Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002461
Azizah Abdul Rahman, Yunusa Bena Adamu, Pershella Harun
The usage of dashboards in organizations along with the development of dashboard applications has continued to proliferate nowadays. This is as a result of the rapid replication of information and communication technology (ICT) brought on by the advent of Big Data. There is the need for people, businesses, governmental and non-governmental organizations to be able to view their performance and activities on a single computer screen. Despite this growing need for dashboard applications, there are many design-related issues which call for extensive measures to be taken in terms of the kind of information displayed on the dashboard. The aim of this paper is to identify and highlight the purpose of dashboard usage based on the three managerial levels of the dashboards: strategic, tactical, and operational levels. This paper also aims at identifying the dashboard features based on the purpose it serves. This study was conducted by investigating 23 published papers related to dashboards. The study showed that the dashboard is used for planning, monitoring, communication, consistency, and analysis. The dashboard's purposes can also be categorized on the basis of their common features. These findings can serve as a guide for developers in designing a better dashboard.
{"title":"Review on dashboard application from managerial perspective","authors":"Azizah Abdul Rahman, Yunusa Bena Adamu, Pershella Harun","doi":"10.1109/ICRIIS.2017.8002461","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002461","url":null,"abstract":"The usage of dashboards in organizations along with the development of dashboard applications has continued to proliferate nowadays. This is as a result of the rapid replication of information and communication technology (ICT) brought on by the advent of Big Data. There is the need for people, businesses, governmental and non-governmental organizations to be able to view their performance and activities on a single computer screen. Despite this growing need for dashboard applications, there are many design-related issues which call for extensive measures to be taken in terms of the kind of information displayed on the dashboard. The aim of this paper is to identify and highlight the purpose of dashboard usage based on the three managerial levels of the dashboards: strategic, tactical, and operational levels. This paper also aims at identifying the dashboard features based on the purpose it serves. This study was conducted by investigating 23 published papers related to dashboards. The study showed that the dashboard is used for planning, monitoring, communication, consistency, and analysis. The dashboard's purposes can also be categorized on the basis of their common features. These findings can serve as a guide for developers in designing a better dashboard.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126549610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002519
Chooi Shi Teoh, A. Mahmood
Digital economy is strengthening in prominence and relevance in the era of digital transformation. The economic opportunity and growth of nations are dependent on the digital world, as world community increasingly connected in the cyberspace. The boom in digital economy is coupled with cyber risks and cyber threats for nations. National cybersecurity strategy (NCSS) is an essential element as cybersecurity is needed to protect and enable digital economy. This article seeks to gain insights on the correlation of the development of the NCSS and the success of digital economy of the nation. NCSS of nine nations analysed based on digital economy success. The top nation of digital economy released its NCSS the latest, in 2016. NCSS is not a requirement to kick start digital economy. It is, however, essential for the continuous growth and success in digital economy.
{"title":"National cyber security strategies for digital economy","authors":"Chooi Shi Teoh, A. Mahmood","doi":"10.1109/ICRIIS.2017.8002519","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002519","url":null,"abstract":"Digital economy is strengthening in prominence and relevance in the era of digital transformation. The economic opportunity and growth of nations are dependent on the digital world, as world community increasingly connected in the cyberspace. The boom in digital economy is coupled with cyber risks and cyber threats for nations. National cybersecurity strategy (NCSS) is an essential element as cybersecurity is needed to protect and enable digital economy. This article seeks to gain insights on the correlation of the development of the NCSS and the success of digital economy of the nation. NCSS of nine nations analysed based on digital economy success. The top nation of digital economy released its NCSS the latest, in 2016. NCSS is not a requirement to kick start digital economy. It is, however, essential for the continuous growth and success in digital economy.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"85 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002493
A. A. Latif, N. Arshad, Norjansalika Janom, Nor Shahniza Kamal Bashah, Syaripah Ruzaini Syed Aris
Disaster can affects a nation from functioning normally, and it can impact human, material, economic or environment. Disaster management is the concept being applied during disaster in organizing and managing resources and responsibilities of all relevant agencies in the event of disaster. Today, disaster management critically relies on information to ensure all agencies responsible can disseminate information in making a better and effective disaster relief efforts. Based on this motivation, we posit a maturity model that aim to identify the improvement of infostructure for disaster management. Maturity model is commonly used to guide the development of improvement program to transform to a better state, which in this research is to improve the infostructure being used during disaster. An initial conceptual maturity model has been constructed based on selected disaster processes. Based on the literature review, questionnaire items have been designed to form the identified latent constructs. A pilot survey has been conducted to verify the questionnaire items and the results are tested against Rasch measurement analysis. By using Rasch logit measures, the items' quality is ensured. Findings indicate that the item fitness is good, outfit and infit mean square values are very much close to 1, and Z-standardized value is within the expected range. Nonetheless, there are several misfit items which are further calibrated and revised for future study.
{"title":"Validating questionnaire design of infostructure maturity model for disaster management selected processes","authors":"A. A. Latif, N. Arshad, Norjansalika Janom, Nor Shahniza Kamal Bashah, Syaripah Ruzaini Syed Aris","doi":"10.1109/ICRIIS.2017.8002493","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002493","url":null,"abstract":"Disaster can affects a nation from functioning normally, and it can impact human, material, economic or environment. Disaster management is the concept being applied during disaster in organizing and managing resources and responsibilities of all relevant agencies in the event of disaster. Today, disaster management critically relies on information to ensure all agencies responsible can disseminate information in making a better and effective disaster relief efforts. Based on this motivation, we posit a maturity model that aim to identify the improvement of infostructure for disaster management. Maturity model is commonly used to guide the development of improvement program to transform to a better state, which in this research is to improve the infostructure being used during disaster. An initial conceptual maturity model has been constructed based on selected disaster processes. Based on the literature review, questionnaire items have been designed to form the identified latent constructs. A pilot survey has been conducted to verify the questionnaire items and the results are tested against Rasch measurement analysis. By using Rasch logit measures, the items' quality is ensured. Findings indicate that the item fitness is good, outfit and infit mean square values are very much close to 1, and Z-standardized value is within the expected range. Nonetheless, there are several misfit items which are further calibrated and revised for future study.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121247226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002482
Sahabi Y. Ali, Ab Razak Che Hussin, Abdelsalam H. Busalim
As a business paradigm, social commerce (s-commerce) has brought about a new stage of innovation, and by extension, has transmuted the power from seller to buyer. S-commerce is an integration of transactional and social activities, in which, individuals may spread word of mouth (WOM) about their shopping experiences, knowledge, as well as providing information about product and services to their friends. This kind of social interactions among individuals has increased the potentials of eWOM communication. Most of the studies in relation to eWOM happen to be fragmented as they consider either the antecedents or consequences of eWOM especially in s-commerce. The present study aims to look into the antecedents of eWOM in s-commerce from different literatures and aggregate them into a comprehensive model to guide future research. This study will help managers and practitioners to understand the antecedents of eWOM communication, and it will also spur the research community to delve into more research in order to investigate other drivers of eWOM information in s-commerce.
{"title":"Antecedents of eWOM in social commerce","authors":"Sahabi Y. Ali, Ab Razak Che Hussin, Abdelsalam H. Busalim","doi":"10.1109/ICRIIS.2017.8002482","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002482","url":null,"abstract":"As a business paradigm, social commerce (s-commerce) has brought about a new stage of innovation, and by extension, has transmuted the power from seller to buyer. S-commerce is an integration of transactional and social activities, in which, individuals may spread word of mouth (WOM) about their shopping experiences, knowledge, as well as providing information about product and services to their friends. This kind of social interactions among individuals has increased the potentials of eWOM communication. Most of the studies in relation to eWOM happen to be fragmented as they consider either the antecedents or consequences of eWOM especially in s-commerce. The present study aims to look into the antecedents of eWOM in s-commerce from different literatures and aggregate them into a comprehensive model to guide future research. This study will help managers and practitioners to understand the antecedents of eWOM communication, and it will also spur the research community to delve into more research in order to investigate other drivers of eWOM information in s-commerce.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128134629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002524
R. Widuri, N. Sari, Aries Wicaksono, Yen Sun, S. Sari
The objective of this research is to explore the perception of internal auditor in public companies on the use of Generalized Audit Software (GAS) to improve the transparency and accountability of financial report. Qualitative approach was used by conducting face-to-face semi structured interview with internal auditors from Indonesian public companies. This research uses Agency Theory and Technology Acceptance Model (TAM) as underpinning theories, therefore this research provides academic contribution not only in auditing area but also in information technology. The results indicated that not all participants agreed that GAS is helping them in producing a transparent and accountable financial report.
{"title":"Perception of internal auditor on the use of Generalized Audit Software","authors":"R. Widuri, N. Sari, Aries Wicaksono, Yen Sun, S. Sari","doi":"10.1109/ICRIIS.2017.8002524","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002524","url":null,"abstract":"The objective of this research is to explore the perception of internal auditor in public companies on the use of Generalized Audit Software (GAS) to improve the transparency and accountability of financial report. Qualitative approach was used by conducting face-to-face semi structured interview with internal auditors from Indonesian public companies. This research uses Agency Theory and Technology Acceptance Model (TAM) as underpinning theories, therefore this research provides academic contribution not only in auditing area but also in information technology. The results indicated that not all participants agreed that GAS is helping them in producing a transparent and accountable financial report.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133268722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002486
Aimi Sara Ismail, K. Ali, N. A. Iahad
The checking process of the building design with building regulations or codes is a time-consuming and error prone process. The automation of code compliance checking process has been explored since 1960s and becoming more vigorous with the emergence of Building Information Modeling (BIM). A neutral format, Industry Foundation Classes (IFC) which is developed under BIM platform had led to better collaboration and information exchange throughout BIM software and development of the checking system. Generally, the structure of an automated system consists of rule interpretation stage, building model preparation stage, rule execution stage and rule reporting stage. Rule interpretation stage is the most vital and complex stage. In interpreting the rules, various techniques have been investigated and applied to employ comprehensive and accurate checking process on the building designs which are mainly in IFC format. The most common techniques used are by utilizing existing software such as Solibri Model Checker, establishing a plug-in application, adopting object-based approach, logical approach and ontological approach. This paper provides a highlight and review on previous studies which successfully employed the appropriate techniques in interpreting the rules for checking purposes. This will subsequently assist future research on this area and create more astounding code compliance checking system.
根据建筑法规或规范对建筑设计进行审核是一个耗时且容易出错的过程。规范符合性检查过程的自动化自20世纪60年代开始探索,并随着建筑信息模型(BIM)的出现而变得更加活跃。在BIM平台下开发的行业基础类(IFC)是一种中立的格式,在整个BIM软件和检查系统的开发过程中实现了更好的协作和信息交换。一般来说,自动化系统的结构包括规则解释阶段、构建模型准备阶段、规则执行阶段和规则报告阶段。规则解释阶段是最重要、最复杂的阶段。在解释规则时,研究了各种技术并应用于对主要采用IFC格式的建筑设计进行全面和准确的检查过程。最常用的技术是利用现有软件(如Solibri Model Checker)、建立插件应用程序、采用基于对象的方法、逻辑方法和本体论方法。本文对以往成功地采用适当的技术来解释检查目的规则的研究进行了重点和回顾。这将有助于未来对这一领域的研究,并创建更令人震惊的代码遵从性检查系统。
{"title":"A Review on BIM-based automated code compliance checking system","authors":"Aimi Sara Ismail, K. Ali, N. A. Iahad","doi":"10.1109/ICRIIS.2017.8002486","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002486","url":null,"abstract":"The checking process of the building design with building regulations or codes is a time-consuming and error prone process. The automation of code compliance checking process has been explored since 1960s and becoming more vigorous with the emergence of Building Information Modeling (BIM). A neutral format, Industry Foundation Classes (IFC) which is developed under BIM platform had led to better collaboration and information exchange throughout BIM software and development of the checking system. Generally, the structure of an automated system consists of rule interpretation stage, building model preparation stage, rule execution stage and rule reporting stage. Rule interpretation stage is the most vital and complex stage. In interpreting the rules, various techniques have been investigated and applied to employ comprehensive and accurate checking process on the building designs which are mainly in IFC format. The most common techniques used are by utilizing existing software such as Solibri Model Checker, establishing a plug-in application, adopting object-based approach, logical approach and ontological approach. This paper provides a highlight and review on previous studies which successfully employed the appropriate techniques in interpreting the rules for checking purposes. This will subsequently assist future research on this area and create more astounding code compliance checking system.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002472
Norhidayah Asaddok, Masitah Ghazali
The increase use of smartphones in healthcare industry leads to situations of users sharing their personal healthcare information in several types of applications. The massive number of mobile health (mHealth) applications becomes a serious problem for users, as they are unaware of how to manage and use their data. In this study, usability, security and privacy in mobile health applications are explored and identified by studying and evaluating mHealth applications available in the market. We design and propose a taxonomy intended to assist the developers in developing healthcare applications with usability, security and privacy dimensions in mind. This paper describes an on-going work for developing the taxonomy and describes how we plan to measure the proposed taxonomy.
{"title":"Exploring the usability, security and privacy taxonomy for mobile health applications","authors":"Norhidayah Asaddok, Masitah Ghazali","doi":"10.1109/ICRIIS.2017.8002472","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002472","url":null,"abstract":"The increase use of smartphones in healthcare industry leads to situations of users sharing their personal healthcare information in several types of applications. The massive number of mobile health (mHealth) applications becomes a serious problem for users, as they are unaware of how to manage and use their data. In this study, usability, security and privacy in mobile health applications are explored and identified by studying and evaluating mHealth applications available in the market. We design and propose a taxonomy intended to assist the developers in developing healthcare applications with usability, security and privacy dimensions in mind. This paper describes an on-going work for developing the taxonomy and describes how we plan to measure the proposed taxonomy.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133890314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002521
Hosien Jafarkarimi, Robab Saadatdoost, A. Sim, J. Hee
Employing the Theory of Planned Behavior (TPB), this study aims to find determinant factors that have influence over individuals' intention to cyberbully others. Using a scenario-based questionnaire, the data were collected from 96 students in Universiti Teknologi Malaysia. According to the results, only subjective norms reflected to be significant over cyberbullying intention, while the rest of variables did not reflect any significance.
本研究运用计划行为理论(Theory of Planned Behavior, TPB),旨在寻找影响个体网络欺凌他人意向的决定因素。使用基于场景的问卷调查,从马来西亚科技大学的96名学生中收集数据。结果显示,只有主观规范对网络欺凌意图反映显著性,其余变量均不反映显著性。
{"title":"Cyberbullying among students: An application of Theory of Planned Behavior","authors":"Hosien Jafarkarimi, Robab Saadatdoost, A. Sim, J. Hee","doi":"10.1109/ICRIIS.2017.8002521","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002521","url":null,"abstract":"Employing the Theory of Planned Behavior (TPB), this study aims to find determinant factors that have influence over individuals' intention to cyberbully others. Using a scenario-based questionnaire, the data were collected from 96 students in Universiti Teknologi Malaysia. According to the results, only subjective norms reflected to be significant over cyberbullying intention, while the rest of variables did not reflect any significance.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115341878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002487
S. Chen, C. Hsu, S. Chou
Knowledge outcome improvement is critical to the success of e-communities. We build on attitude-based theory and trust literature to propose a model that explains the relationship between belief, knowledge exchange, and knowledge outcomes. This model is based on the trust-centered lens, and theorizes knowledge exchange as affected by one's constructed support, in terms of individual virtual skill and environmental support. Trust is captured by cognitive trust and emotional trust. The model was empirically validated through a survey. Results show that knowledge outcome intention is positively affected by trust development, which in turn is influenced by constructed support. We discuss the implications of these findings.
{"title":"Understanding the formation of knowledge outcomes in virtual communities - a trust development perspective","authors":"S. Chen, C. Hsu, S. Chou","doi":"10.1109/ICRIIS.2017.8002487","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002487","url":null,"abstract":"Knowledge outcome improvement is critical to the success of e-communities. We build on attitude-based theory and trust literature to propose a model that explains the relationship between belief, knowledge exchange, and knowledge outcomes. This model is based on the trust-centered lens, and theorizes knowledge exchange as affected by one's constructed support, in terms of individual virtual skill and environmental support. Trust is captured by cognitive trust and emotional trust. The model was empirically validated through a survey. Results show that knowledge outcome intention is positively affected by trust development, which in turn is influenced by constructed support. We discuss the implications of these findings.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115303387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/ICRIIS.2017.8002489
Ooi Chun Wei, R. Idrus, N. L. Abdullah
Enterprise Resource Planning (ERP) is an enterprise management system that integrates and streamlines business processes and functions, including supply chain management (SCM), across entire organization according to the organization's needs. The function of SCM in an ERP is to maintain manufacturing supply chain, which starts from input of data such as bill of material (BOM), planning, and procurement, right up to manufacturing management. BOM is an important input for supply chain management including Material Requirement Planning (MRP), which is one of ERP modules. This study is done at a multi-national company that has implemented ERP but having problems in inventory management on thousands of raw material and parts in production shop floor. Poor inventory management in production floor will cause excess or shortages of raw material which indirectly impact business performance of the company. Thus an additional module similar to MRP module is proposed to be implemented in the ERP to assist manufacturing department in inventory management to eliminate manual inventory management. This extended module is expected to increase the effectiveness and efficiency of manufacturing productions in managing inventory.
{"title":"Extended ERP for inventory management: The case of a multi-national manufacturing company","authors":"Ooi Chun Wei, R. Idrus, N. L. Abdullah","doi":"10.1109/ICRIIS.2017.8002489","DOIUrl":"https://doi.org/10.1109/ICRIIS.2017.8002489","url":null,"abstract":"Enterprise Resource Planning (ERP) is an enterprise management system that integrates and streamlines business processes and functions, including supply chain management (SCM), across entire organization according to the organization's needs. The function of SCM in an ERP is to maintain manufacturing supply chain, which starts from input of data such as bill of material (BOM), planning, and procurement, right up to manufacturing management. BOM is an important input for supply chain management including Material Requirement Planning (MRP), which is one of ERP modules. This study is done at a multi-national company that has implemented ERP but having problems in inventory management on thousands of raw material and parts in production shop floor. Poor inventory management in production floor will cause excess or shortages of raw material which indirectly impact business performance of the company. Thus an additional module similar to MRP module is proposed to be implemented in the ERP to assist manufacturing department in inventory management to eliminate manual inventory management. This extended module is expected to increase the effectiveness and efficiency of manufacturing productions in managing inventory.","PeriodicalId":384130,"journal":{"name":"2017 International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}