78 research outputs found

    Outsourcing Practices In Malaysia: A SWOT Analysis On The ICT Industry

    Get PDF
    In the last decade, outsourcing  has emerged as an important tool for enabling business around the world to gain full benefit. As Malaysia develops, the businesses must keep pace with changes that are occurring. Outsourcing initiatives are intended to increase the efficiency and effectiveness of the business processes as well as IT performance. The rethinking of business strategies to develop and exploit core competencies, set the outsourcing bandwagon rolling.  It seeks to improve the quality, cost efficiency and seize of competitive advantage. This paper discusses the potential of  Malaysia as a global player for ICT outsourcing. The paper focuses on SWOT analysis of ICT outsourcing in Malaysia. This paper identifies current situations in Malaysia and discuss further with the analysis on strength, weaknesses, opportunity and threats which will give effect to the businesses and society at large. No significantThere is hardly any  study has been carried out on analyzing the ICT outsourcing industry’s potential in Malaysia. This is an emerging industry that Malaysian companies can should focus on by leveraging on thier  and develop the strengths and avoiding the threats within the overall ICT outsourcing foray. The lack of studyies and the potential of this industry in Malaysia, have motivated the authors to write about this topic. research further and contribute to the industry in terms of how to enhance its capabilities. The SWOT analysis will be the basis for the research.Our findings suggests that, Malaysia has the strength of becoming world player in ICT outsourcing because sufficient infrastructure, strategic position of Malaysia and English language is widely spoken. These are the plus points of Malaysia to further excel as the provider of ICT outsourcing. On the other hand, the weaknesses that need to overcome is the low level of  e-readiness in the world ranking. Political will and links with Middle East, China and India are the opportunities for Malaysia to laverage on its strength. However, Malaysia also need to avoid the threats such as slowly loosing competitive edge to lower cost producers namely Vietnam and China. Finally, our paper concludes with some options to enhance the capabilities of Malaysia as ICT outsourcing provider

    Cyber Security Violation in I0T-Enabled Bright Society: A Proposed Framework

    Get PDF
    The undesirable consequences of ICT proliferation remains a big concern. The rise in Internet of Things (IoT) have further exacerbated security and information privacy challenges. One main reason is organizations and individuals constantly violate regulations and rules. While cybersecurity and privacy scholars accentuate on the likelihood of rule violations at the individual and organizational levels, the evidence for and discussion of this concept is still scant. This study proposes an empirical response to the Bright ICT initiative of the Association of Information System. This initiative aims to drastically eliminate adverse effect of Internet of Things (IoT). However, a robust privacy and cybersecurity model is needed. This study draws on the selective organizational information privacy and security violation model and delineate it at individual level. Specifically, attitude towards behaviour and subjective norms, contextual conditions, rule and regulatory conditions, perceived risk of violating a privacy or security rule, economic and non-economic strain constructs are hypothesized to determine the likelihood of a privacy and cybersecurity rule violation. In this context, pertinent cybersecurity literatures for IoT-enabled environment were examined to suggest solutions to reduce the dark side of IoT-enabled bright society. This paper presents the proposed model

    Knowledge based emergency management information systems: Mapping DERMIS principles

    Get PDF
    Recent disasters which were composed of major floods and landslides events proved that despite past experiences and strong disaster management mechanism, life and property losses are still unavoidable.Emergency managers need a robust system that can ease the challenges faced. This paper proposes a functional system based on the working principle of The Dynamic Emergency Response Management Information Systems(DERMIS): Design Premise, Conceptual Design, System Specification and Supporting Design Considerations. These four principles are coupled with specific end-user requirements derived from our on-going work. The impact of this study on disaster management is significant to the scientific group within disaster management domain, the government agencies for policy and strategy formulations to preempt, deal with and, ultimately, improve survival rate in disaster

    Parents’ Awareness on Online Predators: Cyber Grooming Deterrence

    Get PDF
    The rapid increase of information and communications technology is manifested by its tremendous positive outcomes on the economy, business, and society. However, online application use by adolescents, especially mobile technology, has caused uneasiness among parents owing to cyber grooming incidents. This study reflects on the current cyber grooming situation. Investigating the current state of online grooming and the means through which parents can ensure the online safety of their adolescents from adults offering “candy” or wanting to start a relationship is necessary. Teen behavior related scholars believe that parents play a vital role in building safe environments. We conducted a qualitative study by interviewing 19 parents with children between the ages of 13 and 17 years in an urban setting to determine the level of the parents’ awareness. Interviews were conducted based on five key components, namely, social media, unknown friends, sex education, private chats, and family time. The results present the actual situations of the parents and highlight related challenges as well as adolescents’ ignorance and vulnerability to cyber grooming. Results are mapped to three main determinants of cyber grooming, namely, parental factors, self-efficacy, and self-regulation. We conclude with insights and recommendations for parents, schools, and the government to be vigilant for online predators by increasing awareness of cyber grooming

    Knowledge management for disaster response: A proposed framework

    Get PDF
    Knowledge management encompasses a wide range of disciplines. Most organizations face difficult challenges in managing knowledge for emergency response, but it is crucial for response effectiveness that such challenges be overcome.Organizational members must share the knowledge needed to plan for emergencies. They also must be able during an emergency to access relevant plans and communicate about their responses to it.In this paper we purport the idea that knowledge management systems allow more effective and timely disaster management efforts.We present our idea based on our experience in working with knowledge management systems to support emergency preparedness initiatives in North America. We propose a framework that can be used by local researchers and practitioners to better understand the influence of knowledge management on disaster management

    Enterprise resource planning implementation within science and technology park (STP) organisations: an avenue for future research. A systematic review. [version 3; peer review: 2 approved]

    Get PDF
    Background: Enterprise resource planning (ERP) is critical to enhancing the ability to control commercial activities and results in a competitive advantage when combined with an organisation's existing competitive advantages. However, our practise review reveals that end users resist ERP implementation because the resulting changes will alter the current status quo. The implementation of an ERP system in an organisation is complex as it affects multiple areas of the business. Resistance to change is cited as a factor of ERP failure. Methods: In this study, we conducted a systematic literature review using Transfield’s five stages and established a conceptual framework for ERP system implementation in science and technology parks (STPs). Articles collected from Emerald, Science Direct, ProQuest and Scopus databases between 1st June 2021 and 15th June 2021. Two authors were assigned to check the suitability of the articles in order to avoid risk of bias. Articles were analysed based on components of a research paper and the data was tabulated using MS Excel. Results: Only eight papers (0.011% of all the papers) appeared when we searched for papers related to ERP with a focus on post ERP Implementation, end-user behaviours, organisational performance, and the accelerated SAP (system application and product) methodology. We found that there are hardly any articles on ERP post implementations in STP context particularly based on the evaluation part of accelerated SAP.   Conclusions: Results indicate the lack of studies in this field, particularly those addressing issues related to STP. This study attempted to broaden the understanding of the ERP's effectiveness, particularly in terms of an organisation's operational performance

    Corporate governance and shareholders' confidence in cooperativess a systematic literature review

    Get PDF
    Background: The confidence of Bottom 40 (B40) shareholders is crucial for cooperative's sustenance within wider corporate governance. An in-depth study on cooperatives is needed, as they play a crucial role in the Malaysian economic system and contribute greatly to the country's social development. However, in the current landscape, confidence among shareholders is at stake. This study aims to identify the research gap into corporate governance for cooperatives in relation to B40 shareholder confidence, as well as identify current study challenges and develop a conceptual framework for future research. Methods: We conducted a systematic literature review, with the use of agency theory to assess shareholders' confidence. Emerald, ProQuest, InderScience, Scopus and Science Direct were the online databases used in this study to search five keyword phrases: corporate governance, confidence, cooperative, agency theory and Bottom 40% (B40) household. Tranfield's five stages were used to conduct the systematic review. Results: Only 5 of the 324 studies assess shareholders' confidence in cooperatives, as well as one paper on B40 and two papers on agency theory. Our review presents three major findings. First, research in the context of B40 shareholder's confidence in cooperatives is scarce. Second, the challenges related to shareholders' confidence in B40 are major issues in the context. Third, research on agency theory in the context of shareholders' confidence within cooperatives and corporate governance is still scant. Conclusions: This review urges the research community to conduct more studies based on the highlighted research gaps

    Academic entrepreneurial engagement for frugal innovation in higher education institutions: a systematic literature review [version 3; peer review: 1 approved, 2 approved with reservations]

    Get PDF
    Higher education institutions (HEI) are faced with increasing challenges related to shrinking resources, high operation costs, the COVID-19 pandemic, decreasing student enrolment rates, and pressure to contribute to regional development and economic growth. To overcome such challenges, academics must move beyond their traditional functions of research and teaching and engage in entrepreneurial activities. Through engagement in entrepreneurial activities, academics can contribute to frugal innovation (FI) in private HEI (PHEI). The literature in this context emphasizes that academic entrepreneurial engagement (AEE) will lead to innovation, the identification of opportunities for new business ventures, financial rewards for institutions and academics, an impact on the economy, and the enhancement of social welfare. This study presents a systematic review of the literature and adopts the Transfield five-phase strategy to review the literature on AEE from the past two decades (2000–2020). A total of 1,067 papers on FI are obtained, only five of which focus on AEE. Moreover, papers related to AEE for FI are few. The study presents the research gaps, challenges, and potential factors for further research in this context. We conclude that FI for AEE in PHEI can be a game-changer for future sustainability. Moreover, we believe that the outcome of this review warrants further research

    Sir-Cure: An Apps to Improve Awareness on Cybercrime Among High-Risk Group Youth in Malaysia using Design Thinking Method

    No full text
    In emerging times, while people are more and more inclined towards using cloud platforms and in the age of dependence on IOT, the foremost problem that we are facing is that of our data security and prevention from unauthorised access. While we do acknowledge the problem, very less of alternate solutions have been adopted even by the technology giants. We try to study people’s behaviour from their insights and try to propose an implementable plan with alternate solutions and analysis of other factors involved. Personal in depth interviews using Design Thinking method led us to consolidate results for an age group to ideate and simulated needs and aspirations from the interviews. Popularised by the Hasso Plattner Institute of Design (d.school at Stanford), Design Thinking has been used in accelerator programs, assist creative leadership and innovation. We examined the Information System problems in a five-stage approach—Empathy, Define, Ideation, Prototype and Testing. Special attention has been paid to filter out the ideas based on their cornerstone characteristics of empathy by design thinking like solution to the problem, acceptance, efficiency, privacy, cost in order of priority and the same has led us to come up with more interactive, user friendly and customer focussed solutions with security being the key factor. We developed a prototype called ‘Sir-cure’. It is an app for password management. We conclude that DT method has been instrumental for this project in solving real world problem
    corecore