Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066625
S. Mohanarajah, M. Jabar
Software development initially used traditional methodologies which have been in the mainstream until the advent of agile methodologies. It is often thought that as traditional methods would be eventually replaced by new methods, it still remains the closest link to a naturally progressive route although the mind-set wants to get rid of the old and get in with the new. But it is not the replacement that is the variable to control. It has to be a dynamic approach which marries the two which is a hybrid methodology where a combination of the old and the new coexist. Interestingly a new strategy also seems to surface which looks at synergies and past pace scenarios, all within the realm of successful software project deliveries. The views and accepted norms from previous research papers are analysed with discussions provided on whether to discourage or encourage the practitioner from a perspective based on what works with and when a certain amount of caveat is imposed.
{"title":"Software development methodologies: A perspective of different strategies linked to a similar goal","authors":"S. Mohanarajah, M. Jabar","doi":"10.1109/ICIMU.2014.7066625","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066625","url":null,"abstract":"Software development initially used traditional methodologies which have been in the mainstream until the advent of agile methodologies. It is often thought that as traditional methods would be eventually replaced by new methods, it still remains the closest link to a naturally progressive route although the mind-set wants to get rid of the old and get in with the new. But it is not the replacement that is the variable to control. It has to be a dynamic approach which marries the two which is a hybrid methodology where a combination of the old and the new coexist. Interestingly a new strategy also seems to surface which looks at synergies and past pace scenarios, all within the realm of successful software project deliveries. The views and accepted norms from previous research papers are analysed with discussions provided on whether to discourage or encourage the practitioner from a perspective based on what works with and when a certain amount of caveat is imposed.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066649
Tiagrajah V. Janahiraman, Nooraziah Ahmad
The turning operation in the Computer Numerical Control (CNC) needs optimal machining parameters to achieve higher machining efficiency. The selection of machining parameters is very important to find the best performances in machining process. In this study, two different architectures of particle swarm optimization based extreme learning machine were analyzed for modelling inputs parameters: feed rate, cutting speed and depth of cut to output parameters: surface roughness and power consumption. The data were collected from 15 experiments using carbon steel AISI 1045 which were separated into training and testing dataset. Our experimental results shows that Architecture II is the most outstanding model with mean absolute percentage error (MAPE) of 0.0469 for predicting the training data and 0.204 for predicting the testing data.
{"title":"Performance analysis of ELM-PSO architectures for modelling surface roughness and power consumption in CNC turning operation","authors":"Tiagrajah V. Janahiraman, Nooraziah Ahmad","doi":"10.1109/ICIMU.2014.7066649","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066649","url":null,"abstract":"The turning operation in the Computer Numerical Control (CNC) needs optimal machining parameters to achieve higher machining efficiency. The selection of machining parameters is very important to find the best performances in machining process. In this study, two different architectures of particle swarm optimization based extreme learning machine were analyzed for modelling inputs parameters: feed rate, cutting speed and depth of cut to output parameters: surface roughness and power consumption. The data were collected from 15 experiments using carbon steel AISI 1045 which were separated into training and testing dataset. Our experimental results shows that Architecture II is the most outstanding model with mean absolute percentage error (MAPE) of 0.0469 for predicting the training data and 0.204 for predicting the testing data.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122127096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066636
A. Hoe, J. Dhillon
In many organizations, especially in most utility companies including Company X, revenue collection is a major issue when customers face difficulties in paying their utility bills before the deadline. There are many reasons for this problem but it becomes a serious financial issue for the organizations when the cumulative amount of bad debts reached a staggering figure. This paper reports a study of this issue for Company X involving its customers based in Bangi and Kajang, totaling upto 1,525 customers. The study is conducted to identify the factors of customers who would default payment of their bills. The identification of such factors is important to enable Company X to identify these customers and implement the necessary measures to mitigate the problem. The CRISP-DM (Cross-Industry Standard Process for data mining) model was employed in conducting the study. The results provide an intial understanding of the issue and the solution model generated could be used to resolve the issue for other areas in Malaysia.
{"title":"Predicting bad utility consumers in Malaysia","authors":"A. Hoe, J. Dhillon","doi":"10.1109/ICIMU.2014.7066636","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066636","url":null,"abstract":"In many organizations, especially in most utility companies including Company X, revenue collection is a major issue when customers face difficulties in paying their utility bills before the deadline. There are many reasons for this problem but it becomes a serious financial issue for the organizations when the cumulative amount of bad debts reached a staggering figure. This paper reports a study of this issue for Company X involving its customers based in Bangi and Kajang, totaling upto 1,525 customers. The study is conducted to identify the factors of customers who would default payment of their bills. The identification of such factors is important to enable Company X to identify these customers and implement the necessary measures to mitigate the problem. The CRISP-DM (Cross-Industry Standard Process for data mining) model was employed in conducting the study. The results provide an intial understanding of the issue and the solution model generated could be used to resolve the issue for other areas in Malaysia.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114236734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066596
Andrew Anthony Rao, L. Chen, J. Dhillon
It cannot be doubted that having a successful framework for an online environment is an exigent task due to the data privacy infringement occurring all around the globe; identities such as the leaking of personal photos, stealing online identities, online scams, bank frauds and the list keeps going and on. Do we want such a predicament to strike us while online? Is our online data privacy out of our reach? Thus ensuring online data privacy is a must for all web users due to the highly valuable personal data conveyed in identifying an individual. In this paper, we critically review three existing online privacy frameworks with regard to their applicability and the manner in which its usage can be brought into the Malaysian online environment. We discuss the strengths and weaknesses of these frameworks and envision a comprehensive framework that would help us in providing a clear path to reduce the major concerns and problems associated with online data privacy in Malaysia. Results from our analyses of existing frameworks indicate that they are not fully being utilized to their fullest potential. The results therein concur different objectives which mostly favour online companies instead of web users.
{"title":"A preliminary study on online data privacy frameworks","authors":"Andrew Anthony Rao, L. Chen, J. Dhillon","doi":"10.1109/ICIMU.2014.7066596","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066596","url":null,"abstract":"It cannot be doubted that having a successful framework for an online environment is an exigent task due to the data privacy infringement occurring all around the globe; identities such as the leaking of personal photos, stealing online identities, online scams, bank frauds and the list keeps going and on. Do we want such a predicament to strike us while online? Is our online data privacy out of our reach? Thus ensuring online data privacy is a must for all web users due to the highly valuable personal data conveyed in identifying an individual. In this paper, we critically review three existing online privacy frameworks with regard to their applicability and the manner in which its usage can be brought into the Malaysian online environment. We discuss the strengths and weaknesses of these frameworks and envision a comprehensive framework that would help us in providing a clear path to reduce the major concerns and problems associated with online data privacy in Malaysia. Results from our analyses of existing frameworks indicate that they are not fully being utilized to their fullest potential. The results therein concur different objectives which mostly favour online companies instead of web users.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066610
N. S. Md Salleh, Amirul Shafiq Bin Mohamad Shariff, Muhammad Ikhwan Afiq Bin Kamsani, S. Nazeri
Parallel computing is a simultaneous use of multiple compute resources such as processors to solve difficult computational problems. It has been used in high-end computing areas such as pattern recognition, defense, web search engine, and medical diagnosis. This paper focuses on the implementation of pattern classification technique, Support Vector Machine (SVM) using Symmetric Multi-Processor (SMP) approach. We have carried out a performance analysis to benchmark the sequential SVM program against the SMP approach. The result shows that the parallelization of SVM training achieves a better performance than the sequential code speed-ups by 15.9s.
{"title":"Parallel execution of SVM using Symmetrical Multi-Processor (LIBSVM-OMP)","authors":"N. S. Md Salleh, Amirul Shafiq Bin Mohamad Shariff, Muhammad Ikhwan Afiq Bin Kamsani, S. Nazeri","doi":"10.1109/ICIMU.2014.7066610","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066610","url":null,"abstract":"Parallel computing is a simultaneous use of multiple compute resources such as processors to solve difficult computational problems. It has been used in high-end computing areas such as pattern recognition, defense, web search engine, and medical diagnosis. This paper focuses on the implementation of pattern classification technique, Support Vector Machine (SVM) using Symmetric Multi-Processor (SMP) approach. We have carried out a performance analysis to benchmark the sequential SVM program against the SMP approach. The result shows that the parallelization of SVM training achieves a better performance than the sequential code speed-ups by 15.9s.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132934784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066613
Teh Jian Zhi, Zailani Ibrahim, Hazleen Aris
Students' attendance taking and tracking are important in order to monitor students' performance in class. More often than not, students' performance is closely related to their attendance. Good attendance usually leads to good performance and vice versa. Therefore, any problems related to students' attendance should be identified as early as possible so that appropriate measures can be taken to address them. However, tracking students' attendance, especially if done manually, can be tedious and time consuming, especially for classes will large number of students. Not to mention issues related to attendance taking such as signatures forgery where other students are signing on behalf of their absence friends. To address this issue, a unique and secure attendance tracking system is proposed. The system automates most of the steps involved in tracking students' attendance. To address the issue of signature forgery, secret code using MD5 hashing algorithm is implemented as part of the system so that each student will be given a unique code each day to be used for signing attendance. Implementation of the system shows that the time taken to track students' attendance using this system can be significantly reduced and the secret code is able to prevent signature forgery amongst students.
{"title":"Effective and efficient attendance tracking system using secret code","authors":"Teh Jian Zhi, Zailani Ibrahim, Hazleen Aris","doi":"10.1109/ICIMU.2014.7066613","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066613","url":null,"abstract":"Students' attendance taking and tracking are important in order to monitor students' performance in class. More often than not, students' performance is closely related to their attendance. Good attendance usually leads to good performance and vice versa. Therefore, any problems related to students' attendance should be identified as early as possible so that appropriate measures can be taken to address them. However, tracking students' attendance, especially if done manually, can be tedious and time consuming, especially for classes will large number of students. Not to mention issues related to attendance taking such as signatures forgery where other students are signing on behalf of their absence friends. To address this issue, a unique and secure attendance tracking system is proposed. The system automates most of the steps involved in tracking students' attendance. To address the issue of signature forgery, secret code using MD5 hashing algorithm is implemented as part of the system so that each student will be given a unique code each day to be used for signing attendance. Implementation of the system shows that the time taken to track students' attendance using this system can be significantly reduced and the secret code is able to prevent signature forgery amongst students.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132556216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066623
Zainuddin Bin Hj Hassan, Zaid T. Alhalhouli
User Satisfaction is one of the most important factors studied by many researchers to develop effective application. This paper presents the user satisfaction evaluation of social networks named as Jordanian Medical Social Network (JMSN) which was designed for staff at Jordanian hospitals. This prototype was used and designed based on the enhanced TPB model of knowledge sharing behavior. A survey was conducted with the stakeholders in the Jordanian hospitals, to get their viewpoints about their satisfaction level on JMSN. Usability and User Experience (USE) questionnaires were distributed to 172 stakeholders who used the social networks. The results from the survey indicate that the prototype achieved higher degree of satisfaction among the stakeholders.
{"title":"The stakeholders satisfaction about the using social networks in Jordanian hospitals for knowledge sharing","authors":"Zainuddin Bin Hj Hassan, Zaid T. Alhalhouli","doi":"10.1109/ICIMU.2014.7066623","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066623","url":null,"abstract":"User Satisfaction is one of the most important factors studied by many researchers to develop effective application. This paper presents the user satisfaction evaluation of social networks named as Jordanian Medical Social Network (JMSN) which was designed for staff at Jordanian hospitals. This prototype was used and designed based on the enhanced TPB model of knowledge sharing behavior. A survey was conducted with the stakeholders in the Jordanian hospitals, to get their viewpoints about their satisfaction level on JMSN. Usability and User Experience (USE) questionnaires were distributed to 172 stakeholders who used the social networks. The results from the survey indicate that the prototype achieved higher degree of satisfaction among the stakeholders.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066600
L. Salahuddin, Z. Ismail
Most of the accidental harm in the healthcare process related to patient safety leads to medical errors. One of the recommendations to prevent medical errors is through information technology (IT). Health IT has the potential to improve the quality of the healthcare services and essentially patient safety. It suggests the healthcare provider to collect, store, retrieve and transfer patient's information electronically. Nevertheless, there are also growing evidence that the health IT can also post a risk to patient safety when it is poorly designed, implemented or adopted. Previous studies primarily focused on the errors or unintended consequences introduced by the health IT. The root cause of the medical errors due to health IT is multifaceted and originated from numerous factors. In spite of that, little focus has been given on the antecedents that influence the safety of health IT. In order to address this gap, this study investigates the antecedents that influence the safety of health IT. Systematic literature review was conducted to identify articles pertinent to safety of health IT. Science Direct database was searched for reviews relevance articles. Thirteen full articles met the eligibility criteria for further analysis. Usability, availability, compatibility, communication, workaround and knowledge were discerned as the significance antecedents influencing safety in health IT. This study may be of significance in providing useful information on how to safely implement health IT adoption. Various stakeholders such as policy makers, government agencies, healthcare providers, health IT developers and researchers may find this study useful for their respective needs.
{"title":"Antecedents for safety in health IT: An exploratory investigation","authors":"L. Salahuddin, Z. Ismail","doi":"10.1109/ICIMU.2014.7066600","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066600","url":null,"abstract":"Most of the accidental harm in the healthcare process related to patient safety leads to medical errors. One of the recommendations to prevent medical errors is through information technology (IT). Health IT has the potential to improve the quality of the healthcare services and essentially patient safety. It suggests the healthcare provider to collect, store, retrieve and transfer patient's information electronically. Nevertheless, there are also growing evidence that the health IT can also post a risk to patient safety when it is poorly designed, implemented or adopted. Previous studies primarily focused on the errors or unintended consequences introduced by the health IT. The root cause of the medical errors due to health IT is multifaceted and originated from numerous factors. In spite of that, little focus has been given on the antecedents that influence the safety of health IT. In order to address this gap, this study investigates the antecedents that influence the safety of health IT. Systematic literature review was conducted to identify articles pertinent to safety of health IT. Science Direct database was searched for reviews relevance articles. Thirteen full articles met the eligibility criteria for further analysis. Usability, availability, compatibility, communication, workaround and knowledge were discerned as the significance antecedents influencing safety in health IT. This study may be of significance in providing useful information on how to safely implement health IT adoption. Various stakeholders such as policy makers, government agencies, healthcare providers, health IT developers and researchers may find this study useful for their respective needs.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066627
N. Arshad, S. Milton, R. Bosua, M. Mehat
This paper provides a new perspective on Enterprise Content Management Systems (ECMS)-use and identify novel ways in which these technologies can be used to support organizations' unified business processes. The main objective of this study is to understand and explain how unified businesses that employs highly integrated and standardized business operations could use ECMS to support their work operations. Consequently, empirical investigations using a qualitative research design were conducted in two unified organizations. Empirical evidence of the two cases were brought together in a cross-case analysis and the synthesis resulted in four modes of ECMS-use that could support unified businesses, that is, to: (1) collaborate among units on projects, (2) approve project documents and monitor project progress, (3) access standard operating procedures, and (4) provide links and access to information systems. This research fills the gap in the literature on the topic of ECMS-use and extends prior studies by reporting on organizations' experiences in using ECMS and focusing on how ECMS-use can support business processes. Business and IT managers will have a better understanding on how to maximize and gain benefit from this kind of technologies by embedding the use of it to their daily business operations.
{"title":"Enterprise Content Management technologies supporting unified businesses","authors":"N. Arshad, S. Milton, R. Bosua, M. Mehat","doi":"10.1109/ICIMU.2014.7066627","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066627","url":null,"abstract":"This paper provides a new perspective on Enterprise Content Management Systems (ECMS)-use and identify novel ways in which these technologies can be used to support organizations' unified business processes. The main objective of this study is to understand and explain how unified businesses that employs highly integrated and standardized business operations could use ECMS to support their work operations. Consequently, empirical investigations using a qualitative research design were conducted in two unified organizations. Empirical evidence of the two cases were brought together in a cross-case analysis and the synthesis resulted in four modes of ECMS-use that could support unified businesses, that is, to: (1) collaborate among units on projects, (2) approve project documents and monitor project progress, (3) access standard operating procedures, and (4) provide links and access to information systems. This research fills the gap in the literature on the topic of ECMS-use and extends prior studies by reporting on organizations' experiences in using ECMS and focusing on how ECMS-use can support business processes. Business and IT managers will have a better understanding on how to maximize and gain benefit from this kind of technologies by embedding the use of it to their daily business operations.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066616
S. M. Sabri, R. Sulaiman, Azhana Ahmad, Alicia Tang
SMEs are major contributors to the Malaysia's economic growth. They constitute about 99.2% of registered companies in Malaysia. E-business is believed could help to increase the SMEs competitiveness by venturing into global and virtual marketplace. However, it is reported that only 20% of SMEs have an Internet presence but not fully e-business. Among the limitations that the SMEs faced are lack of IT skills and resources, thus IT outsourcing is seen as one of potential solutions. This research aims to investigate factors that influence the decision to deploy IT outsourcing approach for e-business transformation among the SMEs. This paper discusses the literature review on e-business and IT outsourcing practices for SMEs. A qualitative method via case study approach is used to gather in-depth understanding of the situation. The expected outcomes from this research will be an IT outsourcing model to assist e-business transformation for SMEs. However, this paper will only discuss findings from the literature review.
{"title":"A review on IT outsourcing practices for e-business transformation among SMEs in Malaysia","authors":"S. M. Sabri, R. Sulaiman, Azhana Ahmad, Alicia Tang","doi":"10.1109/ICIMU.2014.7066616","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066616","url":null,"abstract":"SMEs are major contributors to the Malaysia's economic growth. They constitute about 99.2% of registered companies in Malaysia. E-business is believed could help to increase the SMEs competitiveness by venturing into global and virtual marketplace. However, it is reported that only 20% of SMEs have an Internet presence but not fully e-business. Among the limitations that the SMEs faced are lack of IT skills and resources, thus IT outsourcing is seen as one of potential solutions. This research aims to investigate factors that influence the decision to deploy IT outsourcing approach for e-business transformation among the SMEs. This paper discusses the literature review on e-business and IT outsourcing practices for SMEs. A qualitative method via case study approach is used to gather in-depth understanding of the situation. The expected outcomes from this research will be an IT outsourcing model to assist e-business transformation for SMEs. However, this paper will only discuss findings from the literature review.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}