frame was shown. That is, the more emphasis on gain and the
less pressure on scarcity, the more effective ad type for brand attachment in IT
products. On the basis of the results, theoretical and managerial implications,
and directions for further research discussed. |
Keywords: |
IT Products, Brand Attachment, Gain-Loss Frame, Scarcity Pressure, Advertising |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
THE INFLUENCE OF ENTREPRENEURIAL COMPETENCIES OF PROJECT LEADER ON INNOVATIVE
IDEA GENERATION IN THE ICT FIRMS |
Author: |
MOTAHAREH ZAREFARD, DAE-YUL JEONG |
Abstract: |
To be more adaptive, innovative, and remain competitive in challenging business
environment, entrepreneurship and intrapreneurship are becoming increasingly
important for high-technology firms as well as ICT and software firms to renew
strategic innovation. This study examines the impact of entrepreneurial
competencies of project leaders on the innovative behavior of IT experts and
software developers during the new ICT and software development processes. We
especially focused on the mediating role of team intrapreneurial climate and
self-efficacy of team members between the independent variable and the
performance variable. Structural equation model was constructed from the
theoretical hypotheses, and the model was proved based on responses from the
survey of knowledge workers who have experience in the ICT and software
development projects. The conclusions would give some implications for the ICT
and software companies who intend to form and develop successful intrapreneurial
climate for project teams and to increase self-efficacy for innovative work
behavior of their employees. |
Keywords: |
Entrepreneurial Competencies, Intrapreneurial Behavior, Team Climate,
Self-efficacy, ICT Project Teams. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
A QUANTITATIVE MODEL OF DETERMINANTS OF USE BEBAVIOR FOR THE CRYPTOCURRENCY
SYSTEM IN TERMS OF SECURITY CONCERNS AND RISKS |
Author: |
YOUNG-HO HWANG, YOO-JIN MOON |
Abstract: |
The paper performs quantitative analysis of moderating effects of security
concerns and risks for management of cryptocurrency systems and proposes
solutions for security concerns and risks. The results show some important
implications for the management of cryptocurrency systems. Particularly,
performance expectancy can be headed for management and system design strategies
of cryptocurrency service providers, and the cryptocurrency systems should be
elaborated in the pleasant and beneficial way. This paper also illustrates that
perceived security concerns and perceived risks might negatively affect
cryptocurrency use and trading. Based on the research results, security concerns
and risks prove that they are very important interaction variables as a great
interest for cryptocurrency users. For the safe transmission of cryptocurrency
in the financial industries, the paper suggests that Korean Article 49 of the
Enforcement Decree of Information and Communication Network Act should require
higher standards to the cryptocurrency exchange markets. For the safe
transactions of cryptocurrency, the paper suggests three solutions for security
concerns and risks relevant to the cryptocurrency exchange markets. |
Keywords: |
Cryptocurrency, Use Behavior, Performance Expectancy, Social Influence, Hedonic
Motivation, Security Concerns, Risks |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
MOBILE COMMERCE CONSUMER VALUE DISPARITY BY GENERATION GAP : GIFT-GIVING CASE |
Author: |
HYUN JIN, YEO, SEOK-HUN KIM |
Abstract: |
According the Pew research, a smartphone penetration rate of the world is fifty
percent while major twenty-seven counties’ median is seventy-six percent. The
higher level of income country has higher penetration. With penetration rate of
smartphone growth, mobile coupon market including gift coupon is dramatically
growing either. In that, there have been diverse analysis and studies about
mobile coupon. Meanwhile, as the digital technology has been dramatically
improved, the generation gap conflict issued at marketing and human resource
management in business criteria. In this research, I clarify generation gap of
mobile coupon gift consumers by multi-group structural equation model to define
characteristic of e-commerce consumer on mobile coupon gift. As a result, there
are generation gap on gift-giving intention causing factors among generations:
generation X, Y, and Z. |
Keywords: |
Generation Gap, Gift-Giving, Mobile-Coupon, e-Commerce, Mobile-Commerce |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
FINDING THE OPTIMAL PATH TO THE LOYAL CLUSTER BASED ON RATE OF PROFIT |
Author: |
SANG-CHUL LEE, KWANG-HYUK IM |
Abstract: |
With internet-based business, it is important to maintain existing customers, as
well as to attract new ones. To maintain existing customers and enhance customer
loyalty, companies should find low-loyalty clusters and change low-loyal
customers into loyal customers. Based on the economic analysis of ROP (Rate of
Profit), this research proposes a method for improving customer loyalty by
transferring low-loyalty clusters into an optimal loyalty cluster. By
confirmatory factor analysis, six items were deleted and thirteen items for four
primary factors were remained. The analysis of a two-level SOM resulted in the
development of ten market segments. To find the optimal (target) cluster for
improving customer loyalty, this research calculates ROP based on gain and cost
between the groups. This research determined the target cluster and the path to
move into and proposed the strategies to change customer behavior. The proposed
method may help companies identify the optimal cluster where a loyalty exceeds
cost |
Keywords: |
Market Segmentation, Self-Organizing Map, Customer Loyalty, Economic Analysis,
Rate of Profit. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
ANALYSIS ON TRENDS OF ICT-BASED FASHION TECH BUSINESS MODELS |
Author: |
JAEYOUNG LEE |
Abstract: |
ICT(Information and Communications Technologies) has been influencing on overall
fashion industry which is considered as the representative field of emotional
marketing. In particular, the fashion tech combining the ICT and fashion has
been creating the visual effects and diversified in the entire fashion business
processes beyond the developed of simple fashion device. Accordingly, this paper
analyzed the trend of business models which have been implemented at present
before the full-scale development of fashion tech. In accordance with the
analysis results, this paper identified the expansion of integrated digital
platform based on connectivity, intelligence and computerization in the physical
aspects, activation of untact marketing related to individualization and
unmanned operation in the social aspects, and pursuit of value consumption
reflecting emotional bonding and spiritual bonding in the cultural aspects. The
results will be used as the empirical data for the implementation of businesses
related to fashion tech in the future. The continuing research and development
on the ICT-based fashion tech will be the solution for the future fashion
industry to cope with the rapidly changing preference and consumption patterns
of the public. |
Keywords: |
Fashion Tech, Business Model, Digital Platform, Untact Marketing, Value
Consumption |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
A STUDY ON THE QUALITY CHECK PROCESS MODEL FOR SOFTWARE DEVELOPMENT USING
QUALITY GATE |
Author: |
OK-SU YANG, KOO-RACK PARK, DONG-HYUN KIM, JAE-WOONG KIM |
Abstract: |
Many SW development companies have recently made a number of efforts to improve
their organization's development capabilities and product quality. Although
advanced process models such as CMMI and SPICE were introduced in Korea, they
are too complex and diverse to apply to small domestic projects with limited
efficiency. There have been many existing evaluation models, but the reality is
that there is a lack of research on performance models that can be applied to
projects. This thesis introduces the Software Development Quality Check
Management Execution Model, a simple model that can be easily applied to small
projects. Applying the proposed model to small projects is expected to improve
the quality of the software. |
Keywords: |
Software engineering, CMMI, SPICE, Development methodology, SW Development
Process, QG(Quality Gate) |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
A STUDY ON VIDEO DATA ACCESS CONTROL TECHNOLOGY USING CP-ABPRE SCHEMES IN CCTV
ENVIRONMENT |
Author: |
YONG-WOON HWANG, IM-YEONG LEE |
Abstract: |
Recently, CCTV has been advancing with the development of IoT technology and
intelligence converging with CCTV, as opposed to recording only videos as in the
past. Currently, it is used in various fields. Therefore, there are various
security threats in the advanced CCTV environment. For example the attacker can
acquire the information of the user captured on the CCTV by acquiring the
transmitted video data. Also it is possible to disturb the integrity of the
video data by leaking or manipulating it to the outside. Additionally, if an
attacker hacks a server that manages multiple CCTV videos, many CCTVs can be
affected by the attacker's actions. In this paper, to solve the security threat
CCTV, video data is encrypted and managed on the server using the CP-ABE method
of attribute-based encryption so that only authorized users can access the video
data. In addition, if a person with different attributes wants to access the
video data, the video data can be accessed safely by re-encrypting the video
data using proxy re-encryption techniques based on the attributes of the
accessor. |
Keywords: |
CCTV, Attributes Based Encryption, Proxy re-encryption, Access Control |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
EFFICIENT TREE-STRUCTURED ITEMS PRUNING FOR BOTH POSITIVE AND NEGATIVE
ASSOCIATION RULES |
Author: |
JURYON PAIK |
Abstract: |
Researchers endeavor to develop efficient association rule mining algorithms
that are suitable for being stored in RDBMSs or native systems and reach a
certain level of maturity. However, with rapidly developing sensor-rich
environments, the volume of flexible, extensible, and cost-effective data, such
as JSON, XML, and so on, also increases exponentially with a sheer diversity.
Even though the researchers report impressive levels of accuracy in the
discovery of association rules, widespread adoption is hardly possible. Because
most proposed approaches are not designed for such flexible but complex data
models. They generally focus on simple record data for structured data models.
The current data model paradigm, however, is unstructured or semi-structured
one, which is usually represented by graph or tree. The sophisticated tree-based
models guarantee data exchangeability, heterogeneity, and granularity without
consideration of data types. Tree-based data modeling underpins several
disruptive data models. Representing any data requires big tradeoff, that is
rigorous analyzing. It is much harder to mine hidden information from the
tree-based modeling data. Under the Fourth Industrial Revolution, however, data
is not just the data, but critical corporate asset. The commoditized data and
its valuable analytics in unique ways enable new insights. New analytical
techniques can fuel discovery and innovation. This paper targets on providing
data analytics methodology, especially for tree-based data models, in order to
support both positive and negative association rules. This work provides several
adjusted definitions and expressions for both types of associations rules, and
shows simple mathematical results applied with some constraints to decide in
advance whether patterns have values to be discovered. |
Keywords: |
Tree-based Data Model, Tree Structured Data, Negated Tree Items, Positive Tree
Items, Association Rules |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
Title: |
WHAT INFLUENCES THE ADOPTION OF INNOVATIVE PRODUCTS ON E-COMMERCE? FOCUSING ON
NEED FOR POWER, INNOVATIVENESS AND IMPLICIT SELF THEORY |
Author: |
JUNSIK KWAK |
Abstract: |
There are five types of consumer according to the rate of adoption about new
ideas and technology. The categories of adopters are innovators, early adopters,
early majority, late majority and laggards. Company that make innovative
products focus on the innovators and early adopters because they are main target
of innovative products and they can recommend innovative products to their
friends and share their experience to social media. A few studies were about
factors that influenced on buying innovative products. The purpose of this
research is how consumer’s need for power (controllability), construal level,
and implicit self-theory influence to adopt innovative product. Especially,
Construal Level Theory says people use a high-level construal to describe
distant future events in terms of primary features, whereas people use a
low-level construal to describe near future events in terms of secondary
features. Therefore, we examined change of innovators focus. We conducted three
experiments. For data processing, univariate ANOVA was used to deduct following
results. First, High need for power group (there for, High NFP) evaluated
innovative product more favorably than low need for power group. Second Product
evaluation is more positively in the near future than in the distant future. The
difference between high versus low innovativeness was significant. That is,
participants in the high innovativeness rated Google glass as more positively.
In the near future, high innovative participants are not likely to different
with evaluation of Google glass according to Need-For-Power. However, low
innovative participants with high NFP evaluated Google glass positively more
than low innovative participants with low NFP. Finally, the difference in
evaluation between entity theorists and incremental theorist for innovative
products is not almost significant. Results showed that power related message
influenced the adoption of innovative product in the near future. In the future
research, we will find the key factors to adopt the innovative product more
easily |
Keywords: |
Innovative product, Construal Level Theory, Controllability, Desirability,
Implicit Self-theory. |
Source: |
Journal of Theoretical and Applied Information Technology
15th September 2019 -- Vol. 97. No. 17 -- 2019 |
Full
Text |
|
|
|