317 research outputs found

    Bibliometric Indicators for Assessing the Quality of Scholarly Communications: A Case Study on International Journal of Cooperative Information Systems

    Get PDF
    This paper analyses various bibliometric dimensions of the journal literature such as authors’ productivity, geographical distribution, citation pattern, institution-wise distribution of articles, discipline-wise distributions of articles, productive institutions, Productivity Index (PI), Activity Index (AI), Domestic Collaborative Index (DCI) and International Collaborative Index (ICI) etc. It also explores the applicability of Lotka’s Inverse Square Law and Zipf’s Law to examine the observed rank – frequency pattern of Keywords and Subject Terms of Information Systems (IS) literature. To illustrate these bibliometric indicators pertinent information on the field of Information Systems (IS) collected from EBSCO database for the International Journal of Cooperative Information Systems (IJCIS). Results indicated that a high level of collaboration exists among the authors, USA occupies the dominant position in terms of high productive authors, institutions and tops the list with highest number of domestic collaboration. Authors’ productivity confirms to Lotka’s law and the Frequency distribution of both Subject Terms and Keywords in IJCIS journal literature follow Zipf’s distribution

    Valley of the Wolves as Representative of Turkish Popular Attitudes toward Iraq

    Get PDF
    Abstract In 2006, the Turkish film, Valley of the Wolves (Kurtlar Vadisi-Irak) (Serdar Akar, 2006), was released to audiences in Turkey and Europe. Costing $10 million, it was the most costly production in the history of Turkish cinema, breaking all box office records in the country. A fantastical account of a Turkish victory over a fictional US invasion of the country, Valley of the Wolves has been interpreted as a reaction to the ‘Sack Incident’ (‘çuval olayı’) of July 2003, in which eleven Turkish soldiers were hooded and arrested in northern Iraq shortly after the United States invasion. The film’s title hence refers to a dark and dangerous place where howling and vicious ‘wolves’—namely Americans and Kurds—are gathered. This paper argues that Valley of the Wolves confirms a reemergence of 1960s Turkish industry (Yeşilçam) films which emphasized the historical conflict between Western and Islamic values. It discusses the extent to which Valley of the Wolves reflects popular Turkish attitudes toward the US war on Iraq, and it analyzes the film’s projection of Turkish humiliation, anger, and frustration following the Sack Incident. The paper also addresses how Valley of the Wolves engages US–Turkish relations and Turkish concerns over current Iraq-related politics, especially the US–Kurdish alliance, the establishment of an independent Kurdistan, Turkmen and the issue of Kirkuk, US violations of international law in Iraq, and the conflict between Islam and ChristianityValley of the Wolves as Representative of Turkish Popular Attitudes toward Ira

    Towards a service-oriented MDA-based approach to the alignment of business processes with IT systems: From the business model to a web service composition model

    Get PDF
    In recent years, the automation of business processes has become one of the most prominent and promising uses of Web service technology. Consequently several languages have been created for the execution of business processes, making it possible to define new and more complex services or business processes which are implemented for example by means of Web service composition. Nevertheless, these kinds of languages are not suitable for use in the early stages of the development process of information systems. Special methodologies or techniques are therefore necessary to allow systems analysts to understand services from a business point of view, while facilitating the design and development ofWeb service composition. In this paper, we present a service-oriented approach to information system development that starts by identifying, through business modeling, the services required by the customers of a business, to make it possible to create a Web service composition model. This model will facilitate the transformation to specific languages for business process execution, thereby reducing the development efforts made in service-oriented applications. The method proposed is illustrated by means of a Web application for the management of medical images, which we have taken as a case study

    MEDIA MASSA DAN CYBER CRIME DI ERA SOCIETY 5.0: Tinjauan Multidisipliner

    Get PDF
    The mass media in the era of society 5.0 is the main means of disseminating messages and information to the wider community. The era of society 5.0 and the birth of new media has made people's daily lives easier. Currently, the mass media has a dual role, namely as a means of sharing messages in the flow of communication and also acting as an agent of change for the community. Many people's expectations of the role of mass media as agents of change for the wider community to become even better turned out to have a myriad of challenges. Because basically the mass media has a flexible nature. Mass media as a means of disseminating information and messages to the wider community is in line with the realities of life, every new change of course has new risks that follow. The rapid development of mass media also brings the rapid development of cyber crime in human life. And here is a new challenge that must be faced by every party in the era of society 5.0. Reflecting on the case above, the research in this journal focuses on discussing the challenges that must be faced by each party involved in society 5.0 in the era of cyber crime that attacks all aspects of life. This research uses an explanatory method based on literature study in which all data are obtained from books, journals, articles and internet media. This study aims to see and find out to what extent the parties involved in society 5.0 face cyber crime, especially the mass media. The theory used in this study is social learning theory to discuss the reasons for the existence of cyber crime, then use and gratification theory to see the extent to which society is affected by mass media in society 5.0 and finally media ecology theory to see how the role of mass media is in dealing with cybercrime.The mass media in the era of society 5.0 is the main means of disseminating messages and information to the wider community. The era of society 5.0 and the birth of new media has made people's daily lives easier. Currently, the mass media has a dual role, namely as a means of sharing messages in the flow of communication and also acting as an agent of change for the community. Many people's expectations of the role of mass media as agents of change for the wider community to become even better turned out to have a myriad of challenges. Because basically the mass media has a flexible nature. Mass media as a means of disseminating information and messages to the wider community is in line with the realities of life, every new change of course has new risks that follow. The rapid development of mass media also brings the rapid development of cyber crime in human life. And here is a new challenge that must be faced by every party in the era of society 5.0. Reflecting on the case above, the research in this journal focuses on discussing the challenges that must be faced by each party involved in society 5.0 in the era of cyber crime that attacks all aspects of life. This research uses an explanatory method based on literature study in which all data are obtained from books, journals, articles and internet media. This study aims to see and find out to what extent the parties involved in society 5.0 face cyber crime, especially the mass media. The theory used in this study is social learning theory to discuss the reasons for the existence of cyber crime, then use and gratification theory to see the extent to which society is affected by mass media in society 5.0 and finally media ecology theory to see how the role of mass media is in dealing with cybercrime
    • …
    corecore