Pub Date : 2019-01-01DOI: 10.4018/IJISSC.2019010102
Lucija Gjurkovikj, Toni Malinovski
When organizations analyze and significantly change their business processes with latest information and communication technology (ICT) in mind, they can reduce process time and cost, as well as increase efficiency and output quality. This study elaborates an ICT-enabled reengineering project in the Agency for audio and audiovisual media services in the Republic of Macedonia for the program monitoring process. It aims to investigate the motivation to use ICT as a way to shape the process redesign and find associations among ICT adaptation, process reengineering, organizational growth and efficiency. Hence, the new process structure can help the agency deliver greater public value while meeting its strategic goals to protect citizens' interests in the area of audio and audiovisual media services. It provides an example of a case study that surpasses standard industrial report to an article that contains valuable information that companies, especially in the public sector, can use in replicating experiences while undertaking similar BPR initiatives.
{"title":"Information and Communication Technology Driven Process Reengineering for Content Monitoring: A Case From the Public Sector in Macedonia","authors":"Lucija Gjurkovikj, Toni Malinovski","doi":"10.4018/IJISSC.2019010102","DOIUrl":"https://doi.org/10.4018/IJISSC.2019010102","url":null,"abstract":"When organizations analyze and significantly change their business processes with latest information and communication technology (ICT) in mind, they can reduce process time and cost, as well as increase efficiency and output quality. This study elaborates an ICT-enabled reengineering project in the Agency for audio and audiovisual media services in the Republic of Macedonia for the program monitoring process. It aims to investigate the motivation to use ICT as a way to shape the process redesign and find associations among ICT adaptation, process reengineering, organizational growth and efficiency. Hence, the new process structure can help the agency deliver greater public value while meeting its strategic goals to protect citizens' interests in the area of audio and audiovisual media services. It provides an example of a case study that surpasses standard industrial report to an article that contains valuable information that companies, especially in the public sector, can use in replicating experiences while undertaking similar BPR initiatives.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131053348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.4018/IJISSC.2019010103
Bryon Balint
From their inception, electronic social networks (ESNs) have held the potential to either (1) expose individuals to a greater diversity of beliefs and interests by removing geographical barriers to communication; or (2) act as “feedback loops” by facilitating relationships and communication among like-minded individuals. In this survey study, the author will examine changes in communication behaviors and perceptions on Facebook from 2013 to 2017. The findings conclude that individuals with lower self-esteem have become less willing to share their views on Facebook, perceive a higher number of negative experiences, and spend less time communicating and more time passively consuming content. The same behavioral changes are found when individuals believe that fewer of their online “friends” have similar beliefs, and when individuals are more prone to “unfriending” others. General comfort in sharing views online is associated with a higher willingness to share views and communicate on Facebook, but also more negative experiences.
{"title":"The Impact of Similarity and Self-Esteem on Facebook Behaviors, Perceptions, and Attitudes","authors":"Bryon Balint","doi":"10.4018/IJISSC.2019010103","DOIUrl":"https://doi.org/10.4018/IJISSC.2019010103","url":null,"abstract":"From their inception, electronic social networks (ESNs) have held the potential to either (1) expose individuals to a greater diversity of beliefs and interests by removing geographical barriers to communication; or (2) act as “feedback loops” by facilitating relationships and communication among like-minded individuals. In this survey study, the author will examine changes in communication behaviors and perceptions on Facebook from 2013 to 2017. The findings conclude that individuals with lower self-esteem have become less willing to share their views on Facebook, perceive a higher number of negative experiences, and spend less time communicating and more time passively consuming content. The same behavioral changes are found when individuals believe that fewer of their online “friends” have similar beliefs, and when individuals are more prone to “unfriending” others. General comfort in sharing views online is associated with a higher willingness to share views and communicate on Facebook, but also more negative experiences.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128973553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.4018/IJISSC.2018100103
Yuval Cohen, S. Rozenes
This article is based on an analysis of empirical data on various service demand patterns such as electricity and water consumption, banks, hospitals, communications and others. The research findings show similar patterns of demand for various different services in different parts of the world. The patterns reflect the relevant population's level of activity. Daytime services have typical peak hours during a workday. This is nicely explained by what the authors call the ‘Demand Biorhythm.' Many daytime services experience a double hump demand, whereas in the US the service demand may also have a single hump. The analysis shows a striking demand similarity of the same weekdays, and a significant difference between the demand of workdays and weekend days. Also, the first day of the week always experiences a demand surge. The article discusses ways to efficiently plan the service workforce and capacity based on the relevant demand patterns.
{"title":"Demand Biorhythm Estimation for Setting Service Capacity","authors":"Yuval Cohen, S. Rozenes","doi":"10.4018/IJISSC.2018100103","DOIUrl":"https://doi.org/10.4018/IJISSC.2018100103","url":null,"abstract":"This article is based on an analysis of empirical data on various service demand patterns such as electricity and water consumption, banks, hospitals, communications and others. The research findings show similar patterns of demand for various different services in different parts of the world. The patterns reflect the relevant population's level of activity. Daytime services have typical peak hours during a workday. This is nicely explained by what the authors call the ‘Demand Biorhythm.' Many daytime services experience a double hump demand, whereas in the US the service demand may also have a single hump. The analysis shows a striking demand similarity of the same weekdays, and a significant difference between the demand of workdays and weekend days. Also, the first day of the week always experiences a demand surge. The article discusses ways to efficiently plan the service workforce and capacity based on the relevant demand patterns.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.4018/IJISSC.2018100104
I. Ullah, Y. H. Mughal, Mahad Jehangir
The aim of this article is to find the relationship between job characteristics and performance. From a total of 200 employees of a company, 100 were selected as sample of this study. Bivariate correlation and linear regression was used to test the hypotheses. It was found that all the variables were significantly related with each other, and regression results shows variance upon performance of employees.
{"title":"Job Characteristic Model and Relationship with Employee Performance: Case Study of Qurtuba University","authors":"I. Ullah, Y. H. Mughal, Mahad Jehangir","doi":"10.4018/IJISSC.2018100104","DOIUrl":"https://doi.org/10.4018/IJISSC.2018100104","url":null,"abstract":"The aim of this article is to find the relationship between job characteristics and performance. From a total of 200 employees of a company, 100 were selected as sample of this study. Bivariate correlation and linear regression was used to test the hypotheses. It was found that all the variables were significantly related with each other, and regression results shows variance upon performance of employees.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130274306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.4018/IJISSC.2018100105
J. S. Yarbrough, Mary L. Lind
Measuring the state of IT alignment with business strategy is gradually becoming less elusive but practical approaches continue to be difficult to propose and execute. The results of this study indicate that higher degrees of IT strategic alignment with business occurs in Prospector and Analyzer types. Given the context of the STM model and the inclination of business strategy to center on a single type, these two models are most effective in generating IT capability over time. Defender STM types tend to lead to lower IT capability and low levels of alignment. It is recommended that the concept of IT alignment is as a function of information technology management, and the idea of making alignment solely the responsibility of the Chief Information Officer (CIO), fails to reach the goals of alignment, which requires strategic direction from a business that matches a Prospector or Analyzer type.
{"title":"The Effects of Strategic Typology Model and Strategic Alignment on the Delivery Capability of an IT Organization","authors":"J. S. Yarbrough, Mary L. Lind","doi":"10.4018/IJISSC.2018100105","DOIUrl":"https://doi.org/10.4018/IJISSC.2018100105","url":null,"abstract":"Measuring the state of IT alignment with business strategy is gradually becoming less elusive but practical approaches continue to be difficult to propose and execute. The results of this study indicate that higher degrees of IT strategic alignment with business occurs in Prospector and Analyzer types. Given the context of the STM model and the inclination of business strategy to center on a single type, these two models are most effective in generating IT capability over time. Defender STM types tend to lead to lower IT capability and low levels of alignment. It is recommended that the concept of IT alignment is as a function of information technology management, and the idea of making alignment solely the responsibility of the Chief Information Officer (CIO), fails to reach the goals of alignment, which requires strategic direction from a business that matches a Prospector or Analyzer type.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116250512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.4018/IJISSC.2018100101
J. Halsall, Elizabeth F. Caldwell
Social mobility is at the forefront of the British Government's plans to improve the lives of the most deprived groups in society. Since the election of the New Labour government in May 1997, consecutive governments have championed the concept of social mobility. The fundamental aim of social mobility is to tackle social barriers for disadvantaged groups in education and employment. However, within the social sciences there has been a lack of critical discussion regarding the theorisation of social mobility within the context of higher education (HE). In recent times higher education research has instead had a greater focus on pedagogy. The aim of this review is to critically explore past and current debates on social mobility, and the importance the concept has in the higher education sector. In this paper special reference will be made to the new UK government higher education policy on the Teaching Excellence Framework (TEF).
{"title":"Social Mobility in the UK's Higher Education Sector: A Critical Review","authors":"J. Halsall, Elizabeth F. Caldwell","doi":"10.4018/IJISSC.2018100101","DOIUrl":"https://doi.org/10.4018/IJISSC.2018100101","url":null,"abstract":"Social mobility is at the forefront of the British Government's plans to improve the lives of the most deprived groups in society. Since the election of the New Labour government in May 1997, consecutive governments have championed the concept of social mobility. The fundamental aim of social mobility is to tackle social barriers for disadvantaged groups in education and employment. However, within the social sciences there has been a lack of critical discussion regarding the theorisation of social mobility within the context of higher education (HE). In recent times higher education research has instead had a greater focus on pedagogy. The aim of this review is to critically explore past and current debates on social mobility, and the importance the concept has in the higher education sector. In this paper special reference will be made to the new UK government higher education policy on the Teaching Excellence Framework (TEF).","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125415318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-15DOI: 10.4018/IJISSC.2018100102
Rauno Rusko
Hypertext organization perspective (Nonaka, 1994) is focused on knowledge creation and transfer between the main organization and project organization. However, initial hypertext organization perspectives did not take into the account the role of multi-membership in the project work. This article studies hypertext organization in the context of the multi-project case basing the analysis on the viewpoints of project-as-practice and auto-ethnography with the context of University. Auto-ethnography reveals the features of knowledge transfer in the multi-membership. Knowledge transfer of projects is not only based on the linkages between the separate education unit, the research unit and the unit of project activities, but also based on individual attitudes, features and capabilities on the multi-membership level. This study shows, instead of the externalization of knowledge, that plenty of knowledge creation activities - associated with hypertext organization - remain behind the individual actors in the form of tacit knowledge.
{"title":"Knowledge Creation in the Hypertext Organizations: Multi-Membership Practices in the University","authors":"Rauno Rusko","doi":"10.4018/IJISSC.2018100102","DOIUrl":"https://doi.org/10.4018/IJISSC.2018100102","url":null,"abstract":"Hypertext organization perspective (Nonaka, 1994) is focused on knowledge creation and transfer between the main organization and project organization. However, initial hypertext organization perspectives did not take into the account the role of multi-membership in the project work. This article studies hypertext organization in the context of the multi-project case basing the analysis on the viewpoints of project-as-practice and auto-ethnography with the context of University. Auto-ethnography reveals the features of knowledge transfer in the multi-membership. Knowledge transfer of projects is not only based on the linkages between the separate education unit, the research unit and the unit of project activities, but also based on individual attitudes, features and capabilities on the multi-membership level. This study shows, instead of the externalization of knowledge, that plenty of knowledge creation activities - associated with hypertext organization - remain behind the individual actors in the form of tacit knowledge.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114056689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.4018/IJISSC.2018070104
B. Galli
This article describes how healthcare and IT are combatting the ethical implications of electronic health records (EHRs) in order to make them adopted by over 90% of small practices. There is a lack of trust in EHRs and uneasiness about what they will accomplish. Furthermore, security concerns have become more prevalent as a result of increased hacker activity. The objective of this article is to analyze these ethical issues in an effort to eliminate them as a hinderance to EHR implementation. As of now, 98% of all hospitals use EHRs. Between 2009 and 2015, the government allocated money and resources for incentive programs to get EHRs into every healthcare providers' office. During this time period, over $800 million dollars facilitated EHR implementation. Using this as a tool EHRs negative perception can be revitalized and combated with the meaningful use program. This article will highlight the ethical implications of EHRs and suggest ways in which to avoid them to make EHRs available in every healthcare provider.
{"title":"Ethics of Electronic Health Record Systems","authors":"B. Galli","doi":"10.4018/IJISSC.2018070104","DOIUrl":"https://doi.org/10.4018/IJISSC.2018070104","url":null,"abstract":"This article describes how healthcare and IT are combatting the ethical implications of electronic health records (EHRs) in order to make them adopted by over 90% of small practices. There is a lack of trust in EHRs and uneasiness about what they will accomplish. Furthermore, security concerns have become more prevalent as a result of increased hacker activity. The objective of this article is to analyze these ethical issues in an effort to eliminate them as a hinderance to EHR implementation. As of now, 98% of all hospitals use EHRs. Between 2009 and 2015, the government allocated money and resources for incentive programs to get EHRs into every healthcare providers' office. During this time period, over $800 million dollars facilitated EHR implementation. Using this as a tool EHRs negative perception can be revitalized and combated with the meaningful use program. This article will highlight the ethical implications of EHRs and suggest ways in which to avoid them to make EHRs available in every healthcare provider.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.4018/IJISSC.2018070103
Carlos Carvalho, Sara Paiva
This article describes how social responsibility and social inclusion are matters that are on the agenda world-wide. Social exclusion exists at various levels and in this article, the authors address the illegal parking at places reserved for disabled people. They developed a prototype that allows, through a backend, a camera and a smartphone, to geo-reference parking spaces for disabled people in an entity (such as a school, shopping mall or any parking lot) and be advised when someone parks in that place and did not have a parking license. This required the development of a backend and a system that allows it to notify the appropriate responder whenever an illegal parking takes place. To detect parked cars, the authors use an IP Camera that captures photos every 3 minutes and send it to a cron job to be processed with the OpenALPR API that can recognize Portuguese, Spanish, Swiss, and French license plates. From this present framework, all tests allowed the authors to conclude the best location for cameras and the adjustments that were needed to avoid false positives.
{"title":"Potentiate Social Inclusion through Detecting Illegal Parking in Places for Disabled People","authors":"Carlos Carvalho, Sara Paiva","doi":"10.4018/IJISSC.2018070103","DOIUrl":"https://doi.org/10.4018/IJISSC.2018070103","url":null,"abstract":"This article describes how social responsibility and social inclusion are matters that are on the agenda world-wide. Social exclusion exists at various levels and in this article, the authors address the illegal parking at places reserved for disabled people. They developed a prototype that allows, through a backend, a camera and a smartphone, to geo-reference parking spaces for disabled people in an entity (such as a school, shopping mall or any parking lot) and be advised when someone parks in that place and did not have a parking license. This required the development of a backend and a system that allows it to notify the appropriate responder whenever an illegal parking takes place. To detect parked cars, the authors use an IP Camera that captures photos every 3 minutes and send it to a cron job to be processed with the OpenALPR API that can recognize Portuguese, Spanish, Swiss, and French license plates. From this present framework, all tests allowed the authors to conclude the best location for cameras and the adjustments that were needed to avoid false positives.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.4018/IJISSC.2018070105
Jianyu Ma, Mingzhai Geng, Yun Chu, J. Chen
In this article, the authors examine the distribution of the stock returns for the acquiring firm and the corresponding market index. They find that significant non-normal distributions exist in a large number of acquiring firms. The authors use two robust regressions to examine the reliability of the standard OLS market models and find that no significant abnormal gain or loss in the selected windows, when all sample deals are included for analysis. However, positive abnormal returns appear in almost all selected windows when analysing deals in financial service industry, and negative abnormal returns appear in almost all selected windows when analysing deals in non-financial industries. Selection of the model and formation of the sample affect the results.
{"title":"Wealth of Merger and Acquisition on Acquiring Firms in Brazil","authors":"Jianyu Ma, Mingzhai Geng, Yun Chu, J. Chen","doi":"10.4018/IJISSC.2018070105","DOIUrl":"https://doi.org/10.4018/IJISSC.2018070105","url":null,"abstract":"In this article, the authors examine the distribution of the stock returns for the acquiring firm and the corresponding market index. They find that significant non-normal distributions exist in a large number of acquiring firms. The authors use two robust regressions to examine the reliability of the standard OLS market models and find that no significant abnormal gain or loss in the selected windows, when all sample deals are included for analysis. However, positive abnormal returns appear in almost all selected windows when analysing deals in financial service industry, and negative abnormal returns appear in almost all selected windows when analysing deals in non-financial industries. Selection of the model and formation of the sample affect the results.","PeriodicalId":371573,"journal":{"name":"Int. J. Inf. Syst. Soc. Chang.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}