首页 > 最新文献

2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)最新文献

英文 中文
A Conceptual Model for Designing a Gamified Intermittent Fasting Mobile App 设计游戏化间歇性禁食移动应用的概念模型
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073629
S. Ansong, N. A. Iahad
Mobile health (m-health) applications, are widely used across various platforms for different purposes. One application is for self-monitoring to ensure achievement of goals. Specifically, in the area of wellness, there has been a rise in the use of mobile apps for intermittent fasting (IF). Previous researchers have identified the determinants that leverage the intention to continue to use mobile phone wellness apps. Studies on the use of IF mobile apps for self-monitoring weight loss still indicate the lack of a catalyst (gamification) to persuade users to prolong use. With the growing interest in the area of gamification in healthcare and behaviour change support systems, this study proposes a model for designing IF mobile apps that embed gamification
移动医疗(移动医疗)应用程序在各种平台上被广泛用于不同目的。一种应用是自我监控,以确保实现目标。具体来说,在健康领域,使用间歇性禁食(IF)的移动应用程序的人数有所增加。之前的研究人员已经确定了影响人们继续使用手机健康应用程序的决定因素。对使用IF手机app进行自我减肥监测的研究仍然表明,缺乏一种催化剂(游戏化)来说服用户延长使用时间。随着人们对医疗保健和行为改变支持系统中游戏化领域的兴趣日益浓厚,本研究提出了一个设计嵌入游戏化的IF移动应用程序的模型
{"title":"A Conceptual Model for Designing a Gamified Intermittent Fasting Mobile App","authors":"S. Ansong, N. A. Iahad","doi":"10.1109/ICRIIS48246.2019.9073629","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073629","url":null,"abstract":"Mobile health (m-health) applications, are widely used across various platforms for different purposes. One application is for self-monitoring to ensure achievement of goals. Specifically, in the area of wellness, there has been a rise in the use of mobile apps for intermittent fasting (IF). Previous researchers have identified the determinants that leverage the intention to continue to use mobile phone wellness apps. Studies on the use of IF mobile apps for self-monitoring weight loss still indicate the lack of a catalyst (gamification) to persuade users to prolong use. With the growing interest in the area of gamification in healthcare and behaviour change support systems, this study proposes a model for designing IF mobile apps that embed gamification","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
It’s a bird… It’s a plane… It’s a drone…: Telecommunication Tower Inspection Using Drone 这是一只鸟,这是一架飞机,这是一架无人机:使用无人机检查电信塔
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073663
Mohd Fuad Mohd Isa, N. A. Rahim, M. Fathi
Despite its benefits, the use of drone in the inspection context particularly in the telecommunication tower inspection are still not popular. There are also lack of research paper found that discuss on the usage of drone for inspecting telecommunication tower. Therefore, this paper intend to highlight the significance of the drone technology over the current methods used in the inspection business. Relevant papers reviews resulted in the identification of the advantages of drone usage in the context of telecommunication tower inspection. The contribution of the paper is the understanding of the drone usage within the focused context and the similarities of the applications in other inspection context. The outcome of this paper would assists the stakeholders in the relevant industry in their investment decision making towards digitizing their businesses for future ready ecosystem.
尽管它的好处,使用无人机在检查背景下,特别是在电信塔检查仍然不受欢迎。对无人机在电信铁塔检测中的应用进行探讨的研究文献也较少。因此,本文打算突出无人机技术相对于目前检测业务中使用的方法的意义。通过对相关论文的审查,确定了无人机在电信塔检查中使用的优势。本文的贡献是理解无人机在重点上下文中的使用情况以及在其他检查上下文中应用的相似性。本文的结果将有助于相关行业的利益相关者对未来准备好的生态系统进行数字化业务的投资决策。
{"title":"It’s a bird… It’s a plane… It’s a drone…: Telecommunication Tower Inspection Using Drone","authors":"Mohd Fuad Mohd Isa, N. A. Rahim, M. Fathi","doi":"10.1109/ICRIIS48246.2019.9073663","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073663","url":null,"abstract":"Despite its benefits, the use of drone in the inspection context particularly in the telecommunication tower inspection are still not popular. There are also lack of research paper found that discuss on the usage of drone for inspecting telecommunication tower. Therefore, this paper intend to highlight the significance of the drone technology over the current methods used in the inspection business. Relevant papers reviews resulted in the identification of the advantages of drone usage in the context of telecommunication tower inspection. The contribution of the paper is the understanding of the drone usage within the focused context and the similarities of the applications in other inspection context. The outcome of this paper would assists the stakeholders in the relevant industry in their investment decision making towards digitizing their businesses for future ready ecosystem.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybernetic Diagnosis Approach for Publication Productivity of Malaysian Research University 马来西亚研究型大学出版生产力的控制论诊断方法
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073664
S. Dhillon, R. Ibrahim, Ali Selemat
It is essential for academic staffs to keep track of their publication records. Publication is seen to be the main resource for evaluation in the academic world. Besides, the publication criteria are mainly being evaluated for promotion and to access research grants from the institution or the government entities. The basis of this research is to unveil personal, behavioral and environmental factors using social cognitive theory (SCT) and by implementing the Viable System Model (VSM) as the diagnostic tool using cybernetic concept which is more viable to changes in the organization, which relate to key performance indicators (KPI) delivery on scholarly publications (SP). Thus, this study is aimed at investigating factors associated with publication productivity among the research university academic staffs by integrating VSM and SCT. This study applies qualitative method triangulated with quantitative method. The findings show that the most influential factors for the SP of Universiti Teknologi Malaysia (UTM) are age, gender, experience, rank, teaching load, collaboration, funding, resource, discipline and skill. The model was evaluated for the SP KPI monitoring process, which further can be used by public and private universities to improve the performance of their institution’s publication.
学术人员对自己的发表记录进行跟踪是非常必要的。在学术界,出版物被视为评价的主要资源。此外,评估出版标准主要是为了促进和获得机构或政府实体的研究资助。本研究的基础是利用社会认知理论(SCT),并通过实施可行系统模型(VSM)作为诊断工具,使用控制论概念,揭示个人,行为和环境因素,这与学术出版物(SP)的关键绩效指标(KPI)交付有关。因此,本研究旨在整合VSM与SCT,探讨影响研究型大学学术人员出版效率的相关因素。本研究采用定性与定量相结合的方法。研究结果表明,对马来西亚科技大学(UTM)的SP影响最大的因素是年龄、性别、经验、级别、教学负荷、合作、资金、资源、学科和技能。对该模型进行了SP KPI监测过程的评估,该过程可进一步用于公立和私立大学,以提高其机构出版的绩效。
{"title":"Cybernetic Diagnosis Approach for Publication Productivity of Malaysian Research University","authors":"S. Dhillon, R. Ibrahim, Ali Selemat","doi":"10.1109/ICRIIS48246.2019.9073664","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073664","url":null,"abstract":"It is essential for academic staffs to keep track of their publication records. Publication is seen to be the main resource for evaluation in the academic world. Besides, the publication criteria are mainly being evaluated for promotion and to access research grants from the institution or the government entities. The basis of this research is to unveil personal, behavioral and environmental factors using social cognitive theory (SCT) and by implementing the Viable System Model (VSM) as the diagnostic tool using cybernetic concept which is more viable to changes in the organization, which relate to key performance indicators (KPI) delivery on scholarly publications (SP). Thus, this study is aimed at investigating factors associated with publication productivity among the research university academic staffs by integrating VSM and SCT. This study applies qualitative method triangulated with quantitative method. The findings show that the most influential factors for the SP of Universiti Teknologi Malaysia (UTM) are age, gender, experience, rank, teaching load, collaboration, funding, resource, discipline and skill. The model was evaluated for the SP KPI monitoring process, which further can be used by public and private universities to improve the performance of their institution’s publication.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Standardization for Penetration Testing Reports and Documents 渗透测试报告和文档标准化综述
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073393
Mohd Zaidi Zakaria, Poon Ai Phin, Nurfarahin Mohmad, Saiful Adli Ismail, M. Kama, O. Yusop
Penetration testing or pen test is a simulated cyber-attack conducted to find the vulnerabilities and weaknesses in a computer system. The test is conducted by professionals hired by the organization that produces a report to the organization for further actions. However, the report produce varies according to the different tester. This is because there is no standardized format of a pen test report approved by any security organization or bodies. Each tester would submit a report based on the findings on their company’s policy. We analyse eight pen test report available online to find any similarities or pattern so that we can come out with a standardized format which comprises of components we think is needed in the report. The proposed format will also cater to the understanding of both security system personnel and the upper management of the organization. This is due to the fact that technicality of the report may not be clear to the top management, which results in them taking less consideration upon the issues of vulnerabilities in their system. This standardized report will cater to the needs of both system security personnel and the upper management by taking further actions upon improving the security of their network, servers, computers, firewalls and all of the access channels of their system.
渗透测试或渗透测试是一种模拟网络攻击,旨在发现计算机系统中的漏洞和弱点。测试由组织雇用的专业人员进行,并向组织提交报告,以便采取进一步行动。然而,根据不同的测试人员,生成的报告是不同的。这是因为没有任何安全组织或机构认可的渗透测试报告的标准化格式。每个测试人员将根据他们公司政策的发现提交一份报告。我们分析了八个在线可用的渗透测试报告,以找到任何相似之处或模式,以便我们可以提出一个标准化的格式,其中包括我们认为报告中需要的组件。拟议的格式也将符合保安系统人员和该组织高层管理人员的理解。这是由于报告的技术性可能对最高管理层不清楚,这导致他们较少考虑系统中的漏洞问题。此标准化报告将会配合系统保安人员及上层管理人员的需要,进一步改善其网络、伺服器、电脑、防火墙及所有系统接驳通道的安全。
{"title":"A Review of Standardization for Penetration Testing Reports and Documents","authors":"Mohd Zaidi Zakaria, Poon Ai Phin, Nurfarahin Mohmad, Saiful Adli Ismail, M. Kama, O. Yusop","doi":"10.1109/ICRIIS48246.2019.9073393","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073393","url":null,"abstract":"Penetration testing or pen test is a simulated cyber-attack conducted to find the vulnerabilities and weaknesses in a computer system. The test is conducted by professionals hired by the organization that produces a report to the organization for further actions. However, the report produce varies according to the different tester. This is because there is no standardized format of a pen test report approved by any security organization or bodies. Each tester would submit a report based on the findings on their company’s policy. We analyse eight pen test report available online to find any similarities or pattern so that we can come out with a standardized format which comprises of components we think is needed in the report. The proposed format will also cater to the understanding of both security system personnel and the upper management of the organization. This is due to the fact that technicality of the report may not be clear to the top management, which results in them taking less consideration upon the issues of vulnerabilities in their system. This standardized report will cater to the needs of both system security personnel and the upper management by taking further actions upon improving the security of their network, servers, computers, firewalls and all of the access channels of their system.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115746795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Prediction Scoring in Exergames for Rehabilitation Patients using K-Means Clustering 基于k -均值聚类的康复患者运动预测评分
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073659
Nurezayana Zainal, M. Faeid, Seyed Mostafa Mousavi Kahaki, Hafez Hussain, M. Bahari, W. Ismail
This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery Assistant (MIRA) exergames based on Kinect-based Rehabilitation Gaming System (RGS) for rehabilitation patients. The case study uses 19 rehabilitation patients with different lower limb limitations caused by stroke, traumatic brain injury (TBI) and spinal cord injury (SCI). MIRA exergames consists of three difficulty modes which are easy, medium and hard. Currently, physiotherapist will decide on difficulty mode based on the patients’ improvement and most of the time they will used the default setting for every patient playing exergames. Thus, this study proposed a new prediction scoring using k-means clustering algorithm to help suggesting the difficulty mode of the game. K-means clustering also is used to find the benchmarks of the patients’ history. The performance of the K-Mean algorithm is to make sure the patients are comfortable with their weakness side as suggested.
本文重点研究了基于kinect康复游戏系统(RGS)的医疗互动康复助手(MIRA)游戏难度模式的预测评分方法。本研究以19例脑卒中、创伤性脑损伤(TBI)和脊髓损伤(SCI)所致不同下肢受限的康复患者为研究对象。MIRA游戏包含简单、中等和困难三种难度模式。目前,物理治疗师会根据患者的改善程度来决定难度模式,大多数情况下他们会使用每个患者玩游戏的默认设置。因此,本研究提出了一种新的预测评分方法,使用k-means聚类算法来帮助建议游戏的难度模式。K-means聚类也用于寻找患者病史的基准。K-Mean算法的性能是确保患者对他们建议的弱点感到满意。
{"title":"Prediction Scoring in Exergames for Rehabilitation Patients using K-Means Clustering","authors":"Nurezayana Zainal, M. Faeid, Seyed Mostafa Mousavi Kahaki, Hafez Hussain, M. Bahari, W. Ismail","doi":"10.1109/ICRIIS48246.2019.9073659","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073659","url":null,"abstract":"This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery Assistant (MIRA) exergames based on Kinect-based Rehabilitation Gaming System (RGS) for rehabilitation patients. The case study uses 19 rehabilitation patients with different lower limb limitations caused by stroke, traumatic brain injury (TBI) and spinal cord injury (SCI). MIRA exergames consists of three difficulty modes which are easy, medium and hard. Currently, physiotherapist will decide on difficulty mode based on the patients’ improvement and most of the time they will used the default setting for every patient playing exergames. Thus, this study proposed a new prediction scoring using k-means clustering algorithm to help suggesting the difficulty mode of the game. K-means clustering also is used to find the benchmarks of the patients’ history. The performance of the K-Mean algorithm is to make sure the patients are comfortable with their weakness side as suggested.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132221884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart City Security Measures in King Hussein Business Park (KHBP), Amman, Jordan 约旦安曼侯赛因国王商业园区(KHBP)的智慧城市安全措施
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073280
Q. Saber, Huda Ibrahim, Mawarny Md. Rejab
Given the possibilities of smart cities to significantly affect human lives, issues related to security have come into a spotlight to public and industries. People are now connected to each other through smart telephones and other gadgets. Facilities like smart meters, security gadgets and smart machines are being utilized in numerous cities. This study presents the security measures in the context of smart city advancement. Security matters in this context encompasses unlawful access to information and attacks causing physical disturbances in administration accessibility. Semi-structured interviews on 30 government officials, policymakers and regulators were applied to saturate categories. The outcome uncovered a dimension of “evolving security” as having positive effect and prompts how King Hussein Business Park (KHBP) is a mix for planning a robust security initiative for the securing of a smart city. City foundations and administrations are now evolving and experiencing changes amidst new interrelated systems for monitoring, control, and automation. Smart transportation, open and private, will get to a snare of interrelated information from GPS area to weather and traffic updates. Integrated systems will help open wellbeing, emergency responders and in misfortune recuperation.
智慧城市有可能对人类生活产生重大影响,与安全相关的问题已成为公众和业界关注的焦点。人们现在通过智能手机和其他小工具相互联系。许多城市都在使用智能电表、安全装置和智能机器等设施。本研究提出智慧城市发展背景下的安全措施。在这种情况下,安全问题包括非法访问信息和对管理可访问性造成物理干扰的攻击。对30名政府官员、政策制定者和监管者的半结构化访谈应用于饱和类别。结果揭示了“不断发展的安全”的一个维度,它具有积极的影响,并提示侯赛因国王商业园区(KHBP)如何规划一个强大的安全倡议,以确保智慧城市的安全。在监测、控制和自动化的新的相互关联的系统中,城市基金会和管理部门正在不断发展和经历变化。智能交通,无论是开放的还是私有的,都将获得从GPS区域到天气和交通更新的相互关联的信息。综合系统将有助于打开福利,应急响应和不幸的恢复。
{"title":"Smart City Security Measures in King Hussein Business Park (KHBP), Amman, Jordan","authors":"Q. Saber, Huda Ibrahim, Mawarny Md. Rejab","doi":"10.1109/ICRIIS48246.2019.9073280","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073280","url":null,"abstract":"Given the possibilities of smart cities to significantly affect human lives, issues related to security have come into a spotlight to public and industries. People are now connected to each other through smart telephones and other gadgets. Facilities like smart meters, security gadgets and smart machines are being utilized in numerous cities. This study presents the security measures in the context of smart city advancement. Security matters in this context encompasses unlawful access to information and attacks causing physical disturbances in administration accessibility. Semi-structured interviews on 30 government officials, policymakers and regulators were applied to saturate categories. The outcome uncovered a dimension of “evolving security” as having positive effect and prompts how King Hussein Business Park (KHBP) is a mix for planning a robust security initiative for the securing of a smart city. City foundations and administrations are now evolving and experiencing changes amidst new interrelated systems for monitoring, control, and automation. Smart transportation, open and private, will get to a snare of interrelated information from GPS area to weather and traffic updates. Integrated systems will help open wellbeing, emergency responders and in misfortune recuperation.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124916384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying Lexicon for Social Media 社交媒体网络欺凌词典
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073679
O. Hang, Halina Mohamed Dahlan
The presence of cyberbullying lexicon can be used to prevent cyberbullying, since user can know which words represent the cyberbullying word in social media. However, there is less research been done for developing the cyberbullying lexicon. Many researches are focusing on cyberbullying detection rather than cyberbullying instances. In order to fill the gaps, this paper aims to propose a cyberbullying lexicon for social media. This paper is focusing on exclusion cyberbullying and proposing an exclusion cyberbullying lexicon by using an ontological approach. This approach consists of several phases, namely: understanding the concepts of exclusion cyberbullying, word list selection, keyword identification, classes and subclasses identification, and lastly cyberbullying ontology and lexicon development. The classes, subclasses and the documentation have been included in the development of exclusion cyberbullying ontology. Classes are based on the semantic frame, subclasses are based on the lexical entry, while documentation of classes and subclasses are based on the definition of the semantic frame and lexical entry from FrameNet. The proposed exclusion cyberbullying lexicon is arranged in alphabetical order and it contains 13 exclusion cyberbullying keywords with its definition and category. In the proposed exclusion cyberbullying lexicon, keyword, definition, and category represent the subclasses, documentation, and classes from the exclusion cyberbullying ontology respectively. The presence of exclusion cyberbullying lexicon can provide a reference for the social media users as well as for cyberbullying detection.
网络欺凌词汇的存在可以用来防止网络欺凌,因为用户可以知道哪些词代表社交媒体中的网络欺凌词。然而,关于开发网络欺凌词汇的研究却很少。许多研究都侧重于网络欺凌的检测,而不是网络欺凌的实例。为了填补这一空白,本文旨在为社交媒体提出一个网络欺凌词汇。本文以排斥性网络欺凌为研究对象,运用本体论方法提出了排斥性网络欺凌词汇。该方法包括理解排斥性网络欺凌概念、选择词表、关键词识别、类和子类识别、网络欺凌本体和词典开发等几个阶段。类、子类和文档已被纳入排斥性网络欺凌本体的开发。类基于语义框架,子类基于词法条目,而类和子类的文档则基于来自frameet的语义框架和词法条目的定义。所构建的排除性网络欺凌词汇按字母顺序排列,包含13个排除性网络欺凌关键词及其定义和类别。在本文提出的排除性网络欺凌词典中,关键词、定义和类别分别代表排除性网络欺凌本体的子类、文档和类。排除性网络欺凌词汇的存在可以为社交媒体用户提供参考,也可以为网络欺凌的检测提供参考。
{"title":"Cyberbullying Lexicon for Social Media","authors":"O. Hang, Halina Mohamed Dahlan","doi":"10.1109/ICRIIS48246.2019.9073679","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073679","url":null,"abstract":"The presence of cyberbullying lexicon can be used to prevent cyberbullying, since user can know which words represent the cyberbullying word in social media. However, there is less research been done for developing the cyberbullying lexicon. Many researches are focusing on cyberbullying detection rather than cyberbullying instances. In order to fill the gaps, this paper aims to propose a cyberbullying lexicon for social media. This paper is focusing on exclusion cyberbullying and proposing an exclusion cyberbullying lexicon by using an ontological approach. This approach consists of several phases, namely: understanding the concepts of exclusion cyberbullying, word list selection, keyword identification, classes and subclasses identification, and lastly cyberbullying ontology and lexicon development. The classes, subclasses and the documentation have been included in the development of exclusion cyberbullying ontology. Classes are based on the semantic frame, subclasses are based on the lexical entry, while documentation of classes and subclasses are based on the definition of the semantic frame and lexical entry from FrameNet. The proposed exclusion cyberbullying lexicon is arranged in alphabetical order and it contains 13 exclusion cyberbullying keywords with its definition and category. In the proposed exclusion cyberbullying lexicon, keyword, definition, and category represent the subclasses, documentation, and classes from the exclusion cyberbullying ontology respectively. The presence of exclusion cyberbullying lexicon can provide a reference for the social media users as well as for cyberbullying detection.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Proposing Construct for Organizational Agility Model in Malaysian Automotive Organization 马来西亚汽车企业组织敏捷性模型的构建
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073673
N. H. Hassan, N. Arshad
In recent Malaysia economic growth, manufacturing is one of stated industry that contributed high source of income for the country. Automotive industry is one of widely manufacturing category discussed by researchers due to its importance. Malaysia automotive organizations play important roles in representing Malaysian products and technologies. In achieving Industrial Revolution 4.0 it is really imperative for automotive organizations to be highly competitive by be responsive to their stakeholders. This research-in-progress investigates how, Information Technology Infrastructure Flexibility (ITIF), Learning orientation (LO), and organizational Agility (OA) are related. In obtaining the answer, this paper mainly discussed on how the constructs and items are identified, how reflective, formative or mixed construct is determined. These phases are important to quantitative research in order to avoid wrong specification of measurement model. This followed by empirical findings for all hypotheses. Empirical test for reflective and formative construct are using SmartPLS 3. The proposed model will assist IT and business managers to improve information technology infrastructure, develop learning programs, staff development, as well as responsive initiatives for organization.
在马来西亚最近的经济增长中,制造业是为国家贡献高收入来源的行业之一。汽车工业由于其重要性而成为研究人员广泛讨论的制造业类别之一。马来西亚汽车组织在代表马来西亚产品和技术方面发挥着重要作用。在实现工业革命4.0的过程中,汽车组织必须通过对利益相关者的响应来提高竞争力。这项正在进行的研究调查了信息技术基础设施灵活性(ITIF)、学习导向(LO)和组织敏捷性(OA)之间的关系。为了得到答案,本文主要讨论了如何识别构念和项目,如何确定反思构念、形成构念或混合构念。为了避免计量模型的错误规范,这些阶段对定量研究具有重要意义。接下来是所有假设的实证结果。反思性和形成性结构的实证检验使用SmartPLS 3。所建议的模型将帮助IT和业务经理改进信息技术基础设施,开发学习计划,员工发展,以及组织的响应计划。
{"title":"Proposing Construct for Organizational Agility Model in Malaysian Automotive Organization","authors":"N. H. Hassan, N. Arshad","doi":"10.1109/ICRIIS48246.2019.9073673","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073673","url":null,"abstract":"In recent Malaysia economic growth, manufacturing is one of stated industry that contributed high source of income for the country. Automotive industry is one of widely manufacturing category discussed by researchers due to its importance. Malaysia automotive organizations play important roles in representing Malaysian products and technologies. In achieving Industrial Revolution 4.0 it is really imperative for automotive organizations to be highly competitive by be responsive to their stakeholders. This research-in-progress investigates how, Information Technology Infrastructure Flexibility (ITIF), Learning orientation (LO), and organizational Agility (OA) are related. In obtaining the answer, this paper mainly discussed on how the constructs and items are identified, how reflective, formative or mixed construct is determined. These phases are important to quantitative research in order to avoid wrong specification of measurement model. This followed by empirical findings for all hypotheses. Empirical test for reflective and formative construct are using SmartPLS 3. The proposed model will assist IT and business managers to improve information technology infrastructure, develop learning programs, staff development, as well as responsive initiatives for organization.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131633776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UiTM Share Ride: Requirements Validation, Design and Development of a Campus Ride-Sharing Mobile Application UiTM共享乘车:校园共享乘车移动应用程序的需求验证,设计和开发
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073510
Kamalia Azma Kamaruddin, Nur Rozliana Mohd Rozlis
The excessive number of cars entering university campus and limitation of parking areas have resulted in difficulty of finding parking spaces for many university staff and students. It is a typical issue occurring in most of university campuses all around the world. Carpooling or ride-sharing is viewed as the practical approach to solve this problem. The suggestion to share rides will lessen the amount of vehicles entering university campuses thus reducing parking space problem and decrease fuel emission for a cleaner and healthier environment. Thus, development of a campus ride-sharing mobile application will be a good medium for university staff and students to share their rides and solve this pressing issue in many campuses. This research has attempted to validate the system requirements for UiTM Share Ride mobile application, followed by designing and developing the mobile application using Android platform for UiTM’s staff and students. Four phases have been undertaken in order to complete the research, which are preliminary study, requirements validation, user design, and followed by application construction. The outcome is a UiTM Share Ride mobile application, which can manage ride sharing requests among passengers and drivers in UiTM communities that will eventually solve the issue of congestion in the university campus.
进入大学校园的车辆过多,停车面积有限,导致许多大学教职员工和学生找不到停车位。这是世界上大多数大学校园中发生的一个典型问题。拼车或拼车被视为解决这一问题的实用方法。共享乘车的建议将减少进入大学校园的车辆数量,从而减少停车位问题,减少燃料排放,创造更清洁、更健康的环境。因此,开发校园拼车移动应用程序将成为大学员工和学生共享乘车的一个很好的媒介,并解决许多校园中的这一紧迫问题。本研究尝试验证了UiTM共享乘车移动应用的系统需求,然后设计和开发了基于Android平台的UiTM教职员工和学生移动应用。为了完成研究,我们进行了四个阶段,分别是初步研究、需求验证、用户设计和随后的应用程序构建。结果是一个UiTM共享乘车移动应用程序,它可以管理UiTM社区乘客和司机之间的乘车共享请求,最终解决大学校园的拥堵问题。
{"title":"UiTM Share Ride: Requirements Validation, Design and Development of a Campus Ride-Sharing Mobile Application","authors":"Kamalia Azma Kamaruddin, Nur Rozliana Mohd Rozlis","doi":"10.1109/ICRIIS48246.2019.9073510","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073510","url":null,"abstract":"The excessive number of cars entering university campus and limitation of parking areas have resulted in difficulty of finding parking spaces for many university staff and students. It is a typical issue occurring in most of university campuses all around the world. Carpooling or ride-sharing is viewed as the practical approach to solve this problem. The suggestion to share rides will lessen the amount of vehicles entering university campuses thus reducing parking space problem and decrease fuel emission for a cleaner and healthier environment. Thus, development of a campus ride-sharing mobile application will be a good medium for university staff and students to share their rides and solve this pressing issue in many campuses. This research has attempted to validate the system requirements for UiTM Share Ride mobile application, followed by designing and developing the mobile application using Android platform for UiTM’s staff and students. Four phases have been undertaken in order to complete the research, which are preliminary study, requirements validation, user design, and followed by application construction. The outcome is a UiTM Share Ride mobile application, which can manage ride sharing requests among passengers and drivers in UiTM communities that will eventually solve the issue of congestion in the university campus.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131695173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasibility of IoT Acceptance Among Malaysian Government Agencies Considering Security Factors 考虑安全因素,马来西亚政府机构接受物联网的可行性
Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073633
Siti Riniy Fariza Mohd Borhan, N. Maarop, N. H. Hassan, R. Yusoff, Ganthan Narayana Samy, N. Kamaruddin
The purpose of this study is to identify the factors influencing the users acceptance of IoT among Malaysian government agencies Thus, a conceptual model of secure acceptance of IoT implementation is proposed. Both human and security factors are considered in the formulation of this proposed model. In this study, a TAM model was chosen as the baseline model as TAM has been proved to significantly explain the user acceptance of IoT technology. A quantitative method was used as the research methodology occupying survey questionnaires which were distributed via online. Data were collected from 90 valid respondents among employees in Malaysian Government Agencies. The data analysis was executed using SmartPLS version 3.0. Based on the findings, four from eight postulated hypotheses yielded to be significant in explaining the acceptance of IoT in the government agencies setting and the factors are Expected Usefulness, Privacy Concern, Perceived Privacy Risk, and Perceived Security Protection. Overall, the research model can explain 65.2% of the variance in behavioral intention or the acceptance of IoT. This study can be useful in providing understanding regarding the factors that influence user acceptance of IoT from both human and security perspectives among Malaysian Government Agencies.
本研究的目的是确定影响马来西亚政府机构中用户接受物联网的因素,因此,提出了安全接受物联网实施的概念模型。在该模型的制定中考虑了人和安全因素。在本研究中,选择TAM模型作为基线模型,因为TAM已被证明可以显著解释用户对物联网技术的接受程度。采用定量方法作为研究方法,采用在线发放的调查问卷。数据收集自马来西亚政府机构雇员中的90名有效受访者。使用SmartPLS 3.0版本进行数据分析。根据研究结果,8个假设中的4个在解释政府机构对物联网的接受程度方面具有重要意义,这些因素是预期有用性、隐私关注、感知隐私风险和感知安全保护。总体而言,研究模型可以解释65.2%的行为意向或物联网接受度的差异。这项研究有助于从马来西亚政府机构的人力和安全角度了解影响用户接受物联网的因素。
{"title":"Feasibility of IoT Acceptance Among Malaysian Government Agencies Considering Security Factors","authors":"Siti Riniy Fariza Mohd Borhan, N. Maarop, N. H. Hassan, R. Yusoff, Ganthan Narayana Samy, N. Kamaruddin","doi":"10.1109/ICRIIS48246.2019.9073633","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073633","url":null,"abstract":"The purpose of this study is to identify the factors influencing the users acceptance of IoT among Malaysian government agencies Thus, a conceptual model of secure acceptance of IoT implementation is proposed. Both human and security factors are considered in the formulation of this proposed model. In this study, a TAM model was chosen as the baseline model as TAM has been proved to significantly explain the user acceptance of IoT technology. A quantitative method was used as the research methodology occupying survey questionnaires which were distributed via online. Data were collected from 90 valid respondents among employees in Malaysian Government Agencies. The data analysis was executed using SmartPLS version 3.0. Based on the findings, four from eight postulated hypotheses yielded to be significant in explaining the acceptance of IoT in the government agencies setting and the factors are Expected Usefulness, Privacy Concern, Perceived Privacy Risk, and Perceived Security Protection. Overall, the research model can explain 65.2% of the variance in behavioral intention or the acceptance of IoT. This study can be useful in providing understanding regarding the factors that influence user acceptance of IoT from both human and security perspectives among Malaysian Government Agencies.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1