Fanf Ming, Riyaz Ahamed Ariyaluran Habeeb, F. Nasaruddin, A. Gani
In recent years, environment monitoring are of greater importance towards the area of climate monitoring, analysis, agricultural productivity management, quality assurance of water, air, alongside with other potential factors that are closely connected to industrial development and convenience of living. This research is motivated by creating awareness of smart home residents on indoor air quality, as well as providing insight of carbon dioxide emissions for industries and environmental organizations. This paper proposes an efficient solution towards environment monitoring of carbon dioxide integrated with Internet of Things capability and cloud computing technology. Aforementioned techniques will deliver highly accessible and real-time data visualization which would be greatly beneficial for Smart Homes efficiency of analysis actualization and counter-measures deployment. A monitoring architecture was developed to generate, accumulate, store and visualize carbon dioxide concentration using MQ135 carbon dioxide sensor, ESP8266 Wi-Fi module, Firebase Cloud Storage Service and Android mobile application Carbon Insight for data visualization. 2880 data points in the time frame of 10 days with a 30-second interval was collected, stored and visualized with the application of this system.
{"title":"Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud Technologies","authors":"Fanf Ming, Riyaz Ahamed Ariyaluran Habeeb, F. Nasaruddin, A. Gani","doi":"10.1145/3316615.3316622","DOIUrl":"https://doi.org/10.1145/3316615.3316622","url":null,"abstract":"In recent years, environment monitoring are of greater importance towards the area of climate monitoring, analysis, agricultural productivity management, quality assurance of water, air, alongside with other potential factors that are closely connected to industrial development and convenience of living. This research is motivated by creating awareness of smart home residents on indoor air quality, as well as providing insight of carbon dioxide emissions for industries and environmental organizations. This paper proposes an efficient solution towards environment monitoring of carbon dioxide integrated with Internet of Things capability and cloud computing technology. Aforementioned techniques will deliver highly accessible and real-time data visualization which would be greatly beneficial for Smart Homes efficiency of analysis actualization and counter-measures deployment. A monitoring architecture was developed to generate, accumulate, store and visualize carbon dioxide concentration using MQ135 carbon dioxide sensor, ESP8266 Wi-Fi module, Firebase Cloud Storage Service and Android mobile application Carbon Insight for data visualization. 2880 data points in the time frame of 10 days with a 30-second interval was collected, stored and visualized with the application of this system.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116050345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the past decade, object-oriented software engineering (OOSE) has gained popularity from many software developers, especially OOSE with a unified modeling language (UML). Use case views are often used in most systems during an analysis phase. These views show the system functionality related to the system stakeholders. Hence, use case views seem to be a corner stone for a software system. The defects occurring in use case views will affect the later designs. If these defects can be found early, it would save time and cost in software development. Therefore, this research proposes a technique for detecting defects in use case views during an analysis phase or requirements engineering process. Correct users' requirements were created as requirements specifications in a traditional form-based style for testing comparison. The algorithms for generating decision table from form-based requirements and UML use case specification as well as the algorithm for use case view validation were invented. Two simple case studies were investigated and used as the preliminary evaluation. The nineteen fourth-year students were selected as the subjects for the preliminary investigation in order to compare between manual fault detection and our automated proposed system. They were asked to perform four tasks for each case study. The results show that the efficiency of manual fault detection is less than the proposed technique at 47% and 44% or overall average as 45.5% for the two case studies. Currently, we apply this proposed technique to more complex industrial setting and familiar software systems to software engineers.
{"title":"Defects Detection Technique of Use Case Views during Requirements Engineering","authors":"Poranat Tianual, A. Pohthong","doi":"10.1145/3316615.3316631","DOIUrl":"https://doi.org/10.1145/3316615.3316631","url":null,"abstract":"In the past decade, object-oriented software engineering (OOSE) has gained popularity from many software developers, especially OOSE with a unified modeling language (UML). Use case views are often used in most systems during an analysis phase. These views show the system functionality related to the system stakeholders. Hence, use case views seem to be a corner stone for a software system. The defects occurring in use case views will affect the later designs. If these defects can be found early, it would save time and cost in software development. Therefore, this research proposes a technique for detecting defects in use case views during an analysis phase or requirements engineering process. Correct users' requirements were created as requirements specifications in a traditional form-based style for testing comparison. The algorithms for generating decision table from form-based requirements and UML use case specification as well as the algorithm for use case view validation were invented. Two simple case studies were investigated and used as the preliminary evaluation. The nineteen fourth-year students were selected as the subjects for the preliminary investigation in order to compare between manual fault detection and our automated proposed system. They were asked to perform four tasks for each case study. The results show that the efficiency of manual fault detection is less than the proposed technique at 47% and 44% or overall average as 45.5% for the two case studies. Currently, we apply this proposed technique to more complex industrial setting and familiar software systems to software engineers.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imbalance learning is one of the most challenging problems in supervised learning, so many different strategies are designed to tackle balanced sample distribution. The over-sampling techniques which achieve a relatively balanced class distribution through synthesizing samples receive more and more attention. In this paper, we present an over-sampling approach based on isolation Forest (iForest) and SMOTE, called iForest-SMOTE. Firstly, for minority class samples, iForest-score is employed to assess the importance of each sample based on iForest model. Then, in each SMOTE process, roulette wheel selection based on iForest-score is utilized to select the neighbor sample. Finally, M-dimensional-sphere interpolation approach is employed to generate a new sample. The experiments illustrate that our approach takes into account the spatial distribution of minority class samples and sample synthetic simultaneously. Therefore, iForest-SMOTE can effectively improve the performance of the classification model.
{"title":"An Improved Over-sampling Algorithm based on iForest and SMOTE","authors":"Yifeng Zheng, Guohe Li, Teng Zhang","doi":"10.1145/3316615.3316641","DOIUrl":"https://doi.org/10.1145/3316615.3316641","url":null,"abstract":"Imbalance learning is one of the most challenging problems in supervised learning, so many different strategies are designed to tackle balanced sample distribution. The over-sampling techniques which achieve a relatively balanced class distribution through synthesizing samples receive more and more attention. In this paper, we present an over-sampling approach based on isolation Forest (iForest) and SMOTE, called iForest-SMOTE. Firstly, for minority class samples, iForest-score is employed to assess the importance of each sample based on iForest model. Then, in each SMOTE process, roulette wheel selection based on iForest-score is utilized to select the neighbor sample. Finally, M-dimensional-sphere interpolation approach is employed to generate a new sample. The experiments illustrate that our approach takes into account the spatial distribution of minority class samples and sample synthetic simultaneously. Therefore, iForest-SMOTE can effectively improve the performance of the classification model.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123426396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Efendi, Susnaningsih Mu’at, Nelsy Arisandi, N. Samsudin
In economics research survey, the causal relationship between independent and dependent attributes has been frequently investigated by using regression linear models. However, not easy to achieve the high R-square value between both attributes if there are too many unclassified elements in data sets. This paper presents removing unclassified elements in conventional regression model using rough sets approximation. The proposed model is address to handle the unclassified academic staffs in data set which less contribution for supporting financial wellbeing decision. The result showed that number of unclassified staff has a positive effect to increase coefficient determination (R-square) value in the regression model. In this case study, the financial wellbeing of academic staff is significantly influenced by two different attributes, namely, financial behavior and financial stress. It also may help decision makers or universities management in improving their staff in financial wellness and wellbeing.
{"title":"Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression Model","authors":"R. Efendi, Susnaningsih Mu’at, Nelsy Arisandi, N. Samsudin","doi":"10.1145/3316615.3316651","DOIUrl":"https://doi.org/10.1145/3316615.3316651","url":null,"abstract":"In economics research survey, the causal relationship between independent and dependent attributes has been frequently investigated by using regression linear models. However, not easy to achieve the high R-square value between both attributes if there are too many unclassified elements in data sets. This paper presents removing unclassified elements in conventional regression model using rough sets approximation. The proposed model is address to handle the unclassified academic staffs in data set which less contribution for supporting financial wellbeing decision. The result showed that number of unclassified staff has a positive effect to increase coefficient determination (R-square) value in the regression model. In this case study, the financial wellbeing of academic staff is significantly influenced by two different attributes, namely, financial behavior and financial stress. It also may help decision makers or universities management in improving their staff in financial wellness and wellbeing.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124862858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jamal, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi, Sim Liew Fong
Nowadays, internet has become an important part of everyone's lives. The internet has turned out to be a reliable tool for communication, data transfer and many more applications for people from all over the world. An individual's internet activities are being tracked and traced without their knowledge by various means. Thus, online security is a genuine worry for web clients who intend to visit interpersonal interaction locales, make an online transaction, or take an interest in internet diversions, as they need their protection to be ensured. Internet browsing is not anonymized as many Internet Service Providers (ISP's) could legally sell users information without informing users. People's internet activities are being tracked and traced by ISPs. Moreover, network spies and snooping attempts are very hard to be defeated as an ample network snooping tools are available in the market. These issues can be curbed by using a router that has anonymous browsing infrastructure. However, most of the routers that gives anonymous browsing are not portable. From this project, people will be able to browse anonymously without being traced. Besides that, network snooping and spying attempts can be defeated. Finally, a portable The Onion Routing (TOR) router can be created with a Raspberry Pi..
{"title":"Portable TOR Router with Raspberry Pi","authors":"A. Jamal, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi, Sim Liew Fong","doi":"10.1145/3316615.3316694","DOIUrl":"https://doi.org/10.1145/3316615.3316694","url":null,"abstract":"Nowadays, internet has become an important part of everyone's lives. The internet has turned out to be a reliable tool for communication, data transfer and many more applications for people from all over the world. An individual's internet activities are being tracked and traced without their knowledge by various means. Thus, online security is a genuine worry for web clients who intend to visit interpersonal interaction locales, make an online transaction, or take an interest in internet diversions, as they need their protection to be ensured. Internet browsing is not anonymized as many Internet Service Providers (ISP's) could legally sell users information without informing users. People's internet activities are being tracked and traced by ISPs. Moreover, network spies and snooping attempts are very hard to be defeated as an ample network snooping tools are available in the market. These issues can be curbed by using a router that has anonymous browsing infrastructure. However, most of the routers that gives anonymous browsing are not portable. From this project, people will be able to browse anonymously without being traced. Besides that, network snooping and spying attempts can be defeated. Finally, a portable The Onion Routing (TOR) router can be created with a Raspberry Pi..","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125512137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As technology grows, live video streaming services become a new form of social media, in which everyone is able to live webcast and interact with audiences. Statistics indicate that Internet audiences are viewing more live content than ever before. It is noteworthy live video streaming viewing may become a new form of addicted behavior of technology but literature on such subject is very limited. The purpose of this research is to explore the factors for addictive use of live video streaming services. A total of 338 participants were recruited via an online survey that was designed with five subscales: demographics, psychological factors (life satisfaction and loneliness), Big Five personality traits, motivations, and problematic use of live video streaming services. Results indicated age was not related to addiction, but gender and average watching time per day were related. The personality of agreeableness was negatively related and neuroticism was positively related with the addiction. Motivations for interaction, escapism, and peeking were found related to the addiction.
{"title":"Problematic Use of Live Video Streaming Services: Impact of Personality Traits, Psychological Factors, and Motivations","authors":"S. Cheng, Shao-Liang Chang, Chi-Ying Chen","doi":"10.1145/3316615.3316620","DOIUrl":"https://doi.org/10.1145/3316615.3316620","url":null,"abstract":"As technology grows, live video streaming services become a new form of social media, in which everyone is able to live webcast and interact with audiences. Statistics indicate that Internet audiences are viewing more live content than ever before. It is noteworthy live video streaming viewing may become a new form of addicted behavior of technology but literature on such subject is very limited. The purpose of this research is to explore the factors for addictive use of live video streaming services. A total of 338 participants were recruited via an online survey that was designed with five subscales: demographics, psychological factors (life satisfaction and loneliness), Big Five personality traits, motivations, and problematic use of live video streaming services. Results indicated age was not related to addiction, but gender and average watching time per day were related. The personality of agreeableness was negatively related and neuroticism was positively related with the addiction. Motivations for interaction, escapism, and peeking were found related to the addiction.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Universitas Muhammadiyah Yogyakarta is one of the universities in Indonesia. Every college must have graduated or called alumni. Alumni have an essential role in the development of educational institutions. Currently, alumni are used as one of the requirements for the university accreditation process by BAN-PT as evaluation material, therefore the importance of alumni monitoring or information, UMY has a tracer study to monitor alumni information using a questionnaire. However, to obtain data from the survey, it is still having trouble because the data is not yet integrated. Integrated data is collected by building a data warehouse. This research develops a data warehouse using NDS architecture, and There is some noise was found that need to be cleaned, such as null data and duplication of data. data warehouse alumni have been built, and it can meet the requirements of the institution that are displayed in a report to make it easier to analyze reports, the news is made into a dashboard form that is enhanced using Power BI applications.
{"title":"Dashboard-based Alumni Tracer Study Report Using Normalized Data Store Architecture","authors":"Asroni, Juanita Yusanti, S. Riyadi","doi":"10.1145/3316615.3316635","DOIUrl":"https://doi.org/10.1145/3316615.3316635","url":null,"abstract":"Universitas Muhammadiyah Yogyakarta is one of the universities in Indonesia. Every college must have graduated or called alumni. Alumni have an essential role in the development of educational institutions. Currently, alumni are used as one of the requirements for the university accreditation process by BAN-PT as evaluation material, therefore the importance of alumni monitoring or information, UMY has a tracer study to monitor alumni information using a questionnaire. However, to obtain data from the survey, it is still having trouble because the data is not yet integrated. Integrated data is collected by building a data warehouse. This research develops a data warehouse using NDS architecture, and There is some noise was found that need to be cleaned, such as null data and duplication of data. data warehouse alumni have been built, and it can meet the requirements of the institution that are displayed in a report to make it easier to analyze reports, the news is made into a dashboard form that is enhanced using Power BI applications.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128305646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ullah, M. Asif, Shahbaz Ahmad, Ulfat Imdad, O. Sohaib
Today Pakistan is facing numerous challenges for the interconnection of local energy resources and for balanced energy policies. Data Science, Big Data, Artificial Intelligence (AI), IoT and Cloud computing draws our focus towards controlling energy crises in terms of smart energy generation, consumption and to overcome causes of energy crises. To make a conclusion valuable we have to extract significant value from a large amount of data that's why data management plays a significant role. This Paper presents a review of energy sectors, energy resources, energy crises in Pakistan. It also presents the possible solution of energy crises with the help of data science application and the involvement of Big Data, Cloud computing, IoT and AI.
{"title":"Application of Data Science for Controlling Energy Crises: A Case Study of Pakistan","authors":"S. Ullah, M. Asif, Shahbaz Ahmad, Ulfat Imdad, O. Sohaib","doi":"10.1145/3316615.3316616","DOIUrl":"https://doi.org/10.1145/3316615.3316616","url":null,"abstract":"Today Pakistan is facing numerous challenges for the interconnection of local energy resources and for balanced energy policies. Data Science, Big Data, Artificial Intelligence (AI), IoT and Cloud computing draws our focus towards controlling energy crises in terms of smart energy generation, consumption and to overcome causes of energy crises. To make a conclusion valuable we have to extract significant value from a large amount of data that's why data management plays a significant role. This Paper presents a review of energy sectors, energy resources, energy crises in Pakistan. It also presents the possible solution of energy crises with the help of data science application and the involvement of Big Data, Cloud computing, IoT and AI.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121369368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rajapaksa, W. Rasanjana, I. Perera, D. Meedeniya
With the advancement of biology and computer science, the amount of DNA sequences has grown at a rapid rate giving rise to the analysis of phylogenetic trees with many taxa. The maximum likelihood analysis is commonly considered as the best approach in phylogenetic analyses, which is extremely intensive for computation. Availability of computer resources and the application of modern technologies are key factors that determine the use of such analyses. The paper presents a parallel implementation of a GPU accelerated maximum likelihood inference of phylogenetic trees on DNAml program of the PHYLIP package. The improved DNAml program uses both GPU and CPU processing to perform compute-intensive tasks in phylogenetic analyses. The evaluation results show a speedup of x2.94 for the GPU accelerated DNAml program than the existing program. As the results show the proposed system saves the processing time increasingly against the current system with the number of taxa.
{"title":"GPU Accelerated Maximum Likelihood Analysis for Phylogenetic Inference","authors":"S. Rajapaksa, W. Rasanjana, I. Perera, D. Meedeniya","doi":"10.1145/3316615.3316630","DOIUrl":"https://doi.org/10.1145/3316615.3316630","url":null,"abstract":"With the advancement of biology and computer science, the amount of DNA sequences has grown at a rapid rate giving rise to the analysis of phylogenetic trees with many taxa. The maximum likelihood analysis is commonly considered as the best approach in phylogenetic analyses, which is extremely intensive for computation. Availability of computer resources and the application of modern technologies are key factors that determine the use of such analyses. The paper presents a parallel implementation of a GPU accelerated maximum likelihood inference of phylogenetic trees on DNAml program of the PHYLIP package. The improved DNAml program uses both GPU and CPU processing to perform compute-intensive tasks in phylogenetic analyses. The evaluation results show a speedup of x2.94 for the GPU accelerated DNAml program than the existing program. As the results show the proposed system saves the processing time increasingly against the current system with the number of taxa.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116264665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed A. Al-Sharafi, Ruzaini bin Abdullah Arshah, E. Abu-Shanab
In the business world, cloud computing (CC) technologies are emerging computing platforms used to improve the deployment of ICT services with the aim of improving performance and competitive advantage. However, enough attention has not been given to the factors that influence the continuous use behavior of organizations towards CC services. Hence, this study aims to develop a reliable and valid questionnaire for the determination of the continuous use behavior of SMEs towards CC services. The questionnaire used in this study passed through three basic steps in accordance to the established scale development guidelines provided by Moore and Benbasat [1]. The questionnaire included three main sections with 87 questions. The questionnaire serves as a tool that will help SMEs and CC service providers to plan their strategies for providing a supportive sustained use of CC services in Malaysia.
{"title":"Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing Services","authors":"Mohammed A. Al-Sharafi, Ruzaini bin Abdullah Arshah, E. Abu-Shanab","doi":"10.1145/3316615.3316723","DOIUrl":"https://doi.org/10.1145/3316615.3316723","url":null,"abstract":"In the business world, cloud computing (CC) technologies are emerging computing platforms used to improve the deployment of ICT services with the aim of improving performance and competitive advantage. However, enough attention has not been given to the factors that influence the continuous use behavior of organizations towards CC services. Hence, this study aims to develop a reliable and valid questionnaire for the determination of the continuous use behavior of SMEs towards CC services. The questionnaire used in this study passed through three basic steps in accordance to the established scale development guidelines provided by Moore and Benbasat [1]. The questionnaire included three main sections with 87 questions. The questionnaire serves as a tool that will help SMEs and CC service providers to plan their strategies for providing a supportive sustained use of CC services in Malaysia.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127217750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}