Pub Date : 2021-10-01DOI: 10.4018/ijskd.2021100106
Hanya M. Abdallah, A. Taha, M. Selim
With the rapid growth and adoption of cloud computing, more sensitive information is centralized onto the cloud every day. For protecting this sensitive information, it must be encrypted before being outsourced. Current search schemes allow the user to query encrypted data using keywords, but these schemes do not guarantee the privacy of queries (i.e., when the user hits query more than once with the same keywords, the server can capture information about the data). This paper focuses on the secure storage and retrieval of ciphered data with preserving query privacy. The proposed scheme deploys the sparse vector space model to represent each query, which focuses on reducing the storage and representation overheads. And the proposed scheme adds a random number to each query vector. Hence, the cloud server cannot distinguish between queries with the same keywords, which ensures the privacy of the query. Experimental results show that the proposed scheme outperforms other relevant state-of-the-art schemes.
{"title":"Cloud-Based Fuzzy Keyword Search Scheme Over Encrypted Documents","authors":"Hanya M. Abdallah, A. Taha, M. Selim","doi":"10.4018/ijskd.2021100106","DOIUrl":"https://doi.org/10.4018/ijskd.2021100106","url":null,"abstract":"With the rapid growth and adoption of cloud computing, more sensitive information is centralized onto the cloud every day. For protecting this sensitive information, it must be encrypted before being outsourced. Current search schemes allow the user to query encrypted data using keywords, but these schemes do not guarantee the privacy of queries (i.e., when the user hits query more than once with the same keywords, the server can capture information about the data). This paper focuses on the secure storage and retrieval of ciphered data with preserving query privacy. The proposed scheme deploys the sparse vector space model to represent each query, which focuses on reducing the storage and representation overheads. And the proposed scheme adds a random number to each query vector. Hence, the cloud server cannot distinguish between queries with the same keywords, which ensures the privacy of the query. Experimental results show that the proposed scheme outperforms other relevant state-of-the-art schemes.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"18 1","pages":"82-100"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83914361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijskd.2021100105
Youssef Ahmed, Walaa Medhat, Tarek El-Shishtawy
Many enterprise organizations own a large amount of data but suffer from methods that can't deal with it. A lot of approaches were proposed to manage big data and get the most benefits out of it. This paper proposes a complete approach for modeling big data and creates new values from it. The proposed approach contains implementation for four layers that deal directly with big data. The layers are collection layer, processing layer, analysis and new value creation layer, presentation and decision support layer. The paper also presents a detailed comprehensive comparison between different approaches for managing big data. The results show that the proposed approach has achieved many objectives that may interest enterprise organizations.
{"title":"An Approach for Modelling Big Data and Creation of New Values","authors":"Youssef Ahmed, Walaa Medhat, Tarek El-Shishtawy","doi":"10.4018/ijskd.2021100105","DOIUrl":"https://doi.org/10.4018/ijskd.2021100105","url":null,"abstract":"Many enterprise organizations own a large amount of data but suffer from methods that can't deal with it. A lot of approaches were proposed to manage big data and get the most benefits out of it. This paper proposes a complete approach for modeling big data and creates new values from it. The proposed approach contains implementation for four layers that deal directly with big data. The layers are collection layer, processing layer, analysis and new value creation layer, presentation and decision support layer. The paper also presents a detailed comprehensive comparison between different approaches for managing big data. The results show that the proposed approach has achieved many objectives that may interest enterprise organizations.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"13 1","pages":"66-81"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78242372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/ijskd.2021100102
B. A. Oluwale, O. Jegede, Blessing Funke Ajao, Emmanuel Makanjuola Ogunjemilua
The study investigated the role of openness, networking, and partnership on production and innovation among firms within the Otigba ICT cluster in Nigeria. A questionnaire were administered on 200 purposively selected business owners/leaders of informal tech-based enterprises in the cluster. The results showed that there were simultaneous occurrence of competition and co-operation within the cluster. Modes of openness within the cluster were by exchanging information and sharing experience with other technicians. Firms were majorly (70%) involved in process and marketing innovations (30%). Openness, networking, and partnership played a very significant role on access to information, customers, new domestic market, tools/technology, suppliers of raw materials, and inputs among the enterprises. A majority (95%) of the respondent enterprises which exhibited cluster attributes were involved in one form of innovation or the other. The study concluded that openness, networking, and partnership had engendered scaling-up among the enterprises.
{"title":"Importance of Openness for Production and Innovation in Informal Sector Cluster: Lessons From Nigeria","authors":"B. A. Oluwale, O. Jegede, Blessing Funke Ajao, Emmanuel Makanjuola Ogunjemilua","doi":"10.4018/ijskd.2021100102","DOIUrl":"https://doi.org/10.4018/ijskd.2021100102","url":null,"abstract":"The study investigated the role of openness, networking, and partnership on production and innovation among firms within the Otigba ICT cluster in Nigeria. A questionnaire were administered on 200 purposively selected business owners/leaders of informal tech-based enterprises in the cluster. The results showed that there were simultaneous occurrence of competition and co-operation within the cluster. Modes of openness within the cluster were by exchanging information and sharing experience with other technicians. Firms were majorly (70%) involved in process and marketing innovations (30%). Openness, networking, and partnership played a very significant role on access to information, customers, new domestic market, tools/technology, suppliers of raw materials, and inputs among the enterprises. A majority (95%) of the respondent enterprises which exhibited cluster attributes were involved in one form of innovation or the other. The study concluded that openness, networking, and partnership had engendered scaling-up among the enterprises.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"14 1","pages":"17-31"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86000958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070103
R. E. Indrajit, B. Wibawa, A. Suparman
The barriers to adopting new emerging technologies are the parts of the transformation process of the university which are willing to change to the future environment which is triggered by the Industrial Revolution 4.0. This research aims to identify whether and how Emerging Technologies 4.0 can be established in universities of developing countries. Besides the literature review method, the research was conducted in two stages: qualitative and quantitative. The samples were 250 universities. The findings of this research may help higher education and top-management-level universities and the ministry of education to initiate future strategies: first, finding the mechanism to solve the financial problem (the highest obstacles) faced by the university, such as public-private partnerships, foreign investment, joint ventures, or other industrial relationships; second, working closely with technology and infrastructure providers (the third-highest obstacles) by implementing the technical approach such as cloud computing, on-demand technology, sharing resources, and virtualization.
{"title":"University 4.0 in Developing Countries: A Case of Indonesia","authors":"R. E. Indrajit, B. Wibawa, A. Suparman","doi":"10.4018/IJSKD.2021070103","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070103","url":null,"abstract":"The barriers to adopting new emerging technologies are the parts of the transformation process of the university which are willing to change to the future environment which is triggered by the Industrial Revolution 4.0. This research aims to identify whether and how Emerging Technologies 4.0 can be established in universities of developing countries. Besides the literature review method, the research was conducted in two stages: qualitative and quantitative. The samples were 250 universities. The findings of this research may help higher education and top-management-level universities and the ministry of education to initiate future strategies: first, finding the mechanism to solve the financial problem (the highest obstacles) faced by the university, such as public-private partnerships, foreign investment, joint ventures, or other industrial relationships; second, working closely with technology and infrastructure providers (the third-highest obstacles) by implementing the technical approach such as cloud computing, on-demand technology, sharing resources, and virtualization.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"64 1","pages":"33-59"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90935138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070104
Namrata Sandhu, Dilpreet Singh, Sandhir Sharma
This study aims to explore the benefits and challenges in implementing the flipped classroom model in business education. Empirical analysis of the views of 346 teachers engaged in delivering courses in different business schools in India reveals student convenience, augmented learning, improved performance and feedback, personalized attention and enhanced interaction, better review, and optimum utilization of class time as the major benefits of this model. The study also establishes absence of prerequisites, dilution of teacher influence, sustenance of model, and selective flipping as the significant challenges in the effective implementation of this model.
{"title":"Flipping the Business Classroom: Benefits and Challenges","authors":"Namrata Sandhu, Dilpreet Singh, Sandhir Sharma","doi":"10.4018/IJSKD.2021070104","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070104","url":null,"abstract":"This study aims to explore the benefits and challenges in implementing the flipped classroom model in business education. Empirical analysis of the views of 346 teachers engaged in delivering courses in different business schools in India reveals student convenience, augmented learning, improved performance and feedback, personalized attention and enhanced interaction, better review, and optimum utilization of class time as the major benefits of this model. The study also establishes absence of prerequisites, dilution of teacher influence, sustenance of model, and selective flipping as the significant challenges in the effective implementation of this model.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"36 1","pages":"60-76"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84539956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070107
N. Baporikar
Age diversity plays an important role and as a tool can transform the organization, culture, and performance. Research indicates a need to have a balance between the older and the younger generation to foster creativity, innovativeness, and better decision making. Apart from that, age diversity also ensures a smooth transition of power and positions across all organizational thereby leading to enhanced performance. Literature emphasizes that skills and information as a result of age diversity contribute to the quality of the team and overall organizational performance while succession planning ensures consistency and leadership continuity. Adopting a qualitative research method, descriptive in nature with survey design, the objective of this study is to identify age diversity role in succession planning and how effective it is as a tool in succession planning for improving performance in state-owned enterprises (SOEs). Findings reveal a strong correlation between age diversity, succession planning, and the performances of state-owned enterprises.
{"title":"Succession Planning for Enhanced Performance in State-Owned Enterprises: Role of Age Diversity","authors":"N. Baporikar","doi":"10.4018/IJSKD.2021070107","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070107","url":null,"abstract":"Age diversity plays an important role and as a tool can transform the organization, culture, and performance. Research indicates a need to have a balance between the older and the younger generation to foster creativity, innovativeness, and better decision making. Apart from that, age diversity also ensures a smooth transition of power and positions across all organizational thereby leading to enhanced performance. Literature emphasizes that skills and information as a result of age diversity contribute to the quality of the team and overall organizational performance while succession planning ensures consistency and leadership continuity. Adopting a qualitative research method, descriptive in nature with survey design, the objective of this study is to identify age diversity role in succession planning and how effective it is as a tool in succession planning for improving performance in state-owned enterprises (SOEs). Findings reveal a strong correlation between age diversity, succession planning, and the performances of state-owned enterprises.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"1 1","pages":"106-132"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79095366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070108
Rabindra Lamsal, T. Kumar
Twitter has become the major source of data for the research community working on the social computing domain. The microblogging site receives millions of tweets every day on its platform. Earlier studies have shown that during any disaster, the frequency of tweets specific to an event grows exponentially, and these tweets, if monitored, processed, and analyzed, can contain actionable information relating to the event. However, during disasters, the number of tweets can be in the hundreds of thousands thereby necessitating the design of a semi-automated artificial intelligence-based system that can extract actionable information based on which steps can be taken for effective disaster response. This paper proposes a Twitter-based disaster response system that uses recurrent nets for training a classifier on a disaster specific tweets dataset. The proposed system would enable timely dissemination of information to various stakeholders so that timely response and proactive measures can be taken in order to reduce the severe consequences of disasters. Experimental results show that the recurrent nets outperform the traditional machine learning algorithms with regard to accuracy in classifying disaster-specific tweets.
{"title":"Twitter-Based Disaster Response Using Recurrent Nets","authors":"Rabindra Lamsal, T. Kumar","doi":"10.4018/IJSKD.2021070108","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070108","url":null,"abstract":"Twitter has become the major source of data for the research community working on the social computing domain. The microblogging site receives millions of tweets every day on its platform. Earlier studies have shown that during any disaster, the frequency of tweets specific to an event grows exponentially, and these tweets, if monitored, processed, and analyzed, can contain actionable information relating to the event. However, during disasters, the number of tweets can be in the hundreds of thousands thereby necessitating the design of a semi-automated artificial intelligence-based system that can extract actionable information based on which steps can be taken for effective disaster response. This paper proposes a Twitter-based disaster response system that uses recurrent nets for training a classifier on a disaster specific tweets dataset. The proposed system would enable timely dissemination of information to various stakeholders so that timely response and proactive measures can be taken in order to reduce the severe consequences of disasters. Experimental results show that the recurrent nets outperform the traditional machine learning algorithms with regard to accuracy in classifying disaster-specific tweets.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"3 1","pages":"133-150"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90321003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070102
D. Burrell
Many organizations are driven by technology. If you consider the nature of workforce shortages and recruiting challenges in areas like artificial intelligence and cybersecurity, it is important to understand how organizations need to recruit diverse technology-savvy talent including those from diverse cultures, backgrounds, and religions. There have been several incidents in the United States that point to significant problems with religious incivility in the workplace. In 2016, when the company Chargrill fired 150 non-Christian workers over prayer breaks, the incident points to a growing challenge in the American workplace about what companies can do to accommodate their employees' faiths. This article explores the literature on religious conflict and incivility since there needs to be more exploration on how religious conflict and incivility manifests itself through everyday interactions in the hyper-connected and cyber-driven workplace.
{"title":"Creating Diverse and Religiously Inclusive Workplace Cultures in Hyper-Connected, Technical, and Cyber-Driven Organizations","authors":"D. Burrell","doi":"10.4018/IJSKD.2021070102","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070102","url":null,"abstract":"Many organizations are driven by technology. If you consider the nature of workforce shortages and recruiting challenges in areas like artificial intelligence and cybersecurity, it is important to understand how organizations need to recruit diverse technology-savvy talent including those from diverse cultures, backgrounds, and religions. There have been several incidents in the United States that point to significant problems with religious incivility in the workplace. In 2016, when the company Chargrill fired 150 non-Christian workers over prayer breaks, the incident points to a growing challenge in the American workplace about what companies can do to accommodate their employees' faiths. This article explores the literature on religious conflict and incivility since there needs to be more exploration on how religious conflict and incivility manifests itself through everyday interactions in the hyper-connected and cyber-driven workplace.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"21 1","pages":"17-32"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81102869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070105
Shouhong Wang, Hai Wang
Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of KM for cybersecurity, and system architecture of KM for cybersecurity. The five constructs in the proposed sociotechnical systems analysis framework are analyzed. The paper makes contribution to the growing information systems literature by presenting a special case of sociotechnical systems analysis. The sociotechnical systems analysis framework provides guidelines for the development of KM systems for cybersecurity in organizations.
{"title":"A Sociotechnical Systems Analysis of Knowledge Management for Cybersecurity","authors":"Shouhong Wang, Hai Wang","doi":"10.4018/IJSKD.2021070105","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070105","url":null,"abstract":"Knowledge management (KM) is a tool to tackle cybersecurity issues, provided it emphasizes on the interrelated social, organizational, and technological factors involved in cybersecurity. This paper proposes a sociotechnical systems analysis framework of KM systems for cybersecurity. Specifically, it applies a sociotechnical systems approach to investigation of constructs of KM systems for cybersecurity and identifies five major constructs of KM systems for cybersecurity: roles of KM in cybersecurity, organizational framework of KM for cybersecurity, cybersecurity analytics process, tools of KM for cybersecurity, and system architecture of KM for cybersecurity. The five constructs in the proposed sociotechnical systems analysis framework are analyzed. The paper makes contribution to the growing information systems literature by presenting a special case of sociotechnical systems analysis. The sociotechnical systems analysis framework provides guidelines for the development of KM systems for cybersecurity in organizations.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"30 1","pages":"77-94"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76754458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-01DOI: 10.4018/IJSKD.2021070106
F. López-Cantos
In this article, the authors, in the context of the devastating effects that the proliferation of “fake news” is causing in all areas of society, deal with the ethical challenges and limits that falsification in the representation of knowledge. That is, what we might call “fake pictures” currently poses to the scientific community and the journalistic profession. In the conclusions, they emphasize the urgent need to demystify scientific activity and promote contemporary scientific culture from the perspective of knowledge representation.
{"title":"Scientific Image Forgery, Journalism, and Public Communication of Science","authors":"F. López-Cantos","doi":"10.4018/IJSKD.2021070106","DOIUrl":"https://doi.org/10.4018/IJSKD.2021070106","url":null,"abstract":"In this article, the authors, in the context of the devastating effects that the proliferation of “fake news” is causing in all areas of society, deal with the ethical challenges and limits that falsification in the representation of knowledge. That is, what we might call “fake pictures” currently poses to the scientific community and the journalistic profession. In the conclusions, they emphasize the urgent need to demystify scientific activity and promote contemporary scientific culture from the perspective of knowledge representation.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"19 1","pages":"95-105"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75350834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}