228 research outputs found

    Advancing digital transformation: Integrated digital transformation framework for a successful deployment

    Get PDF
    © 2019, IEOM Society International. In today\u27s knowledge-based digital economy, the pace of innovation is accelerating with disruptive technologies being discovered and introduced rapidly. The new global business environment has pressured many organizations to be more aggressive in adopting innovation and emerging technologies and use them as the cornerstone of their competitive strategy. Moreover, changing customer behavior, demand and requirement have led to complex changes and created an urgency to digitally transform an organization. In such an environment, rapid transformation is needed to accelerate and innovate business activities, business processes, models, and, ultimately, the workforce competencies. In such a situation, many c-suite executives are facing various challenges such as rigid processes, risk avoidance, digital disruption, interdepartmental conflict, disinterest in new ideas and complacency to move forward. These challenges require a vastly different approach to digitally transform a company\u27s business. The objective of this paper is to propose an integrated digital transformation framework by integrating the business-need space (model elements), problem space (design thinking), solution space (Waterfall, agile) and change management space methods for a successful digital transformation deployment

    Degree of Verification of "CAEP" standards Concerning Graduates of School of Educational Sciences from their Point of View at University of Jordan

    Get PDF
    The purpose of this study is to determine the degree of verification of CAEP  standards for the preparation of teachers and concerning graduates of School of Educational Sciences  at University of Jordan. To achieve the goal of the study, the CAPE standards were applied. CAEP standards are  five : (1) Understanding and addressing each child’s developmental and learning needs, (2) Understanding and Applying Content and Curricular Knowledge for Teaching, (3) Assessing, Planning, and Designing Contexts for Learning, (4) Supporting Each Child’s Learning Using Effective Instruction, and (5) Developing as a Professional. The sample of the study consisted of all graduates from the specialty of classroom teacher and child education who  graduates in the first semester of the academic year 2018-2019. The results of the study show that  the degree of verification of CAEP standards was medium-level. There are no statistically significant differences between students due to specialization  , cumulative average at university ,rate in high school. The results show that there is a positive correlation between the desire to specialization and the degree of verification of CAEP standards. The author recommend that university develops its   academic programs for teacher preparation to meet CAEP standards. The study also recommend that the acceptance policy of students must be developed to accept   those with strong desire in teaching profession in addition to high average in high school . Keywords:  CAEP, Jordan, Students, Teachers, Standards DOI: 10.7176/JEP/11-12-17 Publication date: April 30th 202

    A reference framework for enterprise computing curriculum

    Get PDF
    © Springer International Publishing AG 2017. An increasing number of universities are offering one form or another of Enterprise Computing (EC) program, while simultaneously a number of enterprises in the private and public sectors have articulated needs for graduates with knowledge in enterprise applications, analytical skills and competencies. The programs often are structured by the knowledge of their faculty and in collaboration with Enterprise Application Solutions Vendors (EASV) providing solutions in this space. Based on their perception of the educational needs of their primary stakeholders (students, parents, employers, society), both within industry and government. This perception of audience needs is often based on interviews, exchange forums, surveys, and informal assessments. As of now, there is no EC reference curriculum identified by academia or industry. Industry and academia often differ in the definition of the scope of EC curriculum. Consequently, the need for a reference framework for enterprise computing curriculum has often been articulated in a variety of meetings within the enterprise community. The aim of this paper is to propose an EC reference curriculum at the undergraduate level based on the expertise of the authors, a study of the EC program at several local, regional, and international universities, the industry needs of EC competencies and the best practices available in academia and industry

    Building An Integrated Digital Transformation System Framework: A Design Science Research, The Case Of Feduni

    Get PDF
    The purpose of this paper is to propose an integrated digital transformation system framework (IDTSF) to help support business leaders and teams in making their products, services, and operations more streamlined and competitive. The framework will help organizations to best meet user/customer needs with minimum waste and time and enables businesses to achieve efficiency compared with island and traditional sequential approaches. The proposed framework can also provide insights to help organizations to avoid common failures when deploying digital transformation initiatives. The paper follows the design science research (DSR) and the information systems design science research (ISDSR) methodologies to develop the IDTSF model and a practical design artifact. The main problems were the initiation, execution, and governance challenges associated with digital transformation. After identifying the problems and the objectives, a relevant IDTSF model was synthesized and tested as a design artifact. The results of the test of the proposed artifact showed its effectiveness and efficiency in facilitating the components of the model in creating a cohesive framework

    REQUIREMENT ANALYSIS FOR PROCESS-CENTRIC CONTINUOUS MONITORING

    Get PDF
    With the emergence of mission-critical real-time systems becoming ever more important to the competitive strategies of corporations and their e-business and supply-chain models, an increasing number of process controls are being embedded into information systems, and co-processed with business transaction thus providing for the continuous monitoring of business operations. A parallel trend in the auditing industry is towards continuous auditing, able to provide management with real-time auditing of the functioning of controls and of business transactions, thus enhancing significantly management’s ability to ensure compliance and make key business decisions. Continuous auditing requires that information systems are developed not only to fulfill business requirements but also continuous monitoring of transactions and other compliance and control requirements. This integration of business systems and their controls within a process-centric logic necessitates a likewise integration of their development processes. Subsequently existing tools and techniques for requirements analysis need to be recast within a hybrid and integrated approach dubbed requirement analysis for process-centric continuous monitoring or RA-PCCM, which consists of the concurrent analysis of operational systems, information systems, the control system, and the management system. Whilst efforts exist within the auditing community to outline a process-driven methodology for developing continuous auditing systems, this paper argues for integrating control development for continuous monitoring within the fold of information system development, hence restricting auditors to control monitoring assurance

    Screening of Murabaha business process through Quran and hadith: a text mining analysis

    Get PDF
    © 2020, Emerald Publishing Limited. Purpose: This paper revolves around the usage of data analytics in the Qur’an and Hadith through a new text mining technique to answer the main research question of whether the activities and the data flows of the Murabaha financing contract is compatible with Sharia law. The purpose of this paper is to provide a thorough and comprehensive database that will be used to examine existing practices in Islamic banks’ and improve compliancy with Islamic financial law (Sharia). Design/methodology/approach: To design a Sharia-compliant Murabaha business process originated on text mining, the authors start by identifying the factors deemed necessary in their text mining techniques of both texts; using a four-step strategy to analyze those text mining analytics; then, they list the three basic approaches in text mining used for new knowledge discovery in databases: the co-occurrence approach based on the recursive co-occurrence algorithm; the machine learning or statistical-based; and the knowledge-based. They identify any variation and association between the Murabaha business processes produced using text mining against the one developed through data collection. Findings: The main finding attained in this paper is to confirm the compatibility of all activities and the data flows in the Murabaha financing contract produced using data analytics of the Quran and Hadith texts against the Murabaha business process that was developed based on data collection. Another key finding is revealing some shortcomings regarding Islamic banks business process compliance with Sharia law. Practical implications: Given Murabaha as the most popular mode of Islamic financing with more than 75% in total transactions, this research has managed to touch-base on an area that is interesting to the vast majority of those dealing with Islamic finance instruments. By reaching findings that could improve the existing Islamic Murabaha business process and concluding on Sharia compliance of the existing Murabaha business process, this research is quite relevant and could be used in practice as well as in influencing public policy. In fact, Islamic Sharia law experts, Islamic finance professionals and Islamic banks may find the results of this study very useful in improving at least one aspect of the Islamic finance transactions. Originality/value: By using a novel, fresh text mining methods built on recursive occurrence of synonym words from the Qur’an and Hadith to enrich Islamic finance, this research study can claim to have been the first of its kind in using machine learning to mine the Quran, Hadith and in extracting valuable knowledge to support and consolidate the Islamic financial business processes and make them more compliant with the i

    Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur\u27an and Hadith

    Get PDF
    © 2017 IEEE. A large number of conventional financial institutions, especially banks are moving to an Islamic financial model that\u27s comply with the Shari\u27a Law with little change to current conventional practices (reverse eningineer current business processes) to accommodate the market for Islamic finance. This study is an attempt to design and develop the business processes for the Islamic financial institutions\u27 (IFIs) products by investigating and collecting information through Islamic literature, surveys and interviews of experts in Islamic jurisprudence, regulators, academic and Islamic finance and banking practitioners. Then the findings will be assessed and evaluated using a Qur\u27anic Financial Corpus and use computational and analytical approaches to mine the Qur\u27an and the Hadith to find hidden knowledge on Islamic financial business processes. The knowledge acquired from this investigation will be translated into an Islamic financial process model to be adapted by Islamic and non-Islamic financial institutions. The outcome of this research will influence the future development, growth and diversification of Islamic financial services worldwide

    Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Quran and Hadith.

    Get PDF
    Global Islamic finance assets grew from 200billionto200 billion to 1.8 trillion (IMF 2015) and is growing faster than the conventional banking sector. A large number of conventional financial institutions, especially banks are moving to an Islamic financial model that\u27s comply with the Shari\u27a Law with little change to current conventional practices (reverse eningineer current business processes) to accommodate the new situation. In this study we will design and develop the business processes for the Islamic financial institutions\u27 (IFIs) products by investigating and collecting information through Islamic literature, surveys and interviews of experts in Islamic jurisprudence, regulators, academic and Islamic finance and banking practitioners. Then we will assess and evaluate the findings by using a Qur\u27anic Financial Corpus and use computational and analytical approaches to mine the Qur\u27an (the Muslim Holy book) and the Hadith (actions and words of the prophet Muhammad peace be upon him) to uncover hidden knowledge on Islamic financial business processes. The knowledge acquired from this investigation will be translated into an Islamic financial process model to be adapted by Islamic and non-Islamic financial institutions. The outcome of this research will influence the future development, growth and diversification of Islamic Financial Services worldwid

    Regulation of IκBα Function and NF-κB Signaling: AEBP1 Is a Novel Proinflammatory Mediator in Macrophages

    Get PDF
    NF-κB comprises a family of transcription factors that are critically involved in various inflammatory processes. In this paper, the role of NF-κB in inflammation and atherosclerosis and the regulation of the NF-κB signaling pathway are summarized. The structure, function, and regulation of the NF-κB inhibitors, IκBα and IκBβ, are reviewed. The regulation of NF-κB activity by glucocorticoid receptor (GR) signaling and IκBα sumoylation is also discussed. This paper focuses on the recently reported regulatory function that adipocyte enhancer-binding protein 1 (AEBP1) exerts on NF-κB transcriptional activity in macrophages, in which AEBP1 manifests itself as a potent modulator of NF-κB via physical interaction with IκBα and a critical mediator of inflammation. Finally, we summarize the regulatory roles that recently identified IκBα-interacting proteins play in NF-κB signaling. Based on its proinflammatory roles in macrophages, AEBP1 is anticipated to serve as a therapeutic target towards the treatment of various inflammatory conditions and disorders

    Modelling customers credit card behaviour using bidirectional LSTM neural networks

    Get PDF
    With the rapid growth of consumer credit and the huge amount of financial data developing effective credit scoring models is very crucial. Researchers have developed complex credit scoring models using statistical and artificial intelligence (AI) techniques to help banks and financial institutions to support their financial decisions. Neural networks are considered as a mostly wide used technique in finance and business applications. Thus, the main aim of this paper is to help bank management in scoring credit card clients using machine learning by modelling and predicting the consumer behaviour with respect to two aspects: the probability of single and consecutive missed payments for credit card customers. The proposed model is based on the bidirectional Long-Short Term Memory (LSTM) model to give the probability of a missed payment during the next month for each customer. The model was trained on a real credit card dataset and the customer behavioural scores are analysed using classical measures such as accuracy, Area Under the Curve, Brier score, Kolmogorov–Smirnov test, and H-measure. Calibration analysis of the LSTM model scores showed that they can be considered as probabilities of missed payments. The LSTM model was compared to four traditional machine learning algorithms: support vector machine, random forest, multi-layer perceptron neural network, and logistic regression. Experimental results show that, compared with traditional methods, the consumer credit scoring method based on the LSTM neural network has significantly improved consumer credit scoring
    corecore