首页 > 最新文献

2017 International Conference on Research and Innovation in Information Systems (ICRIIS)最新文献

英文 中文
A firm and individual characteristic-based prediction model for E2.0 continuance adoption 基于企业和个体特征的E2.0持续采用预测模型
Qiong Jia, F. Xin, Yue Guo, S. Barnes
Enterprise-level 2.0 applications (E2.0) built on cloud computing Web 2.0 infrastructure offer promising new business models. However, recent studies show that most E2.0 firms experience a low free-to-paid conversion rate. Based on accumulated archival data and literature on predictive models and data mining, in this paper, we develop a logit model to predict the likelihood of E2.0 user continuance. The proposed model includes firm-specific and individual characteristics and estimates coefficients relating predictor variables to E2.0 continuance decisions. The sample includes information on 575 paid customers (i.e. firms) with 65,407 individual users and 2,286 previous customers with 99,807 individual users from 2011-2016. The resulting model can help business managers of E2.0 service providers to identify effectively reliable customers, optimize their sales efforts, and increase the free-to-paid conversion rate.
构建在云计算Web 2.0基础设施上的企业级2.0应用程序(E2.0)提供了有前景的新业务模型。然而,最近的研究表明,大多数E2.0公司的免费付费转化率很低。本文基于积累的档案数据、预测模型和数据挖掘方面的文献,建立了预测E2.0用户延续可能性的logit模型。提出的模型包括企业特定和个体特征,并估计与E2.0延续决策相关的预测变量的系数。样本包括2011-2016年间575个付费客户(即公司)的65,407个个人用户和2,286个老客户的99,807个个人用户的信息。由此得出的模型可以帮助E2.0服务提供商的业务经理有效地识别可靠的客户,优化他们的销售工作,提高免费付费的转化率。
{"title":"A firm and individual characteristic-based prediction model for E2.0 continuance adoption","authors":"Qiong Jia, F. Xin, Yue Guo, S. Barnes","doi":"10.1109/ICRIIS.2017.8002483","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002483","url":null,"abstract":"Enterprise-level 2.0 applications (E2.0) built on cloud computing Web 2.0 infrastructure offer promising new business models. However, recent studies show that most E2.0 firms experience a low free-to-paid conversion rate. Based on accumulated archival data and literature on predictive models and data mining, in this paper, we develop a logit model to predict the likelihood of E2.0 user continuance. The proposed model includes firm-specific and individual characteristics and estimates coefficients relating predictor variables to E2.0 continuance decisions. The sample includes information on 575 paid customers (i.e. firms) with 65,407 individual users and 2,286 previous customers with 99,807 individual users from 2011-2016. The resulting model can help business managers of E2.0 service providers to identify effectively reliable customers, optimize their sales efforts, and increase the free-to-paid conversion rate.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Healthcare employees' perception on information privacy concerns 医疗保健员工对信息隐私问题的看法
Fiza Abdul Rahim, Z. Ismail, Ganthan Narayana Samy
Healthcare organisations process massive amount of electronic medical records (EMR) utilised by their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees' concerns on privacy in the use of EMR. The purpose of this paper is to identify the factors that influence information privacy concerns (IPC), subsequently to design and evaluate the proposed model. An explanatory study was employed in the research with a Malaysian hospital under the Statutory Body as a case study. The unit of analysis comprised of healthcare employees. The quantitative data were analysed using Structural Equation Modeling (SEM), ascertained only privacy awareness was positively related to IPC and also mediate the relationship between privacy policy and IPC, demonstrating the significance of privacy policy in elevating privacy awareness. Hence, this study contributed by validating IPC in Malaysian healthcare setting, subsequently facilitates the healthcare organisations to understand IPC from employees' perspective in ensuring the compliance with Personal Data Protection Act 2010. In addition, healthcare organisations should deem upon inculcating pertinent awareness initiatives among their employees in upholding IPC in the use of EMR.
医疗保健组织处理员工使用的大量电子医疗记录(EMR)。医疗保健员工获得了访问EMR中敏感和有价值的患者信息的特权,可能会造成隐私泄露,从而导致有害后果。因此,必须特别关注医疗保健员工在使用电子病历时对隐私的关注。本文的目的是识别影响信息隐私关注(IPC)的因素,随后设计和评估所提出的模型。在研究中,法定机构下属的一家马来西亚医院采用了解释性研究作为案例研究。分析单元由医护人员组成。利用结构方程模型(SEM)对定量数据进行分析,发现只有隐私意识与IPC呈正相关,并且隐私政策与IPC之间存在中介关系,说明隐私政策在提升隐私意识方面具有重要意义。因此,本研究通过在马来西亚医疗保健环境中验证IPC做出了贡献,随后促进医疗保健组织从员工的角度理解IPC,以确保遵守2010年个人数据保护法。此外,医疗机构应该考虑在员工中灌输相关的意识倡议,在使用电子病历时维护IPC。
{"title":"Healthcare employees' perception on information privacy concerns","authors":"Fiza Abdul Rahim, Z. Ismail, Ganthan Narayana Samy","doi":"10.1109/ICRIIS.2017.8002498","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002498","url":null,"abstract":"Healthcare organisations process massive amount of electronic medical records (EMR) utilised by their employees. Having given privileged access to sensitive and valuable patient information in the EMR, healthcare employees may cause privacy breaches, which may lead to detrimental consequences. Therefore, it is vital to impose particular attention to healthcare employees' concerns on privacy in the use of EMR. The purpose of this paper is to identify the factors that influence information privacy concerns (IPC), subsequently to design and evaluate the proposed model. An explanatory study was employed in the research with a Malaysian hospital under the Statutory Body as a case study. The unit of analysis comprised of healthcare employees. The quantitative data were analysed using Structural Equation Modeling (SEM), ascertained only privacy awareness was positively related to IPC and also mediate the relationship between privacy policy and IPC, demonstrating the significance of privacy policy in elevating privacy awareness. Hence, this study contributed by validating IPC in Malaysian healthcare setting, subsequently facilitates the healthcare organisations to understand IPC from employees' perspective in ensuring the compliance with Personal Data Protection Act 2010. In addition, healthcare organisations should deem upon inculcating pertinent awareness initiatives among their employees in upholding IPC in the use of EMR.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Understanding knowledge management behavior from a social exchange perspective 从社会交换的角度理解知识管理行为
C. Hsu, Hui-Tzu Min, S. Chou
This study draws on dedication/constraint mechanisms of social exchange theory to understand how knowledge outcomes are formed in relational virtual communities (RVCs). We propose a model to explain how knowledge outcomes are affected by interpersonal relationship development, which is in turn affected by information technology (IT)-supported environments. We conceptualize interpersonal relationship as relationship rewards and guanxi, and IT-supported environments as presence and community involvement. The proposed model was validated through empirical data. Our results support this model. We provide discussion of these results.
本研究利用社会交换理论中的奉献/约束机制来理解关系虚拟社区(RVCs)中知识成果的形成过程。我们提出了一个模型来解释知识成果如何受到人际关系发展的影响,而人际关系发展反过来又受到信息技术支持环境的影响。我们将人际关系定义为关系奖励和关系,将it支持的环境定义为存在感和社区参与。通过实证数据验证了该模型的有效性。我们的结果支持这个模型。我们提供对这些结果的讨论。
{"title":"Understanding knowledge management behavior from a social exchange perspective","authors":"C. Hsu, Hui-Tzu Min, S. Chou","doi":"10.1109/ICRIIS.2017.8002492","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002492","url":null,"abstract":"This study draws on dedication/constraint mechanisms of social exchange theory to understand how knowledge outcomes are formed in relational virtual communities (RVCs). We propose a model to explain how knowledge outcomes are affected by interpersonal relationship development, which is in turn affected by information technology (IT)-supported environments. We conceptualize interpersonal relationship as relationship rewards and guanxi, and IT-supported environments as presence and community involvement. The proposed model was validated through empirical data. Our results support this model. We provide discussion of these results.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A systematic literature review: Information security culture 系统的文献综述:信息安全文化
Amjad Mahfuth, S. Yussof, Asmidar Abu Baker, N. Ali
Human behavior inside organizations is considered the main threat to organizations. Moreover, in information security the human element consider the most of weakest link in general. Therefore it is crucial to create an information security culture to protect the organization's assets from inside and to influence employees' security behavior. This paper focuses on identifying the definitions and frameworks for establishing and maintaining information security culture inside organizations. It presents work have been done to conduct a systematic literature review of papers published on information security culture from 2003 to 2016. The review identified 68 papers that focus on this area, 18 of which propose an information security culture framework. An analysis of these papers indicate there is a positive relationship between levels of knowledge and how employees behave. The level of knowledge significantly affects information security behavior and should be considered as a critical factor in the effectiveness of information security culture and in any further work that is carried out on information security culture. Therefore, there is a need for more studies to identity the security knowledge that needs to be incorporated into organizations and to find instances of best practice for building an information security culture within organizations.
组织内部的人类行为被认为是对组织的主要威胁。此外,在信息安全中,人的因素通常被认为是最薄弱的环节。因此,创建一种信息安全文化来保护组织的内部资产并影响员工的安全行为是至关重要的。本文着重于确定在组织内部建立和维护信息安全文化的定义和框架。它介绍了已经完成的工作,对2003年至2016年发表的信息安全文化论文进行了系统的文献综述。审查确定了68篇论文关注这一领域,其中18篇提出了信息安全文化框架。对这些论文的分析表明,知识水平与员工行为之间存在正相关关系。知识水平对信息安全行为有显著影响,应被视为信息安全文化有效性的关键因素,并应被视为开展信息安全文化的任何进一步工作的关键因素。因此,有必要进行更多的研究,以确定需要纳入组织的安全知识,并找到在组织内构建信息安全文化的最佳实践实例。
{"title":"A systematic literature review: Information security culture","authors":"Amjad Mahfuth, S. Yussof, Asmidar Abu Baker, N. Ali","doi":"10.1109/ICRIIS.2017.8002442","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002442","url":null,"abstract":"Human behavior inside organizations is considered the main threat to organizations. Moreover, in information security the human element consider the most of weakest link in general. Therefore it is crucial to create an information security culture to protect the organization's assets from inside and to influence employees' security behavior. This paper focuses on identifying the definitions and frameworks for establishing and maintaining information security culture inside organizations. It presents work have been done to conduct a systematic literature review of papers published on information security culture from 2003 to 2016. The review identified 68 papers that focus on this area, 18 of which propose an information security culture framework. An analysis of these papers indicate there is a positive relationship between levels of knowledge and how employees behave. The level of knowledge significantly affects information security behavior and should be considered as a critical factor in the effectiveness of information security culture and in any further work that is carried out on information security culture. Therefore, there is a need for more studies to identity the security knowledge that needs to be incorporated into organizations and to find instances of best practice for building an information security culture within organizations.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125543581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Exploring developers' understanding on Building Information Modelling (BIM) and its impact on Return on Investment (ROI) 探讨开发商对建筑信息模型(BIM)的理解及其对投资回报率的影响
A. Latiffi, N. H. Tai
Building Information Modelling (BIM) is the current trend in the construction industry globally, and Malaysia, is not an exception too. BIM has been in Malaysia for the past ten (10) years, and in the future, BIM will be an industry standard, instead of an optional service. Even though BIM is already in the industry for ten (10) years, many developers are still reluctant to implement it because they could not see the benefits of BIM especially in monetary terms. This paper aims to explore the understanding developers of BIM and its impact on Return on Investment (ROI). A literature review is carried out to review the linkage between BIM and ROI. The study engages qualitatively with four (4) respondents who held the title of BIM managers in their respective companies that have experience in BIM. Data was collected through face-to-face semi-structured interview sessions and was analysed using qualitative content analysis techniques. From the findings, the respondents do understand BIM and that BIM is not a tool for visualisation only. It is, in fact, able to help them in project control. The findings show that BIM had impacted on the ROI of both the project and organisation. At present, these findings support the argument that BIM does have an impact on the ROI both positively and negatively. However, the findings prove that BIM is worthy of its pricey initial investment. It is, therefore, suggested that Malaysian developers invest in BIM though the initial investment may seem pricey.
建筑信息模型(BIM)是当前全球建筑业的趋势,马来西亚也不例外。BIM在马来西亚已经有10年的历史了,在未来,BIM将成为一个行业标准,而不是一个可选的服务。尽管BIM已经在行业中存在了十(10)年,但许多开发人员仍然不愿意实施它,因为他们看不到BIM的好处,尤其是在金钱方面。本文旨在探讨开发者对BIM的理解及其对投资回报率(ROI)的影响。通过文献综述来回顾BIM与ROI之间的联系。该研究定性地调查了四(4)名受访者,他们在各自拥有BIM经验的公司中担任BIM经理。通过面对面的半结构化访谈收集数据,并使用定性内容分析技术进行分析。从调查结果来看,受访者确实了解BIM,并且BIM不仅仅是一个可视化的工具。事实上,它能够帮助他们进行项目控制。研究结果表明,BIM对项目和组织的投资回报率都产生了影响。目前,这些发现支持了BIM确实对ROI有积极和消极影响的观点。然而,调查结果证明,BIM值得其昂贵的初始投资。因此,建议马来西亚的开发商投资BIM,尽管最初的投资可能看起来很昂贵。
{"title":"Exploring developers' understanding on Building Information Modelling (BIM) and its impact on Return on Investment (ROI)","authors":"A. Latiffi, N. H. Tai","doi":"10.1109/ICRIIS.2017.8002494","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002494","url":null,"abstract":"Building Information Modelling (BIM) is the current trend in the construction industry globally, and Malaysia, is not an exception too. BIM has been in Malaysia for the past ten (10) years, and in the future, BIM will be an industry standard, instead of an optional service. Even though BIM is already in the industry for ten (10) years, many developers are still reluctant to implement it because they could not see the benefits of BIM especially in monetary terms. This paper aims to explore the understanding developers of BIM and its impact on Return on Investment (ROI). A literature review is carried out to review the linkage between BIM and ROI. The study engages qualitatively with four (4) respondents who held the title of BIM managers in their respective companies that have experience in BIM. Data was collected through face-to-face semi-structured interview sessions and was analysed using qualitative content analysis techniques. From the findings, the respondents do understand BIM and that BIM is not a tool for visualisation only. It is, in fact, able to help them in project control. The findings show that BIM had impacted on the ROI of both the project and organisation. At present, these findings support the argument that BIM does have an impact on the ROI both positively and negatively. However, the findings prove that BIM is worthy of its pricey initial investment. It is, therefore, suggested that Malaysian developers invest in BIM though the initial investment may seem pricey.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133449857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An efficient fuzzy keyword matching technique for searching through encrypted cloud data 一种高效的模糊关键字匹配技术,用于加密云数据的搜索
M. Ahsan, F. Chowdhury, M. Sabilah, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris
Cloud user intends to encrypt data before outsourcing sensitive data to the cloud which prevents data searching utility. Hence the necessity for searching through encrypted data appears. But in practice, it is very common for the user to misspell keywords while typing the words. Thus, fuzzy keyword search on encrypted data becomes an essential feature in searchable encryption. However, existing schemes suffer either from efficient handling of multi-letter errors or cannot distinguish anagrams. In this paper, we propose a scheme for fuzzy keyword search on encrypted data focusing on fuzzy word matching among dictionary words. Our proposed scheme construct a transformed keyword (monogram set) based on each letter and its position in the word, which enables to find out original word from its typo with maximum similarity matric. As a similarity metric, we have chosen a modified version of Jaccard similarity which ensures maximum similarity for the nearest word possibly the original one. Our experiment also suggests the applicability of our scheme.
云用户希望在将敏感数据外包给云之前对数据进行加密,从而阻止了数据搜索功能。因此,搜索加密数据的必要性出现了。但在实际操作中,用户在输入单词时拼错关键词是很常见的。因此,对加密数据进行模糊关键字搜索成为可搜索加密的一个重要特征。然而,现有的方案要么无法有效地处理多字母错误,要么无法区分字谜。本文提出了一种针对加密数据的模糊关键字搜索方案,重点关注字典词之间的模糊匹配。我们提出的方案基于每个字母及其在单词中的位置构造一个转换后的关键字(字母组合集),以最大的相似矩阵从错字中找到原单词。作为相似度度量,我们选择了一个修改版本的Jaccard相似度,以确保最近的单词可能是原始单词的最大相似度。我们的实验也表明了我们的方案的适用性。
{"title":"An efficient fuzzy keyword matching technique for searching through encrypted cloud data","authors":"M. Ahsan, F. Chowdhury, M. Sabilah, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris","doi":"10.1109/ICRIIS.2017.8002456","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002456","url":null,"abstract":"Cloud user intends to encrypt data before outsourcing sensitive data to the cloud which prevents data searching utility. Hence the necessity for searching through encrypted data appears. But in practice, it is very common for the user to misspell keywords while typing the words. Thus, fuzzy keyword search on encrypted data becomes an essential feature in searchable encryption. However, existing schemes suffer either from efficient handling of multi-letter errors or cannot distinguish anagrams. In this paper, we propose a scheme for fuzzy keyword search on encrypted data focusing on fuzzy word matching among dictionary words. Our proposed scheme construct a transformed keyword (monogram set) based on each letter and its position in the word, which enables to find out original word from its typo with maximum similarity matric. As a similarity metric, we have chosen a modified version of Jaccard similarity which ensures maximum similarity for the nearest word possibly the original one. Our experiment also suggests the applicability of our scheme.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134103140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system 侦测和预防网上银行系统中可能的未经授权登入企图,透过窃取凭证进行网路钓鱼攻击
Shammi Ishara Hewamadduma
With the current technological expansions customers wish to use online banking facilities due to its convenience and worldwide accessibility. The main challenge of going online for a bank is to provide sufficient security for the online customers and their accounts. The dramatic growth of the number of online banking customers has attracted cyber criminals and identity theft is a severe threat to online banking services. Phishing is a famous and easiest method to steal user credential of online customers where the sole intention is to obtain confidential information for the purpose of monetary gain. In such a situation the main purpose of this research paper is to analysis the usage of phishing attacks and the dangers it poses to customers and the bank, then to find out the available methods to detect and prevent unauthorized login attempts, the technologies and security weaknesses of those methods and finally to propose a solution to detect and prevent unauthorized login attempts using behavioral based analysis, IP and device identification technologies.
随着当前技术的发展,客户希望使用网上银行设施,因为它的便利性和全球可访问性。银行走向网上的主要挑战是为网上客户及其账户提供足够的安全保障。网上银行客户数量的急剧增长吸引了网络犯罪分子,身份盗窃对网上银行服务构成严重威胁。网络钓鱼是一种著名且最简单的窃取在线客户用户凭证的方法,其唯一目的是获取机密信息以获取金钱利益。在这种情况下,本研究论文的主要目的是分析网络钓鱼攻击的使用情况及其对客户和银行构成的危险,然后找出检测和防止未经授权登录尝试的可用方法,这些方法的技术和安全弱点,最后提出使用基于行为的分析,IP和设备识别技术来检测和防止未经授权登录尝试的解决方案。
{"title":"Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system","authors":"Shammi Ishara Hewamadduma","doi":"10.1109/ICRIIS.2017.8002440","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002440","url":null,"abstract":"With the current technological expansions customers wish to use online banking facilities due to its convenience and worldwide accessibility. The main challenge of going online for a bank is to provide sufficient security for the online customers and their accounts. The dramatic growth of the number of online banking customers has attracted cyber criminals and identity theft is a severe threat to online banking services. Phishing is a famous and easiest method to steal user credential of online customers where the sole intention is to obtain confidential information for the purpose of monetary gain. In such a situation the main purpose of this research paper is to analysis the usage of phishing attacks and the dangers it poses to customers and the bank, then to find out the available methods to detect and prevent unauthorized login attempts, the technologies and security weaknesses of those methods and finally to propose a solution to detect and prevent unauthorized login attempts using behavioral based analysis, IP and device identification technologies.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The impact of Facebook usage on academic performance 使用Facebook对学习成绩的影响
S. Moghavvemi, Ainin Sulaiman, A. A. Aziz, Phoong Seuk Wai
This research intends to examine how spending time on Facebook affect students' academic performance. It explores behavioural factors affecting students utilising Facebook. Questionnaires were personally distributed to 667 undergraduate and postgraduate students from the University of Malaya to determine their intentions for using Facebook, which will allow us to discern the symptoms related to excessive Facebook usage by students. The AMOS software was used to hypothesise the relationship between the variables. The results show that students use Facebook for entertainment, relaxing/escaping, and passing time, but not for socialising and social information. Spending time on Facebook has a positive effect on their academic performance, which indicated that the time spent on Facebook did not affect their education. It is anticipated that the findings from this study would provide clear insights on how the behavioural factors of a student affect their academic performance. This research would help educationists, parents, and the students themselves development appropriate measures to control and curb excessive usage of Facebook or using Facebook as a learning tool.
这项研究旨在研究花在Facebook上的时间如何影响学生的学习成绩。它探讨了影响学生使用Facebook的行为因素。我们亲自向马来亚大学的667名本科生和研究生发放了问卷,以确定他们使用Facebook的意图,这将使我们能够辨别学生过度使用Facebook的症状。使用AMOS软件对变量之间的关系进行假设。结果显示,学生们使用Facebook是为了娱乐、放松/逃避和消磨时间,而不是为了社交和社交信息。花在Facebook上的时间对他们的学习成绩有积极的影响,这表明花在Facebook上的时间对他们的教育没有影响。预计这项研究的结果将为学生的行为因素如何影响他们的学习成绩提供清晰的见解。这项研究将有助于教育工作者、家长和学生自己制定适当的措施来控制和遏制过度使用Facebook或将Facebook作为学习工具。
{"title":"The impact of Facebook usage on academic performance","authors":"S. Moghavvemi, Ainin Sulaiman, A. A. Aziz, Phoong Seuk Wai","doi":"10.1109/ICRIIS.2017.8002518","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002518","url":null,"abstract":"This research intends to examine how spending time on Facebook affect students' academic performance. It explores behavioural factors affecting students utilising Facebook. Questionnaires were personally distributed to 667 undergraduate and postgraduate students from the University of Malaya to determine their intentions for using Facebook, which will allow us to discern the symptoms related to excessive Facebook usage by students. The AMOS software was used to hypothesise the relationship between the variables. The results show that students use Facebook for entertainment, relaxing/escaping, and passing time, but not for socialising and social information. Spending time on Facebook has a positive effect on their academic performance, which indicated that the time spent on Facebook did not affect their education. It is anticipated that the findings from this study would provide clear insights on how the behavioural factors of a student affect their academic performance. This research would help educationists, parents, and the students themselves development appropriate measures to control and curb excessive usage of Facebook or using Facebook as a learning tool.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Resolving data duplication, inaccuracy and inconsistency issues using Master Data Management 使用主数据管理解决数据重复、不准确和不一致的问题
Faizura Haneem, R. Ali, Nazri Kama, Sufyan Basri
The management of scattered datasets over multiple data sources has led to data quality issues in an organization. Master Data Management (MDM) has been used to resolve this issue by providing “a single reference of truth” to reduce data redundancy in an organization. To the best of our knowledge, there is lack of study reviewing the progress of MDM research. Therefore, this paper intends to fill in the gap by conducting a systematic literature review to summarize the progress of MDM research domain. We also synthesize the data quality issues on multiple data sources management and how MDM tends to resolve them. We strategized our literature methods through relevant keywords searching from nine (9) databases including journals, proceedings, books, book chapters and industry research. The strategy has shown seven hundred and seventy-seven (777) articles were found during the initial searching stage and three hundred and forty-seven (347) relevant articles were filtered out for the analysis. The review shows that currently, MDM research has received a slope of enlightenment hence it still relevant to be explored. MDM is not just about a technology, it is an approach through a combination of processes, data governance, and technical implementation to resolve data quality issues on multiple data sources management such as duplication, inaccuracy and inconsistency of information.
在多个数据源上管理分散的数据集会导致组织中的数据质量问题。主数据管理(MDM)已经被用来解决这个问题,它提供了“真实的单一引用”,以减少组织中的数据冗余。据我们所知,目前还缺乏对MDM研究进展的综述。因此,本文拟通过系统的文献综述来弥补这一空白,总结MDM研究领域的进展。我们还综合了多个数据源管理中的数据质量问题,以及MDM如何解决这些问题。我们通过从期刊、论文集、书籍、书籍章节和行业研究等9个数据库中检索相关关键词,制定了我们的文献方法。该策略显示,在初始搜索阶段发现了777篇(777篇)文章,并过滤了347篇(347篇)相关文章进行分析。综述表明,目前,MDM研究有一定的启示意义,仍有值得探索的地方。MDM不仅仅是一种技术,它是一种通过流程、数据治理和技术实现的组合来解决多个数据源管理中的数据质量问题(如信息的重复、不准确和不一致)的方法。
{"title":"Resolving data duplication, inaccuracy and inconsistency issues using Master Data Management","authors":"Faizura Haneem, R. Ali, Nazri Kama, Sufyan Basri","doi":"10.1109/ICRIIS.2017.8002453","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002453","url":null,"abstract":"The management of scattered datasets over multiple data sources has led to data quality issues in an organization. Master Data Management (MDM) has been used to resolve this issue by providing “a single reference of truth” to reduce data redundancy in an organization. To the best of our knowledge, there is lack of study reviewing the progress of MDM research. Therefore, this paper intends to fill in the gap by conducting a systematic literature review to summarize the progress of MDM research domain. We also synthesize the data quality issues on multiple data sources management and how MDM tends to resolve them. We strategized our literature methods through relevant keywords searching from nine (9) databases including journals, proceedings, books, book chapters and industry research. The strategy has shown seven hundred and seventy-seven (777) articles were found during the initial searching stage and three hundred and forty-seven (347) relevant articles were filtered out for the analysis. The review shows that currently, MDM research has received a slope of enlightenment hence it still relevant to be explored. MDM is not just about a technology, it is an approach through a combination of processes, data governance, and technical implementation to resolve data quality issues on multiple data sources management such as duplication, inaccuracy and inconsistency of information.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A concept-level approach in analyzing review readership for E-Commerce persuasive recommendation 电子商务说服性推荐评论读者群分析的概念层次方法
Nur Syadhila Bt Che Lah, Ab Razak Che Hussin, H. M. Dahlan
A rapid development of E-Commerce platforms has allowed retailers to introduce online product recommendations to persuade consumers purchase decisions. Recommendations system in E-Commerce can be implemented through development of opinion review or feedback system. The visibility of opinion review as a persuasive communication tool in recommendation context has been proven as an important role in purchasing process, which then triggers much attention recently among research scholars. To expand the current discussion on persuasive potential of online review system, this paper aims to explore how the quality of text message may affects the persuasiveness of online recommendation. A concept-level approach will be used in analyzing text readability ease towards generating persuasive communication message. A theoretical model is proposed to measure the effect of review length based on number of concept review towards opinion review readership and its persuasive features. In order to validate the model, we applied basic readability measure of Gunning-Fox Index (FOG) to examine readability ease of opinion review to a dataset containing 1054 reviews extracted from Amazon.com product review. The interrelationship between concept-level analysis, review readership and its persuasive review is further discussed in this paper.
电子商务平台的快速发展使得零售商能够引入在线产品推荐来说服消费者做出购买决定。电子商务中的推荐系统可以通过开发意见审查或反馈系统来实现。意见评论作为一种有说服力的沟通工具,其可见性在购买过程中起着重要的作用,近年来引起了研究学者的广泛关注。为了扩展目前关于在线评论系统说服潜力的讨论,本文旨在探讨文本信息的质量如何影响在线推荐的说服力。在分析文本可读性的过程中,将采用概念层面的方法,以产生有说服力的交际信息。提出了一种基于概念评论数对观点评论读者群及其说服特征的评论长度影响的理论模型。为了验证该模型的有效性,我们应用Gunning-Fox指数(FOG)的基本可读性度量来检验意见评论的可读性难易程度,该数据集包含从Amazon.com产品评论中提取的1054条评论。本文进一步探讨了概念层次分析、评论读者群和说服性评论之间的相互关系。
{"title":"A concept-level approach in analyzing review readership for E-Commerce persuasive recommendation","authors":"Nur Syadhila Bt Che Lah, Ab Razak Che Hussin, H. M. Dahlan","doi":"10.1109/ICRIIS.2017.8002443","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002443","url":null,"abstract":"A rapid development of E-Commerce platforms has allowed retailers to introduce online product recommendations to persuade consumers purchase decisions. Recommendations system in E-Commerce can be implemented through development of opinion review or feedback system. The visibility of opinion review as a persuasive communication tool in recommendation context has been proven as an important role in purchasing process, which then triggers much attention recently among research scholars. To expand the current discussion on persuasive potential of online review system, this paper aims to explore how the quality of text message may affects the persuasiveness of online recommendation. A concept-level approach will be used in analyzing text readability ease towards generating persuasive communication message. A theoretical model is proposed to measure the effect of review length based on number of concept review towards opinion review readership and its persuasive features. In order to validate the model, we applied basic readability measure of Gunning-Fox Index (FOG) to examine readability ease of opinion review to a dataset containing 1054 reviews extracted from Amazon.com product review. The interrelationship between concept-level analysis, review readership and its persuasive review is further discussed in this paper.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 International Conference on Research and Innovation in Information Systems (ICRIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1