TOP 10 READ/CITED ARTICLES OF THE MONTH
OCTOBER 2020 INTERNATIONAL JOURNAL OF MANAGING INFORMATION TECHNOLOGY (IJMIT)
http://airccse.org/journal/ijmit/ijmit.html
ISSN: 0975-5586 (ONLINE); 0975-5926 (PRINT)
DEFINING ICT IN A BOUNDARY LESS WORLD: THE DEVELOPMENT OF A WORKING HIERARCHY Colrain M. Zuppo Marion Technical College (MTC)
ABSTRACT Subsequent to rapid information and communication technology development, the scope of the definition of Information and Communication Technologies (ICT or ICTs) has been utilized within diverse contexts including economic development, education, IT, business and personal usage. A review of academic literature, trade publications and general information was undertaken to establish a hierarchy of applications for the term ICT or ICTs.
KEYWORDS ICT, ICTs, education, economics, digital communication, hierarchy
For More Details:
http://airccse.org/journal/ijmit/papers/4312ijmit02.pdf
Volume URL: http://airccse.org/journal/ijmit/vol4.html
REFERENCES [1] International Telecommunication Union. (2007). Measuring village ICT in sub-Saharan Africa.
Retrieved from http://www.itu.int/ITU-D/ict/statistics/material/Africa_Village_ICT_2007.pdf. [2] United Nations University. (2010). Greater Access to Cell Phones than Toilets in India. Retrieved from http://www.inweh.unu.edu/News/2010-04_UNU-INWEH_News-Release_Sanitation.pdf . [3] International Telecommunication Union. (n.d.). Who we are. Retrieved,from http://www.itu.int/en/about/Pages/default.aspx. [4] World Health Organization. (2011). 2011-last update: Information and communication technologies for public health emergency management. Retrieved from http://www.who.int/csr/ict4phem/en/index.html [5] World Health Organization. (2006). Health aspects of disaster preparedness and response: Report from a regional meeting of countries of South East Asia, Bangkok, Thailand, 21-23 November 2005. Prehospital & Disaster Medicine, 21(5), 62-78. [6] Yang, C., Yang, J., Luo, X., and Gong, P. (2009). Use of mobile phones in an emergency reporting system for infectious disease surveillance after the Sichuan earthquake in China. Bulletin of the World Health Organization, 87(8), 619-623. [7] Organisation for Co-operation and Development (OECD). (2002). Retrieved from http://www.oecd.org/dataoecd/63/60/1933354.pdf. [8] Angeleski, M., Mitrevski, P., and Janeska, M. (2009). “Composite index of e-business strategy readiness of the enterprises in the Republic of Macedonia” in ICT Innovations 2009, Davcev, D., and Marx Gomex, J., (Eds.), p. 265-275. Springer-Verlag Berlin Heidelberg, Scientific Publishing Services Pvt. Ltd. [9] Cohen, D., Garibaldi, P., and Scarpetta, S., (Eds.). (2004). The ICT Revolution: Productivity, Differences and the Digital Divide. Oxford University Press, University of Oxford. [10] Educational Testing Service. (2007). Digital transformation: A framework for ICT literacy. A report of the International ICT Literacy Panel. Retrieved from http://www.ets.org/Media/Tests/Information_and_Communication_Technology_Literacy/ictreport.pd f. [11] Jarnieson-Proctor, R., Watson, G., Finger, G., Grimbeek, P., & Burnett, P. C. (2007). Measuring the use of Information and Communication Technologies (ICTs) in the classroom. Computers in the Schools, 24(1/2), 167-184. doi:10.1300/J025v24n01̱11. [12] Clark, L., Demont-Heinrich, C., & Webber, S. (2005). Parents, ICTs, and children's prospects for success: Interviews along the digital “Access Rainbow”. Critical Studies in Media Communication, 22(5), 409-426. doi:10.1080/07393180500342985. [13] Selwin, N., Gorard, S., & Furlong, J. (2006). Adult learning in the digital age: Information technology and the learning society. Routledge, Taylor & Francis Group.
[14] Zhang, P., Aikman, S., & Sun, H. (2008). Two types of attitudes in ICT acceptance and use. International Journal of Human Interaction, 24(7), 628-648. doi: 10.1080/10447310802335482. [15] Information Technology Infrastructure Library [ITIL]. (n.d.). ITIL glossaries. Retrieved from http://www.itil-officialsite.com/InternationalActivities/ITILGlossaries_2.aspx.
[16] TechTerms.com. (n.d.). Definition of ICT. Retrieved from http://www.techterms.com/definition/ict.
[17] Innovation Value Institute at National University of Ireland Maynooth. (n.d.). IVI and CEPIS develop European Framework for ICT Professionalism. Retrieved from http://ivi.nuim.ie/newsevents/ivi-andcepis-develop-european-framework-ict-professionalism [18] Institute of IT Professionals, New Zealand. (n.d.). ITCP – IT Certified Professional. Retrieved from http://www.itcp.org.nz/about [19] Professional Standards Board, Australian Computer Society. (2012.). The ICT professional body of knowledge. Retrieved from http://www.acs.org.au/__data/assets/pdf_file/0007/7792/The-ICTProfessionBody-of-Knowledge-July-2012.pdf [20] Galperin, H., and Mariscal, J. (2007). Digital Poverty: Latin American and Caribbean Perspectives. International Development Research Centre, Intermediate Technology Publications Ltd. [21] National Geographic News. (2005). The deadliest tsumani in history? Retrieved from http://news.nationalgeographic.com/news/2004/12/1227_041226_tsunami.html. [22] The Telegraph. (2011). Japan earthquake, tsunami and Fukushima nuclear disaster: 2011 review. Retrieved from http://www.telegraph.co.uk/news/worldnews/asia/japan/8953574/Japan-earthquaketsunami-and-Fukushimanuclear-disaster-2011-review.html.
AUTHOR Colrain M. Zuppo earned a PhD in Technology Management from Indiana State University with a specialization in Human Resource Development and Industrial Training. Cori’s dissertation research was entitled “Organizations as consumers of human capital via technology: A policy study of information and communication technologies”. Cori also holds an M.A.Ed. from The George Washington University and a B.S. in Conflict Resolution from Ohio University. Cori is a Professor in the Department of Business and Information Technology at Marion Technical College (MTC) and served as part time faculty and doctoral fellow at Bowling Green State University, conducting research and teaching in the areas of technology management, academic research and instructional design & delivery.
A REVIEW OF ICT TECHNOLOGY IN CONSTRUCTION Ehab J.Adwan1 and Ali Al-Soufi2 1&2
Department of Information Systems, University of Bahrain, Kingdom of Bahrain
ABSTRACT A growing awareness in the construction industry has emerged to pay a sharp attention to ICT as a catalyst that would mitigate the deficiencies characterized by this industry. In comparison with other cited review articles, this paper is aimed to 1) compile the research published on “ICT Technologies” in correspondence to “Construction Tasks” in the construction industry over the past two decades (19962016), 2) demonstrate the trends and patterns in the use of different types of ICT Technologies 3) discuss the correspondence of the identified ICT Technologies to the identified Construction Tasks and 4) exhibit the construction needs of ICT. By the employment of a five phases profiling methodology, a set of 68 out of 202 articles and papers indexed by Elsevier’s Scopus database was considered relevant for the current review paper. This research is targeting the beginning researchers and practitioners in the field of ICT in construction. KEYWORDS Construction industry, Information, Technology, Ict, Construction Tasks, Article review. FOR MORE DETAILS: http://aircconline.com/ijmit/V8N4/8416ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol8.html
REFERENCES [1] C. Carter, T. Hassan, and M. Merz, “The eLegal project: specifying legal terms of contract in ICT environment”, International Journal of Information technology in Construction, 6, 136. 2001. [2] M. Sarshar, U. Isikdag, “A survey of ICT use in the Turkish construction industry”, in Engineering, Construction and Architectural Management, 2004, 11(4), 238-247. [3] A.Andrews, J. H. Rankin, and L. M. Waugh, “A framework to identify opportunities for ICT support when implementing sustainable design standards”. Journal of Information technology in Construction, 11, 2006, 17-33. [4] Y. Rezgui, A. Zarli, and C. J. Hopfe, “Editorial-Building Information Modeling Applications, Challenges and Future Directions”, Journal of Information Technology in Construction, 14, 613-616. 2009. [5] B. Erdogan, C. Abbott, and G. Aouad, “Construction in year 2030: developing an information technology vision,” in Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 368(1924), 3551-3565. 2010. [6] A. Sextos, “ICT applications for new generation seismic design, construction and assessment of bridges.” Structural Engineering International, 24(2), 173-183. 2014. [7] E. O. Ibem and S. Laryea, “Survey of digital technologies in procurement of construction projects”, Automation in Construction, 46, 11-21. 2014. [8] M. Martínez-Rojas, N. Marin, and M.A. Vila, “The role of information technologies to address data handling in construction project management.” Journal of Computing in Civil Engineering, 04015064. 2015. [9] R.Amor, M. Betts, G. Coetzee, and M. Sexton. “Information technology for construction: recent International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 19 work and future directions”, 7(16), 245-258. 2002. [10] Y.S. Ampofo, B. Bizimana, J. Mbuthi, I. Ndayambaje, N. Ogetta, and A.J. Orodho, “Information Communication Technology Penetration and its Impact on Education: Lessons of Experience from Selected African Countries of Ghana, Kenya and Rwanda“, Journal of Information Engineering and Applications, 4 (11), pp.84-95. 2014. [11] N. Mutesi, “Application of ICT in the Construction Industry in Kampala” in Advances in Engineering and Technology: Contribution of Scientific Research in Development: Proceedings of the Second International Conference on Advances in Engineering and Technology, Kampala. Makrere University.Tanzania. 2009. [12] B. Bjork, “A framework for discussing information technology applications in construction” in CIB Working Commission W78 workshop." Information Technology Support for Construction Process Reengineering", Cairns, Australia, 1997. [13] W. El-Ghandour and M. Al-Hussein. “Survey of information technology applications in construction”, Construction innovation, 4(2), 83-98. 2004. [14] J.M. Doherty. “A survey of computer use in the New Zealand building and construction industry”. Electronic Journal of Information technology in Construction, Vol 2, 1-13. 1997. [15] C. L. Perkinson and I. U. Ahmad. “Computing Technology Usage in Construction Contractor Organizations.” In Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET’2006), Breaking Frontiers and Barriers in Engineering: Education, Research and Practice, 2006. [16] H. J. Chien and S. Barthorpe. “The current state of information and communication technology usage by small and medium Taiwanese construction companies”. Journal of Information Technology in Construction, 15(5), 75-85. 2010.
[17] M. Jacobsson and H. Linderoth. “The influence of contextual elements, actors’ frames of reference, and technology on the adoption and use of ICT in construction projects: a Swedish case study”. Construction Management and Economics, 28(1), 13-23. 2010. [18] T. M. Hassan and R. McCaffer. “Vision of the large scale engineering construction industry in Europe”. Automation in construction, 11(4), 421-437. 2002. [19] V. Peansupap and D. Walker. “Factors affecting ICT diffusion: A case study of three large Australian construction contractors”. Engineering, Construction and Architectural Management, 12(1), 21-37. 2005. [20] Oladapo, A. A. “An investigation into the use of ICT in the Nigerian construction industry”. Journal of Information Technology in Construction, 12(18), 261–277. 2007. [21] P. T. Lam, F. W. Wong, and K. T. Tse,. “Effectiveness of ICT for construction information exchange among multidisciplinary project teams”. Journal of Computing in Civil Engineering, 24(4), 365-376. 2009 [22] R. Jardim-Goncalves and A. Grilo. “SOA4BIM: Putting the building and construction industry in the Single European Information Space”. Automation in Construction, 19(4), 388-397. 2010. [23] E.K. Zavadskas and A. Kaklauskas. “Advanced information and communication technologies in construction”. in The 25th International Symposium on Automation and Robotics in Construction ISARC–2008, 2008, 39–45. [24] S. Alkalbani, Y. Rezgui, C. Vorakulpipat, and I.E. Wilson. “ICT adoption and diffusion in the construction industry of a developing economy: The case of the sultanate of Oman.” Architectural Engineering and Design Management, 9(1), 62-75. 2013. [25] R. Davies, and C. Harty. “Measurement and exploration of individual beliefs about the consequences of building information modelling use.” Construction Management and Economics, 31(11), 1110- 1127. 2013. [26] H. Penttilä. “Describing the changes in architectural information technology to understand design complexity and free-form architectural expression”. Journal of Information Technology, 19(29), 395408. 2006. [27] P.A. Jensen, P. A. and E.I. Jóhannesson. “Building Information Modelling in Denmark and Iceland. Engineering”, Construction and Architectural Management, 20(1), 99-110. 2013. [28] M. Jacobsson and H.C. Linderoth. “User perceptions of ICT impacts in Swedish construction International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 20 companies:‘it’s fine, just as it is’. Construction management and economics, 30(5), 339-357. 2012. [29] P. Chaisuparasmikul. “Bidirectional Interoperability Between CAD and Energy Performance Simulation Through Virtual Model System Framework.” in Proceedings: ACADIA, 2006, 12-15. [30] G.E. Farin, J. Hoschek, and M.S. Kim. Handbook of computer aided geometric design. Elsevier. 2002. [31] N. Berente, R. Baxter,and K. Lyytinen. “Dynamics of inter‐organizational knowledge creation and information technology use across object worlds: the case of an innovative construction project.” Construction Management and Economics, 28(6), 569-588. 2010. [32] G. Brewer and T. Gajendran. “Emerging ICT trends in construction project teams: a Delphi survey.” Journal of Information Technology in Construction, 14, 81-97. 2009. [33] C. Evia. “Localizing and designing computer-based safety training solutions for Hispanic construction workers.” Journal of Construction Engineering and Management, 137(6), 452-459. 2010.
[34] Y. Zhu, R. Zhang, and I. Ahmad. “Applying concept similarity to the evaluation of common understanding in multidisciplinary learning.” Journal of Computing in Civil Engineering, 24(4), 335344. 2009. [35] J. H. Rankin and R. Luther. “The innovation process: adoption of information and communication technology for the construction industry”. Canadian Journal of Civil Engineering, 33(12), 1538- 1546. 2006. [36] M. Benza, C. Bersani, E. Garbolino, D. Giglio, S. Olampi, R. Sacile, and E. Trasforini. "A distributed information system prototype to detect and monitor the Hazardous Material Transport on the road in the territory of Nice-Imperia-Ventimiglia.” WIT Transactions on The Built Environment, 2007, 94. [37] C.S. Leem and B.G. Kim. “Taxonomy of ubiquitous computing service for city development.” Personal and ubiquitous computing, 17(7), 1475-1483. 2013. [38] Z. Riaz, D.J. Edwards, G. D. Holt, and T. Thorpe. “Data flow analysis of plant and equipment health and safety management..” Journal of Engineering, Design and Technology, 9(2), 178-203. 2011. [39] F. Al-Neshawy, J. Piironen, S. Peltola, E. Sistonen, and J. Puttonen. “Network system for assessing the moisture and thermal behaviour of repaired concrete building facades..”, Journal of Information technology in Construction, Vol. 16, pg. 601-616. 2011. [40] Z. Han, T. Froese. “Project Information Management in Mega Oil Sands Projects. ”. Building a Sustainable Future: pp. 71-80.pp. 71-80. 2009. [41] A.P. Chassiakos. “The Use of Information and Communication Technologies in Construction.” Civil Engineering Computations: Tools and Techniques. Saxe-Coburg Publications, Stirlingshire, UK, Chapter 5, pp 79-104, 2007. [42] Y. Nielsen, and O. Koseoglu. “Wireless networking in tunnelling projects.” Tunnelling and underground space technology, 22(3), 252-261. 2007. [43] T. Molony. “The role of mobile phones in Tanzania’s informal construction sector: The case of Dar es Salaam”. In Urban Forum, 2008. 19-2, pp. 175-186. [44] N. Suman, D. Ursic, M. Psunder, and D. Veselinovic. “Mobile information and communication technology and management of business changes in construction companies in Slovenia.” Systemic Practice and Action Research, 22(5), 397-411. 2009. [45] S. Bowden, A. Dorr, T. Thorpe, and C. Anumba. “Mobile ICT support for construction process improvement.”” Automation in construction, 15(5), 664-676. 2006. [46] B. Graham and K. Thomas. “An investigation into the development of knowledge management systems within the leading Irish construction companies.. ” In Khosrowshahi, F. (ed.), 21st Annual ARCOM Conference, 7-9 September 2005, School of Oriental and African Studies. Association of Researchers in Construction Management, 2005, Vol. 1, 499-508. [47] L. C. Tang, Y. Zhao, S. Austin, M. Darlington, and S. Culley, S. “Codification vs personalisation: A study of the information evaluation practice between aerospace and construction industries.” International Journal of Information Management, 30(4), 315-325. 2010. [48] P. Zhang and F.F. Ng. “Explaining knowledge-sharing intention in construction teams in Hong Kong.” Journal of Construction Engineering and Management, 139(3), 280-293. 2013. International Journal of Managing Information Technology (IJMIT) Vol.8, No.3/4, November 2016 21
[49] P. Inyim, J. Rivera, and Y. Zhu. “Integration of building information modeling and economic and environmental impact analysis to support sustainable building design.” Journal of Management in Engineering, 31(1), A4014002. 2014. [50] T. M. Froese. “The impact of emerging information technology on project management for construction.” Automation in construction, 19(5), 531-538. 2010. [51] S. Dehlin, and T. Olofsson. “An evaluation model for ICT investments in construction projects.” Journal of Information Technology in Construction, 13, 343-361. 2008. [52] W. Sher, S. Sherratt, A. Williams, and R. N. Gameson. “Heading into new virtual environments: what skills do design team members need?.” Journal of Information Technology in Construction, 14, 1729. 2009. [53] P. Christiansson, K. Svidt, K.B. Sørensen, and U. Dybro. “User participation in the building process.” Journal of Information Technology in Construction, 16, 309-334. 2011. [54] A. Ekholm and M. Molnar. “ICT development strategies for industrialisation of the building sector.”Journal of Information Technology in Construction, 14(special issue), 429-444. 2009.
AUTHOR Ehab J.Adwan is a Ph.D. candidate. He received his M.Sc. degree in Computer Science in 2004 from the University of Bahrain (UOB) and received his B.Sc. degree in Electronics and Physics with a minor in Computer in the year 1996 from The American University in Cairo (AUC). Since 1996, he is working as an Academic Research and Teaching Assistant (B) at the Department of information systems- College of Information Technology at the University of Bahrain. His mainstream research is focused on Enterprise Architecture, Business Architecture, Information Systems Architecture, Software Architecture, Software Engineering and Systems Analysis and Design,. Currently, great research emphasis is carried out on the ICT in Construction industry through an Enterprise Architecture perspective. Dr. Ali AlSoufi is an Associate professor of Information Systems at University of Bahrain. He has earned his PhD in Computer science in 1994 from Nottingham University, UK. He has worked for Bahrain Telecom Co for 8 years as a Senior Manager Application Programme where he overlooked number of mega IS Application projects. Worked at Arab Open University as the head of IT program and Assistant Director for Business Development during 2007-2010. He is a PT consultant in Bahrain e-Government Authority (EGA) in Enterprise Architecture. He is an active member of the Bahrain National ICT Governance Committee. His specializations is Strategic IT Planning and Governance, IT project management, Enterprise Architecture and IS in Organization
THE CONTRIBUTION OF ELECTRONIC BANKING TO CUSTOMER SATISFACTION: A CASE OF GCB BANK LIMITED –KOFORIDUA Martin Otu Offei and Kwaku Nuamah-Gyambrah Koforidua Polytechnic , Ghana ABSTRACT Internet banking has the potential to provide fast and reliable services to customers for which they are relatively happy. Due to the technological changes taking place all over the world, many institutions, including the banking sector have taken giant steps to move in tandem with these changes. In this light most banks, with GCB Bank, Ghana, not being an exception have introduced electronic banking in order to decongest the banking halls of customers who spend time unending in order to transact business. The purpose of this research was to assess the Contribution of Electronic Banking to Customer Satisfaction at GCB Bank-Koforidua, to this end some objectives were set for the study. These were: To assess the availability of electronic banking facilities at GCB Bank, Koforidua. To assess the knowledge and patronage of internet banking services by customers, to examine the effectiveness of the usage of electronic banking facilities, to examine the problem facing an internet banking in GCB Bank, Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools for data collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch. Findings from analysis of data revealed that though there was the existence of internet banking facilities of the bank, respondents of the study were not fully aware of the existence of such facilities. It was also found that the use of internet banking was quite expensive and that though the bank was utilizing the facility, customers were not fully patronizing them. It was concluded that internet banking brings efficiency in the operations of the bank. Finally, the study recommended that all branches of GCB Bank adopt internet banking facilities to help in effective banking operations and transactional purposes. To maximize the operations and potential of the bank management must endeavor to educate the customers about the existence of internet banking facilities since a few customers were aware of the existence of such facilities.
KEYWORDS Internet banking, customer satisfaction, contribution, Ghana, ATM Cards, master cards, visa, debit & credit cards
FOR MORE DETAILS: http://aircconline.com/ijmit/V8N1/8116ijmit01.pdf VOLUME LINK: http://airccse.org/journal/ijmit/vol8.html
REFERENCES [1] Acquah, P.A. (2006). Evaluating the Banking System in Ghana. Accra: Fifth Banking Awards Ceremony [2] Agboola, A.A. (2006). Electronic Payment Systems and Tele banking Services in Nigeria journal of Internet Banking and Commerce, 11. [3] Akinci, S., Aksoy, S. and Atilgan E. (2004).Adoption of Internet Banking among Sophisticated Consumer Segments in an Advanced Developing Country. International Journal of Bank Marketing, Vol. 22 No. 3, pp. 212-232 [4] Akoh, B. (2001). E-Business in the Developing World, Africa and Ethiopia. In Conference on Information and Communication Technology and Development. [5] Babin, B. J., Carr, J. C., and Griffin, M. (2010).Business Research Methods. 8 th Edition.SouthWesternCengage Learning. [6] Bauer, C., &Colgan, J. (2001). Planning for electronic commerce strategy: an explanatory study from the financial services sector. Logistics Information Management, 14(1/2), 24-32. [7] Fraenkel, J. R., Wallen, N. E., & Hyun, H. H. (1993). How to design and evaluate research in education (Vol. 7). New York: McGraw-Hill. [8] Gurau, C. (2002). E-banking in transition economies: The case of Romania. Journal of Financial Services Marketing, 6(4), 362-378. [9] Haque, A. K. M., Ismail, A. Z., &Daraz, A. H. (2009). Issues of e-banking transaction: an empirical investigation on Malaysian customers perception. Journal of applied Sciences, 9(10), 18701879. [10] Hughes, T. (2001). Market Orientation and the Response of UK Financial Services Companies to Changes in Market Condition as a Result of E-Commerce.International Journal of bank marketing, 19 (6), 222 – 231. [11] Jayawardhena, C., & Foley (2000). Changes In The Banking Sector – The Case of Internet Banking in the UK, Internet Research: Electronic Networking Applications and Policy, Vol. 10, No. 1, pp. 19-30. [12] Li, F. (2001). The Internet and the Deconstruction of the Integrated Banking Model, British Journal of Management, Vol. 12, pp. 307-22. [13] Mols, N. P. (1999) The Internet and the Banks’ Strategic Distribution Channel Decisions, International Journal of Bank Marketing, 17 (6), pp.245-300. [14] Moutinho, L., &Meidan, A. (1989). Bank Customers’ Perceptions, Innovations and New Technology, International Journal of Bank Marketing, Volume 7 No. 2, pp. 22-27. [15] Polatoglu, V. N. andEkin, S. (2001).An Empirical Investigation of the Turkish Consumers’ Acceptance of Internet Banking Services. International Journal of Bank Marketing, 19(4), 156-165. [16] Robinson, G. (2000). Bank to the future. Internet Magazine. [17] Rogers, E. (2003).Diffusion of Innovations, 5th edn Free Press. New York. [18] Rotchanakitumnuai, S., &Speece, M (2003). Barriers to Internet Banking Adoption: a qualitative study among corporate customers in Thailand. International Journal of Bank Marketing, vol. 21, no.6/7, pp. 321-23. [19] Sathye, M. (1999). Adoption of Internet Banking by Australian Consumers: An empirical
investigation, International Journal of Bank Marketing, Vol. 17 No. 7, pp. 324-34. [20] Shittu, O. L. O. R. U. N. S. E. G. U. N., & FULFILMENT, I. P. (2010). The Impact Of Electronic Banking In Nigeria Banking System (Critical Appraisal Of Unity Bank (PLC). LadokeAkintola University of Technology, Ogbomoso. [21] Steven, A. (2002). Information systems: The Foundation of E-Business. New Jersey: Anderson, 1136. [22] Thornton, J., & White, L., .(2001) Customer Orientations and Usage of Financial Distribution Channels, International Journal of Bank Marketing, Volume 15 No. 3, pp. 168-185. [23] Turban, E., Lee, J., King, D., Chung, M., (2000) Electronic Commerce: A Managerial Perspective, Prentice Hall International, Inc:New Jersey. [24] Twumasi, P. A. (2001). Social Research in Rural Communities, 2nd Ed. Accra: Ghana Universities Press. [25] Wisdom, K (2012).The Impact of Electronic Banking on Service Delivery to Customers of Ghana Commercial Bank Limited. A Study of Ghana Commercial Bank Ltd. Ho Polytechnic Branch. [26] Yasuharu, U. (2003).The Effects of Information System Investment in Banking Industry
A NEW CONCEPT OF R&D IN NEO OPEN INNOVATION TRANSFORMATION OF R&D TRIGGERED BY AMAZON Yuji Tou1, Chihiro Watanabe 2, 3, Kuniko Moriya 2, 4, Victor Vurpillat5, Pekka Neittaanmäki2, 1 Tokyo Institute of Technology, Japan 2 University of Jyväskylä, Finland, 3 International Institute for Applied Systems Analysis (IIASA), Austria, 4 Research and Statistics Department, Bank of Japan, Japan and 5 Global Connexus Inc., USA
ABSTRACT Amazon was the world’s top R&D firm in 2017. Its R&D investment was double that of 2015, quintuple that of 2012, and tenfold that of 2011. It deploys a unique R&D model as conducting “routine or periodic alternations” and “significant improvement” simultaneously. Since traditionally the former is classified as non-R&D, Amazon’s rapid and notable increase has raised the question of a new R&D definition in the digital economy. By means of an empirical analysis of the Amazon’s R&D model, this paper attempted to provide a convincing answer to this question. Amazon has invested considerable resources in extremely innovative business areas, which has developed its assimilation capacity. In parallel with such forefront innovation, Amazon is endeavoring to absorb soft innovation resources from external markets and assimilate them into its business model. This then transforms “routine or periodic alternations” into “significant improvement”, leading to the company becoming the world’s top R&D firm. Such an endeavor has triggered a new concept of R&D in neo open innovation and revealed the significance of a transformation of the R&D concept in the digital economy.
KEYWORDS R&D, neo open innovation, Amazon, transformation, technology and content For More Details: http://aircconline.com/ijmit/V11N1/11119ijmit02.pdf
Abstract URL: http://aircconline.com/abstract/ijmit/v11n1/11119ijmit02.html Volume URL: http://airccse.org/journal/ijmit/vol11.html
REFERENCES [1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018. Neo Open Innovation in the Digital Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information Technology 10 (4), 53-75. [2] Bloomberg, 2017. 2017 Global Innovation 1000 Study. Bloomberg, New York. [3] Fox, J., 2018. Amazon, the Biggest R&D Spender, Does Not Believe in R&D. Bloomberg Opinion, 13 April 2018. https://www.bloomberg.com/view/articles/2018-04-12/amazon-doesn-t-believe-in research-and-development-spending (retrieved 22.09.2018) [4] Gershgorn, D., 2018. Amazon’s R&D Spending is Poised to Top the GDP of Iceland. Quarts, 28 December 2018. [5] World Bank, 2018. National Accounts Data. World Bank, Washington, D.C. [6] Watanabe, C., Tou, Y. & Neittaanmäki, P., 2018b. A New Paradox of the Digital Economy: Structural Sources of the Limitation of GDP Statistics, Technology in Society 55, 9-33. [7] Watanabe, C., Naveed, K., Tou, Y. & Neittaanmäki, P., 2018c. Measuring GDP in the Digital Economy: Increasing Dependence on Uncaptured GDP. Technological Forecasting and Social Change 137, 226-240. [8] Watanabe, C., Naveed, K., Neittaanmäki, P., 2015. Dependency on Un-captured GDP as a Source of Resilience beyond Economic Value in Countries with Advanced ICT Infrastructure: Similarities and Disparities between Finland and Singapore. Technology in Society 42, 104–122. [9] Watanabe, C., Naveed, K., Neittaanmäki, P., Tou, Y., 2016. Operationalization of Un-captured GDP: The Innovation Stream under New Global Mega-trends. Technology in Society 45, 58–77. [10] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random House LLC, New York. [11] Naveed, K., Watanabe, C. & Neittaanmäki, P., 2018. The Transformative Direction of Innovation toward an IoT-based Society: Increasing Dependency on Uncaptured GDP in Global ICT Firms. Technology in Society 53, 23-46. [12] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B, Ed. The Global Internet Economy. MIT Press, Massachusetts. [13] Knott, A.M., 2017. How Innovation Really Works: Using the Trillion-Dollar R&D fix to Drive Growth. McGraw Hill, New York. [14] Green, T., 2018. How Much does Amazon Spend on R&D? Less than You Think. The Motley Fool, 13 June 2018. https://www.fool.com/investing/2018/06/13/how-much-does-amazon-spend-on-rd-less than-you-thi.aspx (retrieved 10.01.2019). [15] Amazon, 2018a. Amazon Com. Inc. Annual Report 2017. Amazon.Com, Inc., Seattle. http://www.annualreports.com/Company/amazoncom-inc (retrieved 06.01.2019). [16] Amazon, 2018b. Amazon Leadership Principles. Amazon.Com, Inc., Seattle. https://www.amazon.jobs/en/principles (retrieved 20.11.2018). [17] Apple, 2018. Apple Inc. Annual Report 2017. Apple Inc., https://investor.apple.com/investor-relations/financial-information/(retrieved 06.01.2019).
Cupertino.
[18] Financial Accounting Standards Board (FASB) Accounting Standards Codification (ASC), 2018. Generally Accepted Accounting Principles (GAAP) for Business. FASB, ASC, Washington, D.C.
[19] National Science Foundation (NSF), 2018. Definitions of R&D: An Annotated Compilation of Official Sources. NSF, Alexandria, Virginia, USA. https://www.nsf.gov/statistics/randdef/#chp3. (retrieved 10.01.2019). [20] Watanabe, C., Naveed, N. & Neittaanmäki, P., 2018a. Digital Solution Transform the Forest-based Bioeconomy into a Digital Platform Industry: A Suggestion for a Disruptive Business Model in the Digital Economy. Technology in Society 54, 168-188. [21] Jenkins, J., 2011. How Amazon. Com Migrated to AWS. 2011 AWS Tour Australia, Closing Keynote. https://www.slideshare.net/AmazonWebServices/2011-aws-tour-australia-closing-keynote-how amazoncom-migrated-to-aws-by-jon-jenkins (retrieved 10.01.2019). [22] Yahoo! Finance, 2018. Amazon.com, Inc. (AMZN), https://finance.yahoo.com/quote/AMZN/history (retrieved 10.01.2019). [23] Yahoo! Finance, 2018. Apple Inc. (AAPL), https://finance.yahoo.com/quote/AAPL/history (retrieved 10.01.2019).
Historical
Historical
Data.
Data.
[24] Colin, N., 2016. 11 Notes on Amazon. The Family Papers #010. 18 Jan. 2016. https://salon.thefamily.co/11-notes-on-amazon-part-1-cf49d610f195 (retrieved 06.01.2019). [25] O’Reilly, T., 2003. The Open Source Paradigm Shift. O’Reilly & Associates, Inc., Sebastopol. https://www.oreilly.com/tim/archives/ParadigmShift.pdf (retrieved 10.01.2019). [26] Watanabe, C., Takayama, M., Nagamatsu, A., Tagami, T. and Griffy-Brown, C., 2002. Technology Spillover as a Complement for High Level R&D Intensity in the Pharmaceutical Industry. Technovation 22 (4), 245-258. [27] Rivet, D.J., 2017. Amazon’s Superior Innovation: A Study of Amazon’s Corporate Structure, CEO, and Reasons behind Why It has become the Most Innovative Company in Today’s Market. University of New Hampshire Honors Theses and Capstone 343, University of New Hampshire, Durham. https://scholars.unh.edu/honors/343 (retrieved 10.01.2019
AUTHORS Yuji Tou graduated from Tokyo Institute of Technology, Japan, and is currently specially appointed associate professor at Tokyo Institute of Technology, Japan Chihiro Watanabe graduated from the University of Tokyo, Japan, and is currently Professor Emeritus at the Tokyo Institute of Technology, a research professor at the University of Jyväskylä, Finland, and a research scholar at the International Institute for Applied Systems Analysis (IIASA). Kuniko Moriya graduated from Aoyama Gakuin University, Japan, and is currently is currently Director of the Bank of Japan. Victor V. Vurpillat graduated from Calfornia State Polytechnic University, USA, and is currently Chairman of the Board and Director of Research, Global Connexus Inc., USA Pekka Neittaanmäki graduated from the University of Jyväskylä with a degree in Mathematics. He is currently Professor of the Faculty of Information Technology, University of Jyväskylä, Finland.
A SOLUTION TO THE DILEMMA BETWEEN R&D EXPANSION AND THE PRODUCTIVITY DECLINE: LESSONS FROM THE R&D MODELS IN AMAZON AND FINLAND Yuji Tou1, Chihiro Watanabe 2,3, Kuniko Moriya4,2, Pekka Neittaanmäki2 , 1 Tokyo Institute of Technology, Japan, 2 University of Jyväskylä, Finland, 3 International Institute for Applied Systems Analysis (IIASA), Austria and 4 Research and Statistics Department, Bank of Japan, Japan
ABSTRACT As a consequence of the two-faced nature of information and communication technology (ICT), a majority of ICT leaders have been confronting the critical problem of a dilemma between R&D expansion and productivity decline in the digital economy. However, Amazon has been able to accomplish a skyrocketing increase in R&D and market capitalization. Finland has also accomplished balanced advancement not only of welfare but also economic resurgence. This paper attempted to elucidate the miracle of two ICT leaders. By means of a comparative empirical analysis of respective development trajectories, the sources of their success were analyzed thereby the comparative advantage and disadvantage of each respective trajectories supportive to find a practical solution to the critical problem of a dilemma were identified. The sources of both successes can be attributed to harnessing the vigor of soft innovation resources from the marketplace. However, contrary to Amazon’s complementary use, Finland has depended on substitutionary use. While this approach contributes to easy resurgence, it casts a shadow to the innovative growth in the future. An insightful suggestion regarding balanced sustainable growth by cross learning was thus provided.
KEYWORDS Digital economy, soft innovation resources, Amazon, Finland, dilemma between R&D and productivity
For More Details:
http://aircconline.com/ijmit/V11N2/11219ijmit02.pdf
Abstract URL: http://aircconline.com/abstract/ijmit/v11n2/11219ijmit02.html http://airccse.org/journal/ijmit/vol11.html
REFERENCES [1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018b. Neo Open Innovation in the Digital Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information Technology 10 (4), 53-75. [2] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2019b. Harnessing Soft Innovation Resources Leads to Neo Open Innovation. Technology in Society, in print. [3] B loomberg, 2017. 2017 Global Innovation 1000 Study. Blo omberg, New York. [4] Fox, J., 2018. Amazon, the Biggest R&D Spender, Does Not Believe in R&D. Bloomberg Opinion, 13 April 2018. https://www.bloomberg.com/view/articles/2018-04-12/amazon-doesn-t-believe-inresearch-anddevelopment-spending (retrieved 22.09.2018). [5] Statista, 2019. Top Internet Companies: Global Market Value 2018. Statista, Hamburg. https://www.statista.com/statistics/277483/market-value-of-the-largest-internet-companiesworldwide/ (retrieved 10.01.2019). [6] Macrotrends, 2019. Apple Market Cap 2006-2018 – AAPL, https://www.macrotrends.net/stocks/charts/AAPL/apple/market-cap (retrieved 08.02.2019).
Chicago.
[7] Macrotrends, 2019. Amazon Market Cap 2006-2018 – AMZN, Chicago. https://www.macrotrends.net/stocks/charts/AMZN/amazon/market-cap (retrieved 08.02.2019). [8] Tou, Y., Watanabe, C., Moriya, K., Vurpillat, V., & Neittaanmäki, P., 2019a. A New Concept of R&D in Neo Open Innovation: Transformation of R&D Triggered by Amazon. International Journal of Managing Information Technology 11 (1) in print. [9] Tou, Y., Watanabe, C., Ilmola, L., Moriya, K. and Neittaanmäki, P., 2018a. Hybrid Role of Soft Innovation Resources: Finland’s Notable Resurgence in the Digital Economy. International Journal of Managing Information Technology 10 (4), 1-22. [10] International Monetary Fund (IMF), 2018. World Economic Outlook Database 2018. IMF, Washington, D.C. https://www.imf.org/external/datamapper/NGDP_RPCH@WEO/OEMDC/ADVEC/WEOWORLD (retrieved 06.02.2019). [11] United Nations, 2018. World Happiness Report 2018. United Nations, New York. http://worldhappiness.report/ed/2018/ (retrieved 10.01.2019) [12] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B, Ed. The Global Internet Economy. MIT Press, Massachusetts. [13] R i tala, P., Golnam, A. & Wegmann, A., 2014. Coopetition based Business Models: The Case of Amazon.com. Industrial Marketing Management 43, 236 249. [14] K nott, A.M., 2017. How Innovation Really Works: Using the Trillion Dollar R&D fix to Drive Growth. McGraw Hill , New [15] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random House LLC, New York. [16] Khan, L.L., 2017. Amazon’s Antitrust Pradox. The Yale Law Journal 126, 710-805. [17] OECD, 2017. OECD Review of Innovation Policy: Finland Assessment and Recommendation. OECD, Paris.
[18] Watanabe, C., Kondo, R., Ouchi, N., Wei, H. and Griffy-Brown, C., 2004. Institutional Elasticity as a Significant Driver of IT Functionality Development. Technological Forecasting and Social Change 71 (7), 723-750. [19] Schelling, T.C., 1998. Social mechanisms and social dynamics, in Hedstrom, P. and Swedberg, R. eds., Social Mechanisms: An Analytical Approach to Social Theory. Cambridge Univ. Press, Cambridge, 32-43. [20] International Monetary Fund (IMF), 2017. World Economic Outlook Database 2017. IMF, Washington, D.C. [21] World Economic Forum (WEF), 2016. The Global Information Technology Report 2016. WEF, Geneva. [22] EU, 2017. Economics of Industrial Research and Innovation, EU, Brussels. [23] Watanabe, C., Tou, Y. and Neittaanmäki, P., 2018a. A New Paradox of the Digital Economy: Structural Sources of the Limitation of GDP Statistics. Technology in Society 55, 9-23. [24] Watanabe, C., Naveed, K., Tou, Y. and Neittaanmäki, P., 2018b. Measuring GDP in the Digital Economy: Increasing Dependence on Uncaptured GDP. Technological Forecasting and Social Change 137, 226-240. [25] Watanabe, C., Lei, S. and Ouchi, N., 2009. Fusing Indigenous Technology Development and Market Learning for Greater Functionality Development: An Empirical Analysis of the Growth Trajectory of Canon Printers. Technovation 29 (2), 265-283. [26] Watanabe, C., Takayama, M., Nagamatsu, A., Tagami, T. and Griffy-Brown, C., 2002. Technology Spillover as a Complement for High Level R&D Intensity in the Pharmaceutical Industry. Technovation 22 (4), 245-258. [27] Watanabe, C., Naveed, K. and Zhao, W., 2015a. New Paradigm of ICT Productivity: Increasing Role of Un-captured GDP and Growing Anger of Consumers. Technology in Society 41, 21–44 [28] Watanabe, C., Naveed, K. and Neittaanmäki, P., 2015b. Dependency on Un-captured GDP as a Source of Resilience beyond Economic Value in Countries with Advanced ICT Infrastructure: Similarities and Disparities between Finland and Singapore. Technology in Society 42, 104–122 . [29] Watanabe, C., Naveed, K., Neittaanmäki, P. and Tou, Y., 2016. Operationalization of Un-captured GDP: The Innovation Stream under New Global Mega-trends. Technology in Society 45, 58–77. [30] Statistics Finland, (2018) “National Accounts of Finland,” Statistics Finland, Helsinki. [31] University of Toronto, 2013. Amazon Business Model Case Study. APS1012 Management of Innovation – Final Team Projects, Spring 2013. University of Toronto, Faculty of Applied Science and Engineering, Toronto. http://www.amgimanagement.com/founder/ProjectSummaries/APS1012_2013_spring_03_Amazon% 20business%20model%20case%20study.pdf (retrieved 10.01.2019). [32] Bezos, J.P., 2013. 2013 Letter to Shareholders. Amazon.com, Inc., Seattle. [33] Rivet, D.J., 2017. Amazon’s Superior Innovation: A Study of Amazon’s Corporate Structure, CEO, and Reasons behind Why It has become the Most Innovative Company in Today’s Market. University of New Hampshire Honors Theses and Capstone 343, University of New Hampshire, Durham. https://scholars.unh.edu/honors/343 (retrieved 10.01.2019). [34] Malczewski, B., 2011. Amazon in Overdrive: Is there More to the Overdrive – Amazon Deal than Just the Kindle? Journal of Electronic Resources Librarianship, 23 (4), 404-408.
[35] Izogo, E.E. & Ozo, J.U., 2015. Critical Evaluation of How Well Placed Amazon is to Sustain its Historical Online Retailing. British Journal of Marketing Studies 3 (6), 31-42.
[36] Levinson,M., 2007. Amazon’s IT Leader Leaving Huge Customer Service Infrastructure as Legacy. CIO, 17 Oct. 2007. https://www.cio.com/article/2437865/infrastructure/amazon-com-s-it-leader-leavinghuge-customerservice-infrastructure-as-legacy.html (retrieved 10.01.2019). [37] Robischon, N., 2017. Why Amazon is the World’s Most Innovative Company of 2017? Fast Company Magazine, 2 May 2017. https://www.fastcompany.com/3067455/why-amazon-is-the-worldsmost-innovative-company-of2017 (retrieved 10.01.2019).
UPPING THE ANTE: USING RFID AS A COMPETITIVE WEAPON TO FIGHT SHOPLIFTING AND IMPROVE BUSINESS INTELLIGENCE David C. Wyld1 and Michael C. Budden2 1 Department of Management, Southeastern Louisiana University, Hammond, LA USA 2 Department of Marketing & Supply Chain Management, Southeastern Louisiana University, Hammond, LA USA
ABSTRACT This paper explores how RFID (radio frequency identification) technology can be employed to fight the ever-growing shoplifting problem, estimated to cost the world’s retailers almost $100 billion annually. The paper provides an overview of RFID technology. We then analyze how RFID is beginning to see utilization in-store not just for security, but as a vehicle to improve inventory management and business intelligence as well. This paper demonstrates that RFID is poised to usher in a whole new direction in the fight against retail shrinkage, and we discuss what this visibility will mean for their companies, their employees, and their customers.
KEYWORDS Shoplifting, Retail Security, Loss Prevention, RFID (radio frequency identification) technology, Organized Retail Crime, Business Intelligence For More Details:
http://airccse.org/journal/ijmit/1011s1.pdf
http://airccse.org/journal/ijmit/vol1.html
REFERENCES [1] S. Howell and N. Proudlove, “A statistical investigation of inventory shrinkage in a large retail chain,” International Review of Retail, Distribution & Consumer Research, Vol. 17, No. 2, pp. 101-120, April 2007. [2] R. Hollinger and L. Langton, National Retail Security Survey 2005. Gainesville, FL: University of Florida, June 2006. [3] E. Woyke, “Attention, shoplifters: With $30 billion in theft, there's a revolution in surveillance systems,” Business Week, September 11, 2006. [Online]. Available: http://www.businessweek.com/magazine/content/06_37/b4000401.htm [Accessed: June 2, 2008]. [4] M. Budden, J. Yeargain and J. Miller Jr., “Strategies for dealing with shoplifting: A managerial and legal perspective,” American Business Review, Vol. 9, No. 1, pp. 28-41, January 1991. [5] Jack L. Hayes International, Press release: Shoplifter and dishonest employee theft on the rise, April 6, 2008. [Online]. Available: http://www.hayesinternational.com/thft_srvys.html [Accessed: August 1, 2008]. [6] S. Dickenson, “Taking stock of shrinkage,” Home Accents Today, February 1, 2008. [Online]. Available: http://www.homeaccentstoday.com/article/CA6535521.html. [Accessed: May 15, 2008]. [7] Checkpoint Systems (2008). Press release: Loss prevention spending tied to retail shrink levels, June 30, 2008. [Online]. Available: http://www.checkpointsystems.com/default.aspx?page=news&idnews=284 [Accessed: July 28, 2008]. [8] B. Babin and L. Babin, “Effects of Moral Cognitions and Consumer Emotions on Shoplifting Intentions,” Psychology & Marketing, Vol. 13, No. 8, pp. 785-802, December 1996. [9] M. Tonglet, “Consumer misbehaviour: An exploratory study of shoplifting,” Journal of Consumer Behaviour, Vol. 11, No. 4, pp. 336-354, November 2002. [10] Shoplifters Alternative, “Survey reveals important information about shoplifters,” New Jersey Small Business Development Centers, October 2001. [Online]. Available: http://www.njsbdc.com/retail/shoplifting.php [Accessed: August 19, 2008]. [11] R.C. Hollinger, “Workplace dishonesty,” Loss Prevention, Vol. 16, No. 6, pp. 16-18, June 2007. [12] Reuters, “Retailers face organized shoplifters, e-fencing,” CNBC.com, June 4, 2008. [Online]. Available: http://www.cnbc.com/id/24960983 [Accessed: September 1, 2008]. [13] J. Groover, “Organized crime: Retailers combat growing number of professional shoplifters,” Shopping Centers Today, October 2006. [Online]. Available: http://www.icsc.org/srch/sct/sct1006/index.php [Accessed: September 15, 2008]. [14] National Retail Federation, 2008 Organized Retail Crime Survey, June 2008. [Online]. Available: http://www.nrf.com/modules.php?name=News&op=viewlive&sp_id=522 [Accessed: July 3, 2008]. [15] J. Colapinto, “Stop, thief!: The high-tech approach to catching shoplifters,” The New Yorker, September 1, 2008. [Online]. Available: http://www.newyorker.com/reporting/2008/09/01/080901fa_fact_colapinto [Accessed: October 2, 2008].
[16] S.D. Scalet, “Shoplifting and organized retail crime: Mall rats,” CSO: Chief Security Officer, February 1, 2007. [Online]. Available: http://www.csoonline.com/article/print/221140. [Accessed: April 29, 2008]. [17] A. Loten, “Retailers face threat from organized shoplifting rings: A growing number of thieves are stealing large quantities of merchandise from warehouses and reselling online,” Inc., June 5, 2007. [Online]. Available: http://www.inc.com/news/articles/200706/crime.html [Accessed: July 28, 2008]. [18] E. Walker, “Drug store thefts a billion-dollar business,” The Miami Herald, August 28, 2008. [Online]. Available: http://www.miamiherald.com/news/front-page/story/661823.html [Accessed: September 20, 2008]. [19] C. Weselby, “Merchants, law enforcement fight organized shoplifting rings,” Silicon Valley/San Jose Business Journal, July 11, 2009. [Online]. Available: http://sanjose.bizjournals.com/sanjose/stories/2008/07/14/story7.html [Accessed: March 10, 2009]. [20] S.J. Dubner, “Is a wave of scuppie shoplifting upon us?” The New York Times, January 15, 2009. [Online]. Available: http://freakonomics.blogs.nytimes.com/2009/01/15/is-a-wave-of-scuppieshoplifting upon-us/ [Accessed: June 23, 2009]. [21] S. Epps, “Shoplifting on rise in SW Florida as economic woes linger,” Naples News, June 21, 2008. [Online]. Available: http://www.naplesnews.com/news/2008/Jun/21/shoplifting-rise-swflorida-economic woes-linger/ [Accessed: September 5, 2008]. [22] K. Roche, “Shoplifting a matter of opportunity,” Waltham Daily News Tribune, May 25, 2008. [Online]. Available: http://www.dailynewstribune.com/news/x1192324366/Shoplifting-a-matterof opportunity [Accessed: January 30, 2009]. [23] M.R. Doyle, “The state of the loss prevention industry: 2007 update,” Security Info Watch, October 18, 2007. [Online]. Available: http://www.securityinfowatch.com/article/printer.jsp?id=12817 [Accessed: August 3, 2008]. [24] S. Kapner, “Retailers want to stop growing so fast: After years of build, build, build, America's biggest stores are deciding that it makes sense to slow growth in a slow economy,” Fortune, December 6, 2007. [Online]. Available: http://money.cnn.com/2007/12/06/magazines/fortune/kapner_expansion.fortune/index.htm [Accessed: June 4, 2008]. [25] J. Goodchild, “Report: Shoplifting surges in down economy,” InfoWorld, June 17, 2009. [Online]. Available: http://www.infoworld.com/t/physical-security/report-shoplifting-surges-indown-economy-963 [Accessed: September 13, 2009]. [26] C. Dugas, “More consumers, workers shoplift as economy slows,” USA Today, June 18, 2008. [Online]. Available: http://www.usatoday.com/money/industries/retail/2008-06-18- shoplifting_N.htm [Accessed: September 30, 2008]. [27] Preference Research, “Research report - Loss prevention spending tied to retail shrink levels,” MSN Money Central, June 30, 2008. [Online]. Available: http://news.moneycentral.msn.com/ticker/article.aspx?Feed=BW&Date=20080630&ID=884142 9&Symbol=US:CKP [Accessed: July 17, 2008]. [28] D.C. Wyld, “The implant solution: Why RFID is the answer in the highly unique orthopaedic supply chain, providing ROI for suppliers and assurance for patients and their surgeons,” ID World, Issue 15, pp. 12-15, June 2008. [29] D.C. Wyld, “Playing a deadly game of match: How new efforts to use RFID in blood banking and transfusion can save patient lives and safeguard the blood supply chain,” Global Identification, Issue 37, pp. 24-26, March 2008.
[30] D.C. Wyld, “Radio frequency identification: Advanced intelligence for table games in casinos,” Cornell Hospitality Quarterly, Vol. 49, No. 2, pp. 134-144, June 2008. [31] D.C. Wyld, “RFID 101: The next big thing for management,” The Engineering Management Review, Vol. 35, No. 2, pp. 3-19, May 2007. [32] R. Wessel, “To future-proof its Future Store, Metro Group opted for EPCglobal standards: The retailer claims that its Future Store's butcher shop uses one of the world's first full-blown EPCIS software stacks,” RFID Journal, September 26, 2008. [Online]. Available: http://www.rfidjournal.com/article/articleprint/4346/-1/1/ [Accessed: December 15, 2008]. [33] D.C. Wyld, RFID: The right frequency for government - A research report from The IBM Center for the Business of Government, September 2005. [Online]. Available: http://www.businessofgovernment.org/main/publications/grant_reports/details/index.asp?gid=23 2 [Accessed: October 3, 2005]. [34] J. Collins, “Bookstore RFID-enables its operations: One of Holland's largest booksellers has integrated RFID into the operations of its brand-new store,” RFID Journal, April 18, 2006. [Online]. Available: http://www.rfidjournal.com/article/articleview/2273/ [Accessed: November 20, 2006]. [35] M.C. O’Connor, “Wegmans eyeing RFID for prescription management: The supermarket operator is planning to test whether placing RFID tags on customers' prescription orders will make locating and ringing up the orders faster and more accurate,” RFID Journal, January 10, 2008. [Online]. Available: http://www.rfidjournal.com/article/articleview/3844/ [Accessed: May 15, 2008]. [36] C. Swedberg, “Best Buy eager to use RFID to eliminate checkout lines: The greatest obstacle to deployment, according to Best Buy CIO Bob Willett, is the current cost of tags and readers,” RFID Journal, June 20, 2007. [Online]. Available: http://www.rfidjournal.com/article/articleview/3422/1/1/ [Accessed: July 29, 2007]. [37] C. Swedberg, “Canadian grocery pilot finds ROI in RFID: By implementing RFID, retailers and suppliers should markedly reduce out-of-stocks and improve promotional execution, according to a seven-month project involving Loblaw and four of its suppliers’, RFID Journal, June 20, 2007. Retrieved May 25, 2008, from http://www.rfidjournal.com/article/articleview/3428/1/1/.[Accessed: May 26, 2009]. [38] M.C. O’Connor, “Retailers see RFID's potential to fight shrinkage,” RFID Journal, August 15, 2008. [Online]. Available: http://www.rfidjournal.com/article/articleprint/4265/-1/1/ [Accessed: September 18, 2008]. [39] C. Swedberg, “Raflatac releases RFID tags with built-In EAS,” RFID Journal, December 17, 2007. [Online]. Available: http://www.rfidjournal.com/article/articleprint/3818/-1/1/ [Accessed: June 19, 2008]. 40] M.C. O’Connor, “Outdoor clothing and equipment retailer tests RFID-EAS tags,” RFID Journal, August 12, 2008. [Online]. Available: http://www.rfidjournal.com/article/view/4256/1/1/ [Accessed: September 18, 2008]. [41] J. Patton and B.C. Hardgrave,” RFID as Electronic Article Surveillance (EAS): Feasibility Assessment – August 2008, Information Technology Research Institute, Sam M. Walton College of Business, University of Arkansas. Working Paper ITRI-WP117-0808. [Online]. Available: http://itri.uark.edu/94.asp?article=666 [Accessed: April 20, 2009]. [42] M.R. Doyle, “The state of the loss prevention industry: 2009 update,” Security Info Watch, September 11, 2009. [Online]. Available: http://www.securityinfowatch.com/Retail/the-stateloss prevention-industry-2009-update [Accessed: October 18, 2009].
AUTHORS David C. Wyld currently serves as the Robert Maurin Professor of Management at Southeastern Louisiana University in Hammond, Louisiana. He is the Director of the College of Business’ Strategic e-Commerce/eGovernment Initiative, the Founding Editor of the Journal of Strategic eCommerce, and a frequent contributor to both academic journals and trade publications. He has established himself as one of the leading academic experts on emerging applications of technology in both the public and private sector. He has been an active consultant, a qualified expert witness, and an invited speaker on the strategic management of technology to both trade and academic audience
Dr. Michael Craig Budden is the Mayfield Professor of Marketing at Southeastern Louisiana University. He has 20 years experience as an academic administrator, including service as a dean of business for 14 years. Budden is the author of more than 150 publications, including books on shoplifting laws and trade secrets laws. Budden's publications have received national commendations from the Institute of Internal Auditors, the National Association of Accountants and the Clute Institute. He has served as a consultant to banks, health care organizations, marketing research firms, and professional associations. He received a Ph.D. in Marketing from the University of Arkansas.
AUTONOMIC FRAMEWORK FOR IT SECURITY GOVERNANCE Sitalakshmi Venkatraman School of Engineering, Construction and Design (IT), Melbourne Polytechnic, Australia,
ABSTRACT With the recent service enhancements over the Internet, organisations are confronted with a growing magnitude of security intrusions and attacks. Current intrusion detection strategies have not been effective in the long term, as new and obfuscated security attacks keep emerging evading the surveillance mechanisms. With information technology (IT) playing a pivotal role in today’s organizational operations and value creation, security regulatory bodies have identified this situation not solely as a technology issue, rather due to the weakness of an organisation's risk management practices and IT governance. Hence, recent attention has embarked on formulating proactive IT security governance for organisational sustenance. This paper proposes an autonomic framework for IT security governance that postulates a selflearning adaptive mechanism for an effective intrusion detection and risk management. Such a framework would facilitate autonomic ways of integrating existing context-dependent knowledge with new observed behaviour patterns gathered from network as well as host for detecting unknown security attacks effectively using mobile agents. In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted quality of service (QoS) in an organisation.
KEYWORDS IT Security Governance, Intrusion Detection, Autonomic Framework, Self-learning & Mobile Agents For More Details: http://aircconline.com/ijmit/V9N3/9317ijmit01.pdf Volume Link: http://airccse.org/journal/ijmit/vol9.html
REFERENCES [1] Lab K., (2015) “Kaspersky Security Bulletin,” Kaspersky Lab, Tech. Rep. [2] Symantec, (2016) “Internet Security Threat Report: Trends for 2016,” Symantec, Tech. Rep. vol. 21, p. 81. [3] McAfee Labs,“McAfee Labs Threats Report,” Intel Security, Tech. Rep., 03 2016. [4] Microsoft, “Microsoft Security Intelligence Report,” Microsoft, Tech. Rep., 12 2015. [5] HP Enterprise, “HPE Security Research Cyber Risk Report,” Hewlett Packard Enterprise, Tech. Rep., 2016. [6] IBM X-Force, (2015) “IBM X-Force Threat Intelligence Report 2016,” IBM, Tech. Rep., 2016. [7] Vasilomanolakis, E. Karuppayah, S. Mühlhäuser, M. and Fischer, M. “Taxonomy and Survey of Collaborative Intrusion Detection,” ACM Computing Surveys, vol. 47, no. 4, pp. 55:1–55:33. [8] Sommer R. and Paxson V., (2010) “Outside the Closed World: On Using Machine Learning for Network Intrusion Detection,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 305–316. [9] Jang, J.-w. Yun, J. Mohaisen, A. Woo, J. and. Kim, H. K (2016) “Detecting and Classifying Method Based on Similarity Matching of Android Malware Behavior with Profile,” SpringerPlus, vol. 5, no. 1, p. 1. [10] Nguyen, A. Yosinski, J. and Clune, J. (2015) “Deep Neural Networks Are Easily Fooled: High Confidence Predictions for Unrecognizable Images,” The IEEE Conference on Computer Vision and Pattern Recognition. [11] Schmugar, C. (2007) "The future of cybercrime", Sage: Security Vision From McAfee Avert Labs, 1(2), 1-5. [12] Faruki, P. Bhandari S., Laxmi, V. Gaur M., and Conti, M. (2016) “DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis,” in Recent Advances in Computational Intelligence in Defense and Security. Springer, pp. 519–552. [13] Li, W.-X. Wang, J.-B. Mu, D.-J. and Yuan, Y. (2011) “Survey on Android Rootkit,” Microprocessors, vol. 32. no.2, pp. 68-72. [14] Kim, S. Park, J. Lee K., You, I. and Yim K., (2012) “A Brief Survey on Rootkit Techniques in Malicious Codes,” Journal of Internet Services and Information Security, vol. 2, no. 3/4, pp. 134–147. [15] Lam, P. Wang L.-L., Ngan, H. Y. T. Yung, N. H. C. and Yeh, A. G.-O. (2015) “Outlier Detection In Large-Scale Traffic Data By Naïve Bayes Method and Gaussian Mixture Model Method,” arXiv.
[16] Yang, J. Deng, T. and Sui, R. (2015) “An Adaptive Weighted One-Class SVM for Robust Outlier Detection,” in Proceedings of the 2015 Chinese Intelligent Systems Conference. Springer, pp. 475– 484. [17] Pereira, G.V. Luciano, E. M. Macadar, M. A. and Daniel, V.M. (2013) “Information technology governance practices adoption through an institutional perspective: The perception of brazilian and american CIOs,” 46th Hawaii International Conference on System Sciences, pp. 4446–4455. [18] Turel O. and Bart, C. (2014) “Board-level IT governance and organizational performance,” Eur. J. Inf. Syst., vol. 23, no. 2, pp. 223–239. [19] Borth, M. A., and Bradley, R. V. (2009). "Unexplored Linkages between Corporate Governance and IT Governance: An Evaluation and Call to Research Information Technology Governance and Service Management: Frameworks and Adaptations" IGI Global. pp. 202-220. [20] Buchwald, A. Urbach, N. and Ahlemann, F. (2014) “Business value through controlled IT: Toward an integrated model of IT governance success and its impact,” J. Inf. Technol., vol. 29, no. 2, pp. 128– 147. [21] Yu, S. Wang, G. and Zhou, W. (2015) “Modeling Malicious Activities in Cyber Space,” IEEE Network, vol. 29, no. 6, pp. 83–87. [22] IFAC (2004), "Enterprise Governance-Getting the Balance Right", PAIB Report to IFAC. [23] Cumps, B., Viaene, S., & Dedene, G. (2012). "Linking the Strategic Importance of ICT with Investment in Business-ICT Alignment: An Explorative Framework". In W. Van Grembergen & S. De Haes (Eds.), Business Strategy and Applications in Enterprise IT Governance (pp. 37-55). Hershey, Pennsylvania, USA: IGI Global. [24] De Haes S. and Van Grembergen, W. (2015) "Enterprise Governance of Information Technology", Cham: Springer International Publishing. [25] ITGI (2003), "Board briefing on IT governance", 2nd Edition, Information Systems Audit and Control Foundation, 2003. [26] Bartens, Y ., Schulte, F., & Vos, S. (2014). "E-Business IT Governance Revisited: An Attempt towards Outlining a Novel Bi-directional Business/IT Alignment in COBIT5", Paper presented at the 47th Hawaii International Conference on System Sciences (HICSS), 2014. [27] Chou, Y.-C., Chuang, H. H.-C., & Shao, B. B. M. (2014). "The impacts of information technology on total factor productivity: A look at externalities and innovations". International Journal of Production Economics, 158, 290-299. [28] ISO/IEC 38500, (2015) "Information Technology - Governance of IT for the organization" ISO/IEC 38500:2015, 2nd Edition, ISO:Switzerland. [29] OECD (2005) Corporate Governance. OECD glossary of statistical terms, Organisation for Economic Co-operation and Development (OECD), [30] Stroud, R.E. (2012). "Introduction to COBIT 5" . ISACA.
[31] Kephart, J. and Chess, D. M. (2003) "The vision of autonomic computing", IEEE Computer, vol. 36, no. 1, pp. 41-50. [32] Ganek, A. G. and Corbi, T. A. (2003) "The Dawning of the Autonomic Computing Era". IBM Systems Journal. vol. 42, no. 1, pp. 5-18. [33] Dudley, G., Joshi, N., Ogle, D.M., Subramanian, B. and Topol, B.B. (2004) "Autonomic selfhealing systems in a cross-product IT environment", Proceedings of the International Conference on Autonomic Computing), 312-313. [34] Dobson, S. Sterritt, R. Nixon, P. and Hinchey. M. (2010) "Fulfilling the vision of autonomic computing". Computer, vol. 43, pp. 35-41. [35] Vidales, P., Baliosian, J., Serrat, J., Mapp,G., Stajano, F. and Hopper, A. (2005) "Autonomic System for Mobility Support in 4G Networks". IEEE Journal on Selected Areas in Communications. vol. 23, no. 12, pp. 2288-2304. [36] Sancho G., Villemur T. and Tazi S., (2010) “An Ontology-driven Approach for Collaborative Ubiquitous Systems”, International Journal of Autonomic Computing (IJAC) InderScience Publishers Mai pp 263 - 279. [37] Cabri, G., Leonardi, L. and Zambonelli, F. (2002) "Engineering Mobile Agent Applications Via Context- Dependent Coordination". IEEE Transactions on Software Engineering. vol. 28, no. 11, pp. 1040-1058. [38] Russell, S.J.; Norvig, P. (2010). “Artificial intelligence: A modern approach” (3rd ed. ed.). Upper Saddle River: Prentice Hall. [39] Alizadeh, H. Khoshrou A., and Zúquete, A. (2015) “Traffic Classification and Verification using Unsupervised Learning of Gaussian Mixture Models,” in International Workshop on Measurements & Networking. IEEE. [40] Venkatraman, S. (2010) "Self-Learning Framework for Intrusion Detection", Proceedings of The 2010 International Congress on Computer Applications and Computational Science (CACS 2010), 46 December, Singapore, pp. 517-520 [41] Cui, T., Ye, H., Teo, H. H., & Li, J. (2015) "Information technology and open innovation: A strategic alignment perspective". Information & Management, vol. 52, pp. 348-358. [42] Yu, S. Guo, S. andStojmenovic, I. (2015) “Fool Me if You Can: Mimicking Attacks and AntiAttacks in Cyberspace,” IEEE Transactions on Computers, vol. 64, no. 1, pp. 139–151.
AUTHORS Sita Venkatraman is currently the Information Technology Lecturer and Discipline Leader for Business Information Systems at the School of Engineering, Construction & Design, Melbourne Polytechnic, Australia. She earned her PhD in Computer Science, with a doctoral thesis titled “Efficient Parallel Algorithms for Pattern Recognition�, from National Institute of Industrial Engineering in 1993. In the past 25 years, Sita's work experience involves both industry and academics - developing turnkey projects for IT industry and teaching a variety of IT courses for tertiary institutions, in India, Singapore, New Zealand, and more recently in Australia since 2007. Her recent research areas are predominantly in Business Intelligence, Data Mining, Cloud Computing and Information Security. Sita has published eight book chapters and more than 100 research papers in internationally well-known refereed journals and conferences. She also serves as Member of Register of Experts at Australia's Tertiary Education Quality and Standards Agency (TEQSA).
THE IMPACT OF KNOWLEDGE MANAGEMENT ON THE FUNCTION OF EMPLOYEE PERFORMANCE APPRAISALS IN INDUSTRIAL COMPANIES- CASE STUDYS H. Obaidat and M. A. Otair Amman Arab University, Jordan ABSTRACT The study aimed at identifying the impact of knowledge management on the function of employee performance appraisals (it is one of the most important functions of human resources management) in Jordanian industrial public shareholding companies, relying on the descriptive analytical approach. A questionnaire has been developed and distributed on individuals of the study sample consisting of managers of departments and sections of human resources in each company. The number of questionnaire retrieved and valid for statistical analysis (294) representing (86.5%) of the distributed questionnaires. In order to analyze the study sample, reliance was placed on descriptive statistics, represented in the arithmetic means and standard deviations, in addition to the multiple linear regression analysis in hypothesis testing. The study reached a number of findings, most importantly, the presence of statistically significant impact at the level of (ι=0.05) for the knowledge management including its dimensions (knowledge generation, knowledge storage, knowledge sharing, knowledge application) on the function of employee performance appraisals in Jordanian industrial public shareholding companies. The study has recommended that the Jordanian industrial public shareholding companies should follow an efficient evaluation system capable of identifying the employees’ weaknesses. KEYWORDS Human resources management, Knowledge Management, Employee Performance Appraisals, Industrial Companies For More Details: http://aircconline.com/ijmit/V10N4/10418ijmit03.pdf Volume Link : http://airccse.org/journal/ijmit/vol10.html
REFERENCES [1] Aishoush, R. (2009). “Knowledge Management and Strategy in Business Organizations”. Unpublished PhD dissertation, Mohammed Khaydar University, Biskra, Algeria. [2] Al-Deeb E. (2010). Knowledge Management, Cairo, Egypt: The Arab Open Academy. [3] Al-kbaisi, S. (2011). Knowledge Management, Cairo-Egypt, Arab Organization for Administrative Development. [4] Al-Mudallal, A. (2012). “The application of knowledge management in Palestinian governmental institutions and their impact on the level of performance”. Unpublished M.Sc. Thesis, Islamic University, Palestine. [5] Al-Salem, M. and Saleh, A. (2003). Human Resource Management Strategic Approach. Amman Jordan, World of Modern Books for Publishing and Distribution. [6] Altaweel, A. and Rasheed, H. (2005). “The Impact of Information Technology on Knowledge Management Processes”. Future Research Journal. Iraq, Issue 10. [7] Al-Yaseri, A. and Hussien, D. (2012). “The Impact of Knowledge Management and Organizational Learning Processes on Strategic Performance An exploratory study of the views of a sample of administrative leaders at the universities of the Middle Euphrates”. Iraq, Qadisiyah Journal of Administrative and
Economic Sciences, Vol (14), Issue (1). [8] Al-zyadat, M. (2008). “Contemporary Trends in Knowledge Management”, 1st Edition, AmmanJordan, Dar Al Safa for Publishing and Distribution. [9] Bukowitz, W. and Williams, R. (2000), The Knowledge Management Fieldbook, London: Prentice Hall [10] Darwazeh, S. (2008). “The Relationship between Knowledge Management Requirements and Processes and their Impact on the Performance Excellence of Organizations”. Unpublished PhD Thesis. Jordan, Middle East University. [11] Grover, V., and Davenport, T. (2001). General Perspectives on Knowledge Management. Journal of Management Information System, vol. 18, No. (1), pp. 5-21. [12] Hmoud, K. (2010). Knowledge Organization, 1st Edition, Amman-Jordan, Al-Ahliyyah for Publishing & Distribution. [13] Nickols, F. (2000). "Knowledge in Knowledge Management." Knowledge Management Yearbook, Butterworth-Heinemann: Boston. [14] Rollett, H. (2003), Knowledge management processes and technologies, Kluwer, Norwell.
[15] Sakeenah, M. and Abu Sin, A. (2013). “Analysis of the reality of human resources strategy and its impact on performance in Sudanese telecommunications companies: Case Study of Sudan Telecom Company Limited”. Journal of Economic Sciences, Vol. 14, Issue 1.
[16] Sekaran, U. (2003) “Research Methods for Business: A Skill-Building Approach”. 4th Edition, John Wiley & Sons, New York. [17] Uriarte, A. (2008). Introduction to Knowledge Management, Jakarta, Indonesia: Asean Foundation. [18] Wiig, K. (1993). Knowledge management foundations: thinking about thinking. How people and organizations create, represent and use knowledge. Arlington, TX: Schema Press. [19] Wilkesmann, U., Wilkesmann, M., and Virgillito, A. (2007). Requirements for Knowledge Transfer in Hospitals How Can Knowledge Transfer be Supported in Hospitals?. Discussion papers des. [20] Zweilef, M. (2001). Human Resource Management, Amman-Jordan, Dar AlFiker for printing, publishing and distribution
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANGLADESH - HYPE OR REALITY? AKM Bahalul Haque Depart of Electrical and Computer Engineering North South University, Dhaka, Bangladesh
ABSTRACT Cyber security is one of the burning issues in modern world. Increased IT infrastructure has given rise to enormous chances of security breach. Bangladesh being a relatively new member of cyber security arena has its own demand and appeal. Digitalization is happening in Bangladesh for last few years at an appreciable rate. People are being connected to the worldwide web community with their smart devices. These devices have their own vulnerability issues as well as the data shared over the internet has a very good chances of getting breached. Common vulnerability issues like infecting the device with malware, Trojan, virus are on the rise. Moreover, a lack of proper cyber security policy and strategy might make the existing situation at the vulnerable edge of tipping point. Hence the upcoming new infrastructures will be at a greater risk if the issues are not dealt with at an early age. In this paper common vulnerability issues including their recent attacks on cyber space of Bangladesh, cyber security strategy and need for data privacy policy is discussed and analysed briefly.
KEYWORDS CyberSecurity, Cyberdefence, Security Policy, Vulnerability, Cyber Threat, Security Strategy For More Details: http://aircconline.com/ijmit/V11N1/11119ijmit03.pdf Volume Link : http://airccse.org/journal/ijmit/vol11.html
REFERENCES [1] “Internet Subscribers in Bangladesh December, 2018. | BTRC.” [Online]. Available: http://www.btrc.gov.bd/content/internet-subscribers-bangladesh-december-2018.[Accessed: 25Nov2018]. [2] C. Team, “Common Vulnerabilities in Cyber Space of Bangladesh,” BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team. [3] “Cyber warfare: Our Achilles’ heel?,” Dhaka Tribune, 17-Dec-2017. [Online]. Available: https://www.dhakatribune.com/opinion/op-ed/2017/12/17/cyber-warfare-achilles-heel/. [Accessed: 23Nov-2019]. [4] B. Dickson, “What is blockchain?,” TechTalks, 07-Sep-2016. [Online]. Available: https://bdtechtalks.com/2016/09/07/what-is-blockchain/. [Accessed: 3-Jan-2019]. [5] B. Dickson, “How blockchain can improve cybersecurity,” TechTalks, 11-Jan-2017. [Online]. Available: https://bdtechtalks.com/2017/01/11/how-blockchain-can-improve-cybersecurity/. [Accessed: 3-Dec-2019]. [6] “How blockchain can help fight cyber attacks | TechCrunch.” [Online]. Available: https://techcrunch.com/2016/12/05/how-blockchain-can-help-fight-cyberattacks/. 2019].
[Accessed:
3-Jan
[7] “What is Blockchain Technology? A Step-by-Step Guide For Beginners.” [Online]. Available: https://blockgeeks.com/guides/what-is-blockchain-technology/. [Accessed: 23-Jan-2019]. [8] “National Cyber Security Strategy”, ICT Division, Govt. of People’s Republic of Bangladesh. Available: http://www.dpp.gov.bd/upload_file/gazettes/10041_41196.pdf . [Accessed: 2-Jan-2019] [9] “Personal Data,” General Data Protection Regulation (GDPR). [10] “GDPR Personal Data and Sensitive Personal Data.” [Online]. Available: https://www.burgessalmon.com:443/news-and-insight/legal-updates/gdpr-personal-data-and-sensitivepersonal-data/.[Accessed: 10-Jan-2019]. [11] “Digital Security Act” Act No 46 of the Year 2018, Govt. of People republic of Bangladesh. Available: https://www.cirt.gov.bd/wp-content/uploads/2018/12/Digital-Security-Act-2018Englishversion.pdf . [Accessed: 20-Dec-2019]. [12] “Official Secrets Act, 1923 (Act No. XIX of 1923).” [Online]. Available: http://bdlaws.minlaw.gov.bd/pdf_part.php?id=132. [Accessed: 23-Nov-2019]. [13] “General Data Protection Regulation (GDPR) – Final text neatly arranged,” General Data Protection Regulation (GDPR). [Online]. Available: https://gdpr-info.eu/. [Accessed: 20-Dec-2019]. [14] “(Haque, A K M Bahalul. (2019).Big-Brother-In-1984-The-Modern-Era-Surveillance. International Journal of Scientific & Technology Research. 8. 186-190. [15] “BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team |.” [Online].Available: https://www.cirt.gov.bd /. [Accessed: 05-Feb-2019].
AUTHORS AKM Bahalul Haque is currently working a Lecturer of Department of ECE, North South University, Bashundhara, and Dhaka 1229. He has achieved is M.Sc. In Information Technology from Fachhochschule Kiel, Germany, 2018. He achieved his Bachelor of Science (Engineering) in Computer Science and telecommunication engineering in 2014. Has published two of his papers in International Journal. He specializes in Cyber Security, Cloud Computing, Data Privacy and protection. He has one-year experience as Security Engineer and one-year experience as Vulnerability Detection Consultant in Cyber Security Division.
CO-EVOLUTION BETWEEN CCC-DRIVEN CASH FLOW MANAGEMENT AND TRANSFORMATION OF R&D – AMAZON’S ENDEAVOR Yuji Tou1, Chihiro Watanabe 2,3, Pekka Neittaanmäki2, 1Tokyo Institute of Technology, Japan, 2 University of Jyväskylä, Finland and 3International Institute for Applied Systems Analysis (IIASA), Austria ABSTRACT Amazon became the world R&D leader in 2017 by rapidly increasing R&D investment. The company’s extremely large amount of R&D funds is the result of an ample free cash flow generated by sophisticated cash conversion cycle (CCC) management. Increased R&D induced business advancement and lean cost structure construction leading to further increase in cash flow which has stimulated interaction between vendors, customers, and Amazon via the Amazon marketplace. Activated interaction accelerated CCC advancement, a subsequent free cash flow increase, and user-driven innovation, thus accelerated the transformation of routine and periodic alteration activities into significant improvement simultaneously. All of these components function together as a consolidated sophisticated machine. In light of the increasing concern to R&D resources development without the dilemma of a productivity decline that most digital economies are now confronting, this paper demonstrated the above hypothetical view. An intensive empirical analysis focusing on the development trajectory of Amazon’s technofinancing system over a period from 1997 to 2018 was conducted. An insightful suggestion to neo open innovation that fuses financing management and R&D management was thus provided KEYWORDS R&D, Transformation, Cash flow management, Cash conversion cycle, Amazon FULL TEXT: http://aircconline.com/ijmit/V11N3/11319ijmit01.pdf
ABSTRACT URL: http://aircconline.com/abstract/ijmit/v11n3/11319ijmit01.html
REFERENCES [1] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2018. Neo Open Innovation in the Digital
Economy: Harnessing Soft Innovation Resources. International Journal of Managing Information Technology 10 (4), 53-75. [2] Tou, Y., Watanabe, C., Moriya, K., & Neittaanmäki, P., 2019b. Harnessing Soft Innovation Resources Leads to Neo Open Innovation. Technology in Society, in print. [3] Tou, Y., Watanabe, C., Moriya, K., Vurpillat, V., & Neittaanmäki, P., 2019a. A New Concept of R&D in Neo Open Innovation: Transformation of R&D Triggered by Amazon. International Journal of Managing Information Technology 11 (1) 17-35. [4] Tou, Y., Watanabe, C., Moriya, K., Naveed, N., Vurpillat, V., & Neittaanmäki, P., 2019c. The Transformation of R&D into Neo Open Innovation: A New Concept of R&D Endeavor Triggered by Amazon. Technology in Society 47, in print. [5] Price, R., 2013. Cash Flow at Amazon.Com. Accounting Education 28 (2), 353-374. [6] Fox, J., 2014. At Amazon, It’s All About Cash Flow. Finance & Accounting, 20 Oct. 2014. https://hbr.org/resources/images/article_assets/2014/10/inadifferentleague.png (retrieved 26.06.2019). [7] Naruge, M., 2018. Amazon, The World Top Strategy. Diamond Co., Tokyo. [8] Kenney, M., 2013. The Growth and Development of the Internet in the United States. In: Cogut B, Ed. The Global Internet Economy. MIT Press, Massachusetts. [9] Knott, A.M., 2017. How Innovation Really Works: Using the Trillion-Dollar R&D fix to Drive Growth. McGraw Hill, New York. [10] Galloway, S., 2017. The Hidden DNA of Amazon, Apple, Facebook, and Google. Penguin Random House LLC, New York. [11] Watanabe, C. & Tou, Y., 2019. Transformative Direction of R&D: Lessons from Amazon’s Endeavor. Technovation, in print. [12] Amazon, 2018. Amazon.Com. Inc. Annual Report 2017. Amazon.Com, Inc., Seattle. http://www.annualreports.com/Company/amazoncom-inc (retrieved 06.01.2019). [13] Amazon, 2019a. Amazon.Com. Inc. Annual Report 2018. Amazon.Com, Inc., Seattle. https://ir.aboutamazon.com/static-files/0f9e36b1-7e1e-4b52-be17-145dc9d8b5ec(retrieved 02.07.2019). [14] Bloomberg, 2018. 2018 Global Innovation 1000 Study. Bloomberg, New York. [15] Bezos, J.P., 2005. 2004 Letter to Shareholders. Amazon.com, Inc., Seattle. [16] Amazon, 2019b. Amazon.com, Inc,, Income Statement. https://fairlyvalued.com/company/AMZN (retrieved 02.07.2019).
Amazon.Com.
Inc.,
Seattle.
[17] Panigrahi, A.K., 2013. Cash Conversion Cycle and Firms’ Profitability. International Journal of Current Research 6, 1484-1488. [18] Zakari, M. and Saidu, S., 2016. The Impact of Cash Conversion Cycle on Firm Profittability: Evidence from Nigerian Listed Telecommunication Companies. Journal of Finance and Accounting 4 (6), 342-350. [19] Zeidan, R. and Shapir, O.M., 2017. Cash Conversion Cycle and Value-enhancing Operations: Theory and Evidence for a Free Lunch. Journal of Corporate Finance 45, 203-219. [20] Uenlue, M., 2018. Amazon Business Model: Three Customer Value Propositions. Innovation Tactics, 22 August 2018. https://www.innovationtactics.com/amazon-business-model-part-2/(retrieved 10.06.2019). [21] Watanabe, C. and Tou, Y., 2003. An Empirical Analysis on the R&D Investment Inducing System in Japanese-style Management. Research Policy and Technology Management 16 (3/4), 184- 202. [22] Bloch, C., 2005. R&D Investment and Internal Finance: The Cash Flow Effect. Economics of Innovation and New Technology, 14 (3), 213-223. [23] Hong, A., Bhattacharyya, D. and Geis, G.T., 2013. The Role of M&A in Market Convergence: Amazon, Apple, Google and Microsoft. Global Economy and Finance Journal 6 (1), 53