Nowadays technology is growing fast and always adds new dimensions to our daily lives. In this way, Internet banking systems allow users to manage financial affairs such as checking account balances and transferring money between accounts as fast and easy as it can be. This study is done in Iran and Malaysia, the basic structure in Malaysia causes more concern, as well as use of this new way of banking. Also the differences between traditional and internet banking are more obvious in Malaysia. Therefore, we separately investigated the users of Parsian Bank of Iran- Isfahan Province and CIMB Bank of Malaysia-Kuala Lumpur. For the purpose of validating or disproving the research hypotheses, SPSS software and one sample t-test, two sample t-test, one way ANOVA and correlation analysis was used. Due to the nature of internet banking that occurs in the web network, not face to face, expected security is very important. Therefore, the linkage between security and trust is being investigated and the results show a positive correlation between these two variables. Statistical results show that, age and the level of education affected the attitude toward internet banking. But there is no statistical significant difference of the attitude between genders.
{"title":"Security of Internet Banking Services and its Linkage with Users' Trust: A Case Study of Parsian Bank of Iran and CIMB Bank of Malaysia","authors":"A. Sanayei, A. Noroozi","doi":"10.1109/ICIME.2009.153","DOIUrl":"https://doi.org/10.1109/ICIME.2009.153","url":null,"abstract":"Nowadays technology is growing fast and always adds new dimensions to our daily lives. In this way, Internet banking systems allow users to manage financial affairs such as checking account balances and transferring money between accounts as fast and easy as it can be. This study is done in Iran and Malaysia, the basic structure in Malaysia causes more concern, as well as use of this new way of banking. Also the differences between traditional and internet banking are more obvious in Malaysia. Therefore, we separately investigated the users of Parsian Bank of Iran- Isfahan Province and CIMB Bank of Malaysia-Kuala Lumpur. For the purpose of validating or disproving the research hypotheses, SPSS software and one sample t-test, two sample t-test, one way ANOVA and correlation analysis was used. Due to the nature of internet banking that occurs in the web network, not face to face, expected security is very important. Therefore, the linkage between security and trust is being investigated and the results show a positive correlation between these two variables. Statistical results show that, age and the level of education affected the attitude toward internet banking. But there is no statistical significant difference of the attitude between genders.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years ERP, as a comprehensive new system, has been used by many Malaysian companies. It has been successful in some and in some others it has failed. This article assesses 15 success factors and 8 failure factors in SME companies and tries to recognize the effective ones. The results show that the two most important failure factors in implementing ERP in Malaysian SMEs are 'poor planning or poor management' and 'inappropriate training methods' and the most important success factors are 'Implementing team's teamwork and composition' and ' Effective training of users'. It could be conducted that team work is a key success factor in Malaysian SMEs and also training is of vital importance. As a result, by a sound investment and effective trainings we may guarantee the success of ERP in SMEs in Malaysia, failure to do so will lead to a defeat for ERP in Malaysian setting.
{"title":"To Investigate the Success and Failure Factors of ERP Implementation within Malaysian Small and Medium Enterprises","authors":"Ali Noudoostbeni, N. Yasin, H. S. Jenatabadi","doi":"10.1109/ICIME.2009.66","DOIUrl":"https://doi.org/10.1109/ICIME.2009.66","url":null,"abstract":"In recent years ERP, as a comprehensive new system, has been used by many Malaysian companies. It has been successful in some and in some others it has failed. This article assesses 15 success factors and 8 failure factors in SME companies and tries to recognize the effective ones. The results show that the two most important failure factors in implementing ERP in Malaysian SMEs are 'poor planning or poor management' and 'inappropriate training methods' and the most important success factors are 'Implementing team's teamwork and composition' and ' Effective training of users'. It could be conducted that team work is a key success factor in Malaysian SMEs and also training is of vital importance. As a result, by a sound investment and effective trainings we may guarantee the success of ERP in SMEs in Malaysia, failure to do so will lead to a defeat for ERP in Malaysian setting.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to describe a technique that can make one’s leadership qualities more effective. For this purpose the paper will mainly focus on "Neuro Linguistic Programming" Techniques and portray past great leaders as a supportive argument. Leading is the ability to influence others to follow, by developing trust and commonality. "Neuro Linguistic Programming" effectively helps in developing the perception of a person as a leader by his followers. It also acts as an effective language for thinking patterns.
{"title":"Leading Through NLP","authors":"Manobia Yousaf, Hadia Chaudhry, A. Haider","doi":"10.1109/ICIME.2009.17","DOIUrl":"https://doi.org/10.1109/ICIME.2009.17","url":null,"abstract":"This paper aims to describe a technique that can make one’s leadership qualities more effective. For this purpose the paper will mainly focus on \"Neuro Linguistic Programming\" Techniques and portray past great leaders as a supportive argument. Leading is the ability to influence others to follow, by developing trust and commonality. \"Neuro Linguistic Programming\" effectively helps in developing the perception of a person as a leader by his followers. It also acts as an effective language for thinking patterns.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nurul Zakiah binti Ayob, Ab Razak Che Hussin, H. M. Dahlan
User interface is one of the main challenges for designing mobile application. The importance of user interface is all about to retain user's loyalty which can be gained by offer user friendly interface and usability. The research focus on main issues of designing mobile application which is "how to display all the information and elements on the small screen of mobile device?". This research aims to study and understand mobile human-computer interaction and other issues associated with mobile commerce application by understanding the mobile commerce environment to propose framework for mobile application. In terms of designing for mobile application, the authors has adopt the four existing guideline. There are Shneiderman’s Golden Rules of Interface Design for Mobile, Seven Usability Guideline for Mobile Device, Human-Centred Design and W3C Mobile Web Best Practices . This paper ends with future work that based on the proposed framework.
{"title":"Three Layers Design Guideline for Mobile Application","authors":"Nurul Zakiah binti Ayob, Ab Razak Che Hussin, H. M. Dahlan","doi":"10.1109/ICIME.2009.99","DOIUrl":"https://doi.org/10.1109/ICIME.2009.99","url":null,"abstract":"User interface is one of the main challenges for designing mobile application. The importance of user interface is all about to retain user's loyalty which can be gained by offer user friendly interface and usability. The research focus on main issues of designing mobile application which is \"how to display all the information and elements on the small screen of mobile device?\". This research aims to study and understand mobile human-computer interaction and other issues associated with mobile commerce application by understanding the mobile commerce environment to propose framework for mobile application. In terms of designing for mobile application, the authors has adopt the four existing guideline. There are Shneiderman’s Golden Rules of Interface Design for Mobile, Seven Usability Guideline for Mobile Device, Human-Centred Design and W3C Mobile Web Best Practices . This paper ends with future work that based on the proposed framework.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Against the backdrop of widespread networks in the modern world, this paper aims to study the transformation of network economic system in general and its market structure in specific. It is organized in the mode of "concept introduction-model setup-empirical study". Starting from the concept of "network effects", it is then extended to a simplified model of market structure and the empirical test of global web server market. It is proved theoretically and empirically, that the natural market structure in network economic system tends to be more concentrated and monopolistic, which can hardly be explained merely by misconducts of market players as the conventional wisdom suggested.
{"title":"Market Structure Transformation of Network Economic System: From Theory to Application","authors":"Lifang Zhang, Minghong Zhang","doi":"10.1109/ICIME.2009.50","DOIUrl":"https://doi.org/10.1109/ICIME.2009.50","url":null,"abstract":"Against the backdrop of widespread networks in the modern world, this paper aims to study the transformation of network economic system in general and its market structure in specific. It is organized in the mode of \"concept introduction-model setup-empirical study\". Starting from the concept of \"network effects\", it is then extended to a simplified model of market structure and the empirical test of global web server market. It is proved theoretically and empirically, that the natural market structure in network economic system tends to be more concentrated and monopolistic, which can hardly be explained merely by misconducts of market players as the conventional wisdom suggested.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. A. Zaidan
Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.
{"title":"High Rate Video Streaming Steganography","authors":"Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. A. Zaidan","doi":"10.1109/ICIME.2009.13","DOIUrl":"https://doi.org/10.1109/ICIME.2009.13","url":null,"abstract":"Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Binary Search Tree (BST) is one of the most widely used techniques for searching in non-linear data structure. If the BST is not maintained in optimal shape then the searching and insertion may need extra number of comparisons. In present literature, several BST algorithms have been proposed to maintain the BST in optimal shape. Different researchers have focused mainly on finding the total running time of BST algorithms but no one has focused on solving the mystery of "using which BST algorithm under what scenario". In this paper, we present a thorough comparison of existing techniques that ultimately enables software developers to select a particular BST technique according to the faced data management scenario.
{"title":"A Survey on Maintaining Binary Search Tree in Optimal Shape","authors":"Inayat-ur-Rehman, Sikandar Hayat Khayal","doi":"10.1109/ICIME.2009.128","DOIUrl":"https://doi.org/10.1109/ICIME.2009.128","url":null,"abstract":"Binary Search Tree (BST) is one of the most widely used techniques for searching in non-linear data structure. If the BST is not maintained in optimal shape then the searching and insertion may need extra number of comparisons. In present literature, several BST algorithms have been proposed to maintain the BST in optimal shape. Different researchers have focused mainly on finding the total running time of BST algorithms but no one has focused on solving the mystery of \"using which BST algorithm under what scenario\". In this paper, we present a thorough comparison of existing techniques that ultimately enables software developers to select a particular BST technique according to the faced data management scenario.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The World Wide Web and Internet have been two of the most important developments of information technology which has provided government with capability to increase electronic services. In this paper, at first we will investigate definition of e-government, steps of e-government evolution, its challenges and its situation in our country (Iran). And finally E-city and e-citizen as a vital element in e-government will be discussed.
{"title":"E-government and its Situation in E-city","authors":"Maryam Honarmand","doi":"10.1109/ICIME.2009.140","DOIUrl":"https://doi.org/10.1109/ICIME.2009.140","url":null,"abstract":"The World Wide Web and Internet have been two of the most important developments of information technology which has provided government with capability to increase electronic services. In this paper, at first we will investigate definition of e-government, steps of e-government evolution, its challenges and its situation in our country (Iran). And finally E-city and e-citizen as a vital element in e-government will be discussed.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126540276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A statistical databases (SDBs) are used mainly for statistical queries (such as sum, average, count, etc) on various populations. Users are permitted to retrieve statistical information, but information about specific individual should not be disclosed. The key representation auditing scheme is proposed to protect online and dynamic SDBs from being disclosed. The core idea is to convert the original database D into key representation database D, and each new user query q should be converted from string representation into key representation query q and stored in the Audit Query table (AQ table). We propose three audit stages to repel the attacks of the snooper to the confidentiality of the individuals. These stages enable the key representation auditor (KRA) to conveniently specify the illegal queries which could lead to disclosing the SDB. The proposed scheme that will be applied guarantees the security of SDBs and provides precise and accurate responses, besides it needs less CPU time and storage space during query processing.
{"title":"Three Audit Stages for Securing Statistical Databases","authors":"A. A. Elshiekh, P. Dominic","doi":"10.1109/ICIME.2009.83","DOIUrl":"https://doi.org/10.1109/ICIME.2009.83","url":null,"abstract":"A statistical databases (SDBs) are used mainly for statistical queries (such as sum, average, count, etc) on various populations. Users are permitted to retrieve statistical information, but information about specific individual should not be disclosed. The key representation auditing scheme is proposed to protect online and dynamic SDBs from being disclosed. The core idea is to convert the original database D into key representation database D, and each new user query q should be converted from string representation into key representation query q and stored in the Audit Query table (AQ table). We propose three audit stages to repel the attacks of the snooper to the confidentiality of the individuals. These stages enable the key representation auditor (KRA) to conveniently specify the illegal queries which could lead to disclosing the SDB. The proposed scheme that will be applied guarantees the security of SDBs and provides precise and accurate responses, besides it needs less CPU time and storage space during query processing.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"R-36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Change management is very important to reduce risks and costs and maximizes the benefits of such major changes in business and information technology. Business Process Modeling (BPM) technology continues to face challenges in coping with dynamic business environments where requirements and goals are constantly changing at the execution time. In this research, we propose a framework for change management technique based on the integration between Object Oriented (OO) diagramming technique and Petri Net (PN) modeling language to increase the representation capability for OO modeling for the dynamic changes in the runtime instances.
{"title":"Runtime Change Management Based on Object Oriented Petri Net","authors":"Bassam Rajabi, S. Lee","doi":"10.1109/ICIME.2009.24","DOIUrl":"https://doi.org/10.1109/ICIME.2009.24","url":null,"abstract":"Change management is very important to reduce risks and costs and maximizes the benefits of such major changes in business and information technology. Business Process Modeling (BPM) technology continues to face challenges in coping with dynamic business environments where requirements and goals are constantly changing at the execution time. In this research, we propose a framework for change management technique based on the integration between Object Oriented (OO) diagramming technique and Petri Net (PN) modeling language to increase the representation capability for OO modeling for the dynamic changes in the runtime instances.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}