47 research outputs found

    Exploring the Key Factors of Knowledge Sharing via Employee Weblogs

    No full text
    Abstract: In this study, two dependent variables of individual's intention and attitude have been defined for knowledge sharing via the employee weblog and independent variables have been determined in 3 groups of social influence factor, technology acceptance factor and social cognitive factor with subset variables including the subjective norm, social identity, group norm (first group), perceived usefulness, perceived ease of use, perceived enjoyment (second group), self-efficacy, personal outcome expectation, altruism and trust (third group). This research reviews the previous studies in the field of knowledge sharing via the employee weblog. The main difference of this research with other studies is to collect and complete a full set of factors affecting the knowledge sharing according to the factors raised in previous studies. Finally the suggestions have been provided for conducting the statistical studies in Iran

    A review of information technology service management (ITSM) framework for financial regulatory body

    No full text
    Malaysian organisations have realised significant gains by implementing an information technology service management (ITSM) framework and achieved high level of improvements through the implementation of ITSM. Financial Regulatory Body (FRB) in Malaysia. many organizations have completely transformed their IT services and their processes in accordance to the specified guidelines and struggled to keep pace to the changes being introduced by the frameworks and standards. An ITSM framework needs to be defined in accordance with the business requirements and operational drivers of the Organization to exploit the potential benefits of ITSM. However, the existing operational structure of FRB’s IT services and processes which are very independent and disintegrated with each other causes adaptability issues among the available ITSM frameworks. The aim of this paper is to review the current ITSM frameworks which are COBITs, ISO and ITIL for the suitability of the implementation to the FRB in Malaysia. A conventional approach of review on previous literature will be conducted. The output of this paper will highlights the comparison between the frameworks and the gap exist on the selected ITSM frameworks. For future, the findings will be serve as guideline to design a proposed framework for FRB especially in Malaysia context

    Assessing the Capability and Priority of Enterprise Architecture Implementation in Malaysian Public Sector

    Get PDF
    Enterprise Architecture (EA) is an integrated approach of information systems, processes, organisation and people in aligning business and information technology together. However, there is a discrepancy in public sector EA implementation whereby the developing countries are still grappling with issues in the implementation while those developed countries are already harvesting the EA benefits and value. Hence, this study aims to investigate the capability and priority of public sector of the developing countries in implementing the EA by proposing an assessment model. The assessment model is based on Balanced Scorecard (BSC) and Analytic Hierarchy Process (AHP) approach. There are 27 EAI capability and priority criteria identified and grouped into six categories according to BSC perspectives namely Internal Process, Learning and Growth, Authority Support, Cost, Technology and Talent Management. Followed by AHP pairwise comparison in calculating the rank of each criterion which is presented via three case studies from Malaysian Public Sector agencies

    Enterprise architecture implementation model: Measurement from experts and practitioner perspectives

    No full text
    Enterprise Architecture (EA) is vital element for organisation to ensure the viability of the organisation functionality. However, many organisations facing problem in EA implementation due to complexity of the EA frameworks, rigidity of business function and the chaotic IT structure. Various suggestions for better EA implementation in previous studies are yet to be verified by the EA practitioners in real case scenario. Therefore, this paper aims to measure the influential factors in EA implementation process from both experts and practitioners perspectives. This EA implementation model was formulated based on 27 factors from six categories, (IP-Internal Process, LG-Learning and Growth, AS-Authority Support, CS-Cost, TC-Technology and TM-Talent Management) which are gathered from previous studies and case studies of Malaysian Public Sector organisations. To measure this model, survey questionnaire was conducted to both selected EA experts and practitioners with intention to identify any differences between the theoretical and practical aspects in EA implementation. Findings reveal that, there is no significance difference on the level of agreement between the EA experts and practitioners except for three factors which are IP6-Rules and Process, AS5-Political Influence and CS1-Financial Resources. Hence, it can be concluded that both experts and practitioner share the same opinion on the factors that influence the EA implementation process

    Preliminary study on ISMS ISO 27001:2013 implementation to government agencies in Malaysia

    No full text
    An information security management system (ISMS) is a systematic procedure while managing an organization's data. System admin applies ISMS in order to minimize risk and to ensure the continuity of their business if security threats happen to their company. The study shows that immature communication between management and information security landscape is one of the problems contributing while doing risk assessment activity. This paper discusses preliminary study about the implementation of ISMS ISO 27001:2013 standards to government agencies in Malaysia. The study includes literature review and interview with MAMPU a sector lead to ensure government sectors certified with this standard

    A systematic review of enterprise architecture assessment models

    No full text
    This article provides a systematic review of Enterprise Architecture (EA) assessment model. The review main goal is to identify the existing EA assessment models and to categorize the models according to EA phases as well as to analyze the models limitation. The review result shows that there are 16 EA assessment models proposed across both industry and academic areas that fit in three EA phases mentioned

    Critical factors and comparative analysis that influencing the registration of domain name

    No full text
    Growth and increasing use worldwide domain is inconsistent with growth of world population. Although in terms of domain usage statistics across the world increased, but the distribution of the domain name registration unevenly between countries around the world. There are a number of users of the gap between the domain names countries around the world. The technologies domain name system (DNS), marketing strategic, domain names services and other factors such as economy in the country, culture, environment, educational, geographical location, political, internet activity trends and so on, are also influenced the use and registration of the domain name. Malaysia is also one of the countries categorized as a developing country that is still minimal use of domain names compared to the rate of population, consumer internet and social media. This paper also presents the comparative analysis is the item-by-item comparison critical factors that influence the registration of domain name. This paper shows how perspectives can be used for comparative analysis, summarizes a soundness proof for critical factors that influence the registration of domain name

    QoS-aware evaluation criteria for web service composition

    No full text
    Service composition is becoming increasingly pervasive, affecting the way service computing is utilized. Service composition has become an essential element of service deployment due to the fact that single services are unable to fulfill user requirements. Owing to the dramatic growth of services claiming similar functionalities, creating a value-added composite service from a number of candidate services to address the desired goals is a challenging task. To overcome this challenge, various Quality of Service (QoS) aware Web Service Composition (WSC) approaches have been implemented and have a significant impact on composition efficiency. However, there is a lack of knowledge on the impact of such approaches on service composition processes. Hence, this study is aimed to evaluate existing approaches based on QoS aspects. A mathematical-based QoS-aware evaluation framework is proposed and tested on the state-of-the-art approaches. The criteria used for evaluation are first identified from a comprehensive review of related literature. Multi Criteria Decision Making technique is applied in order to formulate a new QoS-aware evaluation method for Web Service Composition approaches based on the identified criteria. The approaches are evaluated using the proposed method to prove its applicability and correctness. The results demonstrate how a service composition approach addresses QoS aspects and assists researchers in outperforming their service composition solutions. The statistical results show the efficiency and correctness of the evaluation method

    Research Article Novel Security Conscious Evaluation Criteria for Web Service Composition

    Get PDF
    Abstract: This study aims to present a new mathematical based evaluation method for service composition with respects to security aspects. Web service composition as complex problem solver in service computing has become one of the recent challenging issues in today's web environment. It makes a new added value service through combination of available basic services to address the problem requirements. Despite the importance of service composition in service computing, security issues have not been addressed in this area. Considering the dazzling growth of number of service based transactions, making a secure composite service from candidate services with different security concerns is a demanding task. To deal with this challenge, different techniques have been employed which have direct impacts on secure service composition efficiency. Nonetheless, little work has been dedicated to deeply investigate those impacts on service composition outperformance. Therefore, the focus of this study is to evaluate the existing approaches based on their applied techniques and QoS aspects. A mathematicalbased security-aware evaluation framework is proposed wherein Analytic Hierarchy Process (AHP), a multiple criteria decision making technique, is adopted. The proposed framework is tested on state-of-the-art approaches and the statistical analysis of the results presents the efficiency and correctness of the proposed work
    corecore