Pub Date : 2023-11-29DOI: 10.5121/ijmit.2023.15401
Y. Tou, Chihiro Watanabe
Environmental, Social, and Governance (ESG) management is essential for transforming corporate financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to achieve the Sustainable Development Goals (SDGs). In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids challenging highly uncertain R&D activities and seeks more manageable endeavors. This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and necessitates the development of novel R&D capabilities for corporate R&D transformation strategies towards F + ESG optimization. Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through R&D. The analysis also highlights the significance of network externality effects, with a specific focus on Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies towards F + ESG optimization. The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth and scalability, specifically its ability to grow and expand, is accelerating high-level research and development by gaining the trust of stakeholders in the "synergy through R&D-driven ESG risk mitigation." Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the transformation of Japan's management system.
环境、社会和治理(ESG)管理对于将以财务业绩为导向的企业经营战略转变为财务(F)+ ESG 优化战略以实现可持续发展目标(SDGs)至关重要。在这一趋势下,ESG 风险的上升将企业分为两类。一类企业具有成长思维,热衷于学习,并通过研发(R&D)驱动的挑战来提升自己;另一类企业则以规避风险为特征,避免挑战高度不确定的研发活动,寻求更易于管理的努力。这种二元性凸显了企业研发战略在应对环境、社会和治理风险方面的复杂性,因此有必要开发新型研发能力,以实现企业研发战略向 F + ESG 优化的转型。在此前提下,本文利用可靠的企业 ESG 风险和品牌价值数据进行了实证分析,重点关注 100 家全球研发领先企业。本文分析了为降低环境、社会和公司治理风险而采取的研发和行动,并评估了通过研发实现环境、社会和公司治理优化的新功能的开发情况。分析还强调了网络外部效应的重要性,并特别关注了领先的研发公司亚马逊,为研发战略向 F + ESG 优化转型提供了启示。以亚马逊的活动为例,说明了利益相关者参与 F + ESG 优化的动力。通过分析发现,亚马逊的能力包括增长和可扩展性,特别是其增长和扩张的能力,通过赢得利益相关者对 "通过研发驱动的 ESG 风险缓解实现协同效应 "的信任,加速了高层次的研发。最后,作为这些举措的范例,本文讨论了亚马逊领导的气候承诺和日本管理系统的转型。
{"title":"Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusion of Diverse Knowledge","authors":"Y. Tou, Chihiro Watanabe","doi":"10.5121/ijmit.2023.15401","DOIUrl":"https://doi.org/10.5121/ijmit.2023.15401","url":null,"abstract":"Environmental, Social, and Governance (ESG) management is essential for transforming corporate financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to achieve the Sustainable Development Goals (SDGs). In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids challenging highly uncertain R&D activities and seeks more manageable endeavors. This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and necessitates the development of novel R&D capabilities for corporate R&D transformation strategies towards F + ESG optimization. Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through R&D. The analysis also highlights the significance of network externality effects, with a specific focus on Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies towards F + ESG optimization. The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth and scalability, specifically its ability to grow and expand, is accelerating high-level research and development by gaining the trust of stakeholders in the \"synergy through R&D-driven ESG risk mitigation.\" Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the transformation of Japan's management system.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139212008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-27DOI: 10.5121/ijmit.2023.15201
Gebremedhin Gebreyohans, David T. Croasdell, M. Meshesha
The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the research framework using survey data from 210 respondents. The collected data has been analyzed using Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude. However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI. The findings will benefit academic staff and university administrations.The study will also help academic staff enhance their knowledge-sharing practices.
{"title":"DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ACADEMIC STAFF","authors":"Gebremedhin Gebreyohans, David T. Croasdell, M. Meshesha","doi":"10.5121/ijmit.2023.15201","DOIUrl":"https://doi.org/10.5121/ijmit.2023.15201","url":null,"abstract":"The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the research framework using survey data from 210 respondents. The collected data has been analyzed using Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude. However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI. The findings will benefit academic staff and university administrations.The study will also help academic staff enhance their knowledge-sharing practices.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"279 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123721492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-27DOI: 10.5121/ijmit.2023.15203
A. Nagamatsu, Y. Tou, C. Watanabe
IT (Information and Communication Technology) companies are facing the dilemma of decreasing productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate performance. The results, using sports prosthetics as a case study and using patents as a proxy variable, confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained through M&A is effective for creating new innovations.
{"title":"EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIOD","authors":"A. Nagamatsu, Y. Tou, C. Watanabe","doi":"10.5121/ijmit.2023.15203","DOIUrl":"https://doi.org/10.5121/ijmit.2023.15203","url":null,"abstract":"IT (Information and Communication Technology) companies are facing the dilemma of decreasing productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate performance. The results, using sports prosthetics as a case study and using patents as a proxy variable, confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained through M&A is effective for creating new innovations.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"396 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114919092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-27DOI: 10.5121/ijmit.2023.15202
Harsha Vijayakumar
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve efficiency and profitability. One area where AI is proving particularly impactful is in service operations management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business processes, such as customer service, sales, marketing, and supply chain management. The rapid development of Artificial Intelligence has prompted many changes in the field of Information Technology (IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT build optimized business resilience by creating value in complex and ever-changing environments as product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation tool. The paper presents a case study of a company that implemented AI-powered service operations (AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can significantly improve service delivery, reduce response times, and increase customer satisfaction. Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing labor costs and minimizing downtime.
{"title":"TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUE","authors":"Harsha Vijayakumar","doi":"10.5121/ijmit.2023.15202","DOIUrl":"https://doi.org/10.5121/ijmit.2023.15202","url":null,"abstract":"Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve efficiency and profitability. One area where AI is proving particularly impactful is in service operations management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business processes, such as customer service, sales, marketing, and supply chain management. The rapid development of Artificial Intelligence has prompted many changes in the field of Information Technology (IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT build optimized business resilience by creating value in complex and ever-changing environments as product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation tool. The paper presents a case study of a company that implemented AI-powered service operations (AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can significantly improve service delivery, reduce response times, and increase customer satisfaction. Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing labor costs and minimizing downtime.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-30DOI: 10.5121/ijmit.2022.14401
Birkinesh Woldeyohannes, M. Gaynor, Temtim Assefa
Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.
{"title":"Inclusive Entrepreneurship in Handling Competing Institutional Logics for DHIS2 Adoption in Ethiopian Public Health Care Context","authors":"Birkinesh Woldeyohannes, M. Gaynor, Temtim Assefa","doi":"10.5121/ijmit.2022.14401","DOIUrl":"https://doi.org/10.5121/ijmit.2022.14401","url":null,"abstract":"Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"34 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116595574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.5121/ijmit.2022.14302
Kummari Vikas, Thipparthi Rajabrahmam, Ponnam Venu, S. Hariharan
With an increasing number of extreme events and complexity, more alarms are being used to monitor control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It is important to have a rigid surveillance that should guarantee protection from any sought of hazard. Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO algorithm, it divides an image from the video into grid system and each grid detects an object within itself.
{"title":"Deep Learning Approach for Event Monitoring System","authors":"Kummari Vikas, Thipparthi Rajabrahmam, Ponnam Venu, S. Hariharan","doi":"10.5121/ijmit.2022.14302","DOIUrl":"https://doi.org/10.5121/ijmit.2022.14302","url":null,"abstract":"With an increasing number of extreme events and complexity, more alarms are being used to monitor control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It is important to have a rigid surveillance that should guarantee protection from any sought of hazard. Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO algorithm, it divides an image from the video into grid system and each grid detects an object within itself.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"389 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123513638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.5121/ijmit.2022.14301
Mathieu K. Kourouma, Ratana Warren, Lynette Jackson, Deidra S. Atkins-Ball, Raven Dora
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course delivery. We investigate and describe different modes of course delivery that maintain the integrity of teaching and learning. This paper answers to the research questions: 1) What course delivery method our academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3) How courses should be taught to provide student learning outcomes? Using the Learning Environment Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good course design and implementation are key components of instructional alignment. Furthermore, we demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid modes and describe our proposed enhancements to LEML.
{"title":"Multimodal Course Design and Implementation using LEML and LMS for Instructional Alignment","authors":"Mathieu K. Kourouma, Ratana Warren, Lynette Jackson, Deidra S. Atkins-Ball, Raven Dora","doi":"10.5121/ijmit.2022.14301","DOIUrl":"https://doi.org/10.5121/ijmit.2022.14301","url":null,"abstract":"Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course delivery. We investigate and describe different modes of course delivery that maintain the integrity of teaching and learning. This paper answers to the research questions: 1) What course delivery method our academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3) How courses should be taught to provide student learning outcomes? Using the Learning Environment Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good course design and implementation are key components of instructional alignment. Furthermore, we demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid modes and describe our proposed enhancements to LEML.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"65 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-28DOI: 10.5121/ijmit.2022.14102
Long Lingxiao, Fan Yipeng
This paper will provide a novel empirical study for the relationship between network media attention and green technology innovation and examine how network media attention can ease financing constraints. It collected data from listed companies in China's heavy pollution industry and performed rigorous regression analysis, in order to innovatively explore the environmental governance functions of the media. It found that network media attention significantly promotes green technology innovation. By analyzing the inner mechanism further, it found that network media attention can promote green innovation by easing financing constraints. Besides, network media attention has a significant positive impact on green invention patents while not affecting green utility model patents.
{"title":"Network Media Attention and Green Technology Innovation","authors":"Long Lingxiao, Fan Yipeng","doi":"10.5121/ijmit.2022.14102","DOIUrl":"https://doi.org/10.5121/ijmit.2022.14102","url":null,"abstract":"This paper will provide a novel empirical study for the relationship between network media attention and green technology innovation and examine how network media attention can ease financing constraints. It collected data from listed companies in China's heavy pollution industry and performed rigorous regression analysis, in order to innovatively explore the environmental governance functions of the media. It found that network media attention significantly promotes green technology innovation. By analyzing the inner mechanism further, it found that network media attention can promote green innovation by easing financing constraints. Besides, network media attention has a significant positive impact on green invention patents while not affecting green utility model patents.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123577135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-28DOI: 10.5121/ijmit.2022.14101
Liaw Geok Pheng, T. C. Chuan, Mac Foong, Norzihani Binti Yusof, Dalbina Kaur A/P Jagjeet Singh
It is important for investors to understand stock trends and market conditions before trading stocks. Both these capabilities are very important for an investor in order to obtain maximized profit and minimized losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends and market conditions. Technical analysis helps to understand stock prices behavior with regards to past trends, the signals given by indicators and the major turning points of the market price. This paper reviews the stock trend predictions with a combination of the effective multi technical indicator strategy to increase investment performance by taking into account the global performance and the proposed combination of effective multi technical indicator strategy model.
{"title":"A Review of Stock Trend Prediction with Combination of Effective Multi Technical Indicator Strategy","authors":"Liaw Geok Pheng, T. C. Chuan, Mac Foong, Norzihani Binti Yusof, Dalbina Kaur A/P Jagjeet Singh","doi":"10.5121/ijmit.2022.14101","DOIUrl":"https://doi.org/10.5121/ijmit.2022.14101","url":null,"abstract":"It is important for investors to understand stock trends and market conditions before trading stocks. Both these capabilities are very important for an investor in order to obtain maximized profit and minimized losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends and market conditions. Technical analysis helps to understand stock prices behavior with regards to past trends, the signals given by indicators and the major turning points of the market price. This paper reviews the stock trend predictions with a combination of the effective multi technical indicator strategy to increase investment performance by taking into account the global performance and the proposed combination of effective multi technical indicator strategy model.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"853 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-30DOI: 10.5121/ijmit.2021.13403
Paul G. Cheney, Ian R. McAndrew
This paper discusses the strengths and weaknesses of proper engineering and life cycle management on higher level cyber security operations. Rushing innovation and increasing profits undermines the foundations need to operate and create secure stability in IT based companies. This research argues how it must be considered and how effective engineering processes greatly add to security even post implementation.
{"title":"Engineering Life Cycle Enables Penetration Testing and Cyber Operations","authors":"Paul G. Cheney, Ian R. McAndrew","doi":"10.5121/ijmit.2021.13403","DOIUrl":"https://doi.org/10.5121/ijmit.2021.13403","url":null,"abstract":"This paper discusses the strengths and weaknesses of proper engineering and life cycle management on higher level cyber security operations. Rushing innovation and increasing profits undermines the foundations need to operate and create secure stability in IT based companies. This research argues how it must be considered and how effective engineering processes greatly add to security even post implementation.","PeriodicalId":335930,"journal":{"name":"International Journal of Managing Information Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131777208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}