Search results for: Business success
1169 IS Flexibility Planning for IT/Business Strategy Alignment via Future Oriented POC Analysis
Authors: Masaru Furukawa, Shigeki Hirobayashi, Tadanobu Misawa
Abstract:
Nowadays, IT/Business strategy alignment is still a key topic of concern among managers worldwide. Change has always being considered the primary challenge affecting the strategy alignment. Planning for alignment in uncertain and dynamic changing environments is burdened with risk as organizations seek to understand how much flexibility to build in their management information system so as to maintain high levels of alignment. The literature review showed that there is a tight relationship between IT infrastructure flexibility and the strategy alignment with strategic information systems (SIS) planning serving as a moderator of this relationship, and that emphasized the needs for organizations to use SIS planning consistently and to monitor the relationship between IS flexibility and the alignment. This paper presents the procedure of SIS planning with IS flexibility renovation via future oriented analysis of POC (penalty of change) as a function of cost and time. Using this SIS planning and monitoring IS flexibility and the alignment during periods of increased change in dynamic and uncertain environments reduces the risk that could transform IT into an inhibitor rather than an enabler of change.
Keywords: IT/Business strategy alignment, strategic information systems (SIS) planning, IS flexibility, penalty of change (POC).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16231168 Proposing Enterprise Wide Information Systems Business Performance Model
Authors: Vineet Kansal
Abstract:
Enterprise Wide Information Systems (EWIS) implementation involves the entire business and will require changes throughout the firm. Because of the scope, complexity and continuous nature of ERP, the project-based approach to managing the implementation process resulted in failure rates of between 60% and 80%. In recent years ERP systems have received much attention. The organizational relevance and risk of ERP projects make it important for organizations to focus on ways to make ERP implementation successful. Once these systems are in place, however, their performance depends on the identified macro variables viz. 'Business Process', 'Decision Making' and 'Individual / Group working'. The questionnaire was designed and administered. The responses from 92 organizations were compiled. The relationship of these variables with EWIS performance is analyzed using inferential statistical measurements. The study helps to understand the performance of model presented. The study suggested in keeping away from the calamities and thereby giving the necessary competitive edge. Whenever some discrepancy is identified during the process of performance appraisal care has to be taken to draft necessary preventive measures. If all these measures are taken care off then the EWIS performance will definitely deliver the results.Keywords: Enterprise Systems, performance, technology
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13031167 Study of Pre-Handwriting Factors Necessary for Successful Handwriting in Children
Authors: Lalitchandra J. Shah, Katarzyna Bialek, Melinda L. Clarke, Jessica L. Jansson
Abstract:
Handwriting is essential to academic success; however, the current literature is limited in the identification of pre-handwriting skills. The purpose of this study was to identify the pre-handwriting skills, which occupational therapy practitioners deem important to handwriting success, as well as those which aid in intervention planning. The online survey instrument consisted of 33 questions that assessed various skills related to the development of handwriting, as well as captured demographic information. Both occupational therapists and occupational therapy assistants were included in the survey study. The survey found that the respondents were in agreement that purposeful scribbling, the ability of a child to copy (vertical/horizontal lines, circle, squares, and triangles), imitating an oblique cross, cognitive skills (attention, praxis, self-regulation, sequencing), grasp patterns, hand dominance, in hand manipulation skills (shift, translation, rotation), bilateral integration, stabilization of paper, crossing midline, and visual perception were important indicators of handwriting readiness. The results of the survey support existing research regarding the skills necessary for the successful development of handwriting in children.Keywords: Development, handwriting, occupational therapy, visual perceptual skills.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34221166 Cloud Computing for E-Learning with More Emphasis on Security Issues
Authors: Sajjad Hashemi, Seyyed Yasser Hashemi
Abstract:
In today's world, success of most systems depend on the use of new technologies and information technology (IT) which aimed to increase efficiency and satisfaction of users. One of the most important systems that use information technology to deliver services is the education system. But for educational services in the form of E-learning systems, hardware and software equipment should be containing high quality, which requires substantial investment. Because the vast majority of educational establishments can not invest in this area so the best way for them is reducing the costs and providing the E-learning services by using cloud computing. But according to the novelty of the cloud technology, it can create challenges and concerns that the most noted among them are security issues. Security concerns about cloud-based E-learning products are critical and security measures essential to protect valuable data of users from security vulnerabilities in products. Thus, the success of these products happened if customers meet security requirements then can overcome security threats. In this paper tried to explore cloud computing and its positive impact on E- learning and put main focus to identify security issues that related to cloud-based E-learning efforts which have been improve security and provide solutions in management challenges.
Keywords: Cloud computing, E-Learning, Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32201165 Trust and Security in Electronic Payments: What We Have and Need to Know?
Authors: Theodosios Tsiakis, George Stephanides, George Pekos
Abstract:
The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Keywords: Electronic payment, security, trust, electronic business mechanism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27971164 Application of Western and Islamic Philosophy to Business Ethics
Authors: Elmamy Ahmedsalem
Abstract:
The world has witnessed the collapse of many corporate giants as a result of unethical behavior in recent decades. This has induced a series of questions by the global community on why such occurrences could happen, even with corporate governance in place. This paper attempts to propose a philosophical approach from an Islamic perspective to be consolidated with current corporate governance in order to confront contemporary dilemmas. In this paper, ethical theories are presented as a discussion followed by their applications to modern cases of financial collapses. Virtue ethics by Aristotle, justice and fairness by John Rawls, deontology by Immanuel Kant, and utilitarianism by John Stuart Mill, are the four theories which can then be contrasted with the paradigm of Muslim scholars. Despite the differences between the fundamental principles of Islamic and Western worldviews, their ethical theories are aimed at making right decisions and solving ethical dilemmas based on what is good for society. Therefore, Islamic principles should be synthesized with Western philosophy to form a more coherent framework. The integration of Islamic and western ethical theories into business is important for sound corporate governance.
Keywords: Business ethics, Islamic philosophy, western philosophy, Western and Islamic Worldview of Ethics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22971163 Analytic Network Process in Location Selection and Its Application to a Real Life Problem
Authors: Eylem Koç, Hasan Arda Burhan
Abstract:
Location selection presents a crucial decision problem in today’s business world where strategic decision making processes have critical importance. Thus, location selection has strategic importance for companies in boosting their strength regarding competition, increasing corporate performances and efficiency in addition to lowering production and transportation costs. A right choice in location selection has a direct impact on companies’ commercial success. In this study, a store location selection problem of Carglass Turkey which operates in vehicle glass branch is handled. As this problem includes both tangible and intangible criteria, Analytic Network Process (ANP) was accepted as the main methodology. The model consists of control hierarchy and BOCR subnetworks which include clusters of actors, alternatives and criteria. In accordance with the management’s choices, five different locations were selected. In addition to the literature review, a strict cooperation with the actor group was ensured and maintained while determining the criteria and during whole process. Obtained results were presented to the management as a report and its feasibility was confirmed accordingly.
Keywords: Analytic Network Process, BOCR, location selection, multi-actor decision making, multi-criteria decision making, real life problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20881162 A Survey of Online User Perspectives and Age Profile in an Undergraduate Fundamental Business Technology Course
Authors: Danielle Morin, Jennifer D. E. Thomas, Raafat G. Saade, Daniela Petrachi
Abstract:
Over the past few decades, more and more students choose to enroll in online classes instead of attending in-class lectures. While past studies consider students’ attitudes towards online education and how their grades differed from in-class lectures, the profile of the online student remains a blur. To shed light on this, an online survey was administered to about 1,500 students enrolled in an undergraduate Fundamental Business Technology course at a Canadian University. The survey was comprised of questions on students’ demographics, their reasons for choosing online courses, their expectations towards the course, the communication channels they use for the course with fellow students and with the instructor. This paper focused on the research question: Do the perspectives of online students concerning the online experience, in general, and in the course in particular, differ according to age profile? After several statistical analyses, it was found that age does have an impact on the reasons why students select online classes instead of in-class. For example, it was found that the perception that an online course might be easier than in-class delivery was a more important reason for younger students than for older ones. Similarly, the influence of friends is much more important for younger students, than for older students. Similar results were found when analyzing students’ expectation about the online course and their use of communication tools. Overall, the age profile of online users had an impact on reasons, expectations and means of communication in an undergraduate Fundamental Business Technology course. It is left to be seen if this holds true across other courses, graduate and undergraduate.
Keywords: Communication channels, fundamentals of business technology, online classes, pedagogy, user age profile, user perspectives.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7681161 Corporate Fraud: An Analysis of Malaysian Securities Commission Enforcement Releases
Authors: Raziah Bi Mohamed Sadique, Jamal Roudaki, Murray B. Clark, Norhayati Alias
Abstract:
Economic crime (i.e. corporate fraud) has a significant impact on business. This study analyzes the fraud cases reported by the Malaysian Securities Commission. Frauds involving market manipulation and/or illegal share trading are the most common types of fraud reported over the 6 years analyzed. The highest number of frauds reported involved investment and fund holding companies. Alarmingly the results indicate quite a high number of frauds cases are committed by management. The higher number of Chinese perpetrators may be due to fact that they are the dominant group in Malaysian business. The result also shows that more than half of companies involved with fraud are privately held companies in the investment/fund/finance sector. The results of this study highlight general characteristic of perpetrators (person and company) that commit fraud which could help the regulators in their monitoring and enforcement activities. To investors, this would help in analyzing their business investment or portfolio risk.Keywords: Corporate fraud, economic crime, fraudcharacteristic, perpetrators
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 53001160 Analyzing the Perception of Social Networking Sites as a Learning Tool among University Students: Case Study of a Business School in India
Authors: Bhaskar Basu
Abstract:
Universities and higher education institutes are finding it increasingly difficult to engage students fruitfully through traditional pedagogic tools. Web 2.0 technologies comprising social networking sites (SNSs) offer a platform for students to collaborate and share information, thereby enhancing their learning experience. Despite the potential and reach of SNSs, its use has been limited in academic settings promoting higher education. The purpose of this paper is to assess the perception of social networking sites among business school students in India and analyze its role in enhancing quality of student experiences in a business school leading to the proposal of an agenda for future research. In this study, more than 300 students of a reputed business school were involved in a survey of their preferences of different social networking sites and their perceptions and attitudes towards these sites. A questionnaire with three major sections was designed, validated and distributed among a sample of students, the research method being descriptive in nature. Crucial questions were addressed to the students concerning time commitment, reasons for usage, nature of interaction on these sites, and the propensity to share information leading to direct and indirect modes of learning. It was further supplemented with focus group discussion to analyze the findings. The paper notes the resistance in the adoption of new technology by a section of business school faculty, who are staunch supporters of the classical “face-to-face” instruction. In conclusion, social networking sites like Facebook and LinkedIn provide new avenues for students to express themselves and to interact with one another. Universities could take advantage of the new ways in which students are communicating with one another. Although interactive educational options such as Moodle exist, social networking sites are rarely used for academic purposes. Using this medium opens new ways of academically-oriented interactions where faculty could discover more about students' interests, and students, in turn, might express and develop more intellectual facets of their lives. hitherto unknown intellectual facets. This study also throws up the enormous potential of mobile phones as a tool for “blended learning” in business schools going forward.
Keywords: Business school, India, learning, social media, social networking, university.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14281159 Early Recognition and Grading of Cataract Using a Combined Log Gabor/Discrete Wavelet Transform with ANN and SVM
Authors: Hadeer R. M. Tawfik, Rania A. K. Birry, Amani A. Saad
Abstract:
Eyes are considered to be the most sensitive and important organ for human being. Thus, any eye disorder will affect the patient in all aspects of life. Cataract is one of those eye disorders that lead to blindness if not treated correctly and quickly. This paper demonstrates a model for automatic detection, classification, and grading of cataracts based on image processing techniques and artificial intelligence. The proposed system is developed to ease the cataract diagnosis process for both ophthalmologists and patients. The wavelet transform combined with 2D Log Gabor Wavelet transform was used as feature extraction techniques for a dataset of 120 eye images followed by a classification process that classified the image set into three classes; normal, early, and advanced stage. A comparison between the two used classifiers, the support vector machine SVM and the artificial neural network ANN were done for the same dataset of 120 eye images. It was concluded that SVM gave better results than ANN. SVM success rate result was 96.8% accuracy where ANN success rate result was 92.3% accuracy.Keywords: Cataract, classification, detection, feature extraction, grading, log-gabor, neural networks, support vector machines, wavelet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9931158 A study of the ERP Project Life Cycles in Small-and-Medium–Sized Enterprises: Critical Issues and Lessons Learned
Authors: Eli Hustad, Aurilla A. Bechina
Abstract:
The purpose of this research is to increase our knowledge as regards how Small-and-Medium-Sized Enterprises (SMEs) tackle ERP implementation projects to achieve successful adoption and use of these systems within the organization. SMEs have scare resources to handle these kinds of projects which have proved to be risky and costly. There are several studies focusing on ERP implementation in larger companies, however, few studies report on challenges experienced by SMEs. Our research seeks to bridge this gap. Through a multiple case study of four companies, we identified challenges and critical elements within the different phases (pre-implementation, implementation and post-implementation) of the ERP life cycle. To interpret our findings, we utilize a well-know ERP life cycle model and critical success factors developed for larger companies which are reported in former research literature. We discuss if these models are relevant for SMEs and suggest additional critical elements identified in this study to make a framework more adapted to the SME context.Keywords: ERP implementation challenges, ERP implementation framework, ERP life cycle model, Small-and- Medium-Sized Enterprises, ERP critical success factors
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23001157 Matching Farmer Competence and Farm Resources with the Transformation of Agri-Food Marketing Systems
Authors: Bhawat Chiamjinnawat
Abstract:
The agri-food market transformation has implied market growth for the fruit industry in Thailand. This article focuses on analysis of farmer competence and farm resources which affect market strategies used by fruit farmers in Chanthaburi province of Thailand. The survey data were collected through the use of face-to-face interviews with structured questionnaires. This study identified 14 drivers related to farmer competence and farm resources of which some had significant effect on the decision to use either high-value markets or traditional markets. The results suggest that farmers who used high-value markets were better educated and they had longer experience and larger sized business. Identifying the important factors that match with the market transformation provides policy with opportunities to support the fruit farmers to increase their market power. Policies that promote business expansion of agricultural cooperatives and knowledge sharing among farmers are recommended to reduce limitations due to limited knowledge, low experience, and small business sizes.
Keywords: Farmer competence, farm resources, fruit industry, high-value markets, Thailand.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12561156 KM Practices in Service SMEs
Authors: K. Cormican, G. Coppola, S. Farina
Abstract:
Knowledge management is a critical component of competitive success in service organizations. Knowledge management centers on creating new knowledge and utilizing existing knowledge. While utilizing existing knowledge relates to input and control and can lead to a reduction in costs; creating new knowledge relates to output and growth and can lead to an increase in revenue. Therefore managers must ensure that they can successfully optimize the knowledge and talent in their organizations. To do this they and must try to develop an environment that promotes the generation, acquisition, transfer and use of valuable knowledge in creative ways. However knowledge management is complex and diverse. Research suggests that organizations in general and SMEs in particular are finding it difficult to implement successful knowledge management initiatives. Our research attempts to understand whether organizations are adopting best practice initiatives in their organizations. This paper presents findings from an exploratory study of 139 SMEs operating in the tourism sector across Europe. The goals of the survey is to assess the level of awareness of knowledge and talent management strategies and methodologies and to determine whether the responding companies implement best practice knowledge management initiatives in their organizations Analysis of the findings from the study are presented and discussed.Keywords: service sector, small enterprise, success factors, survey
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16141155 Object-Centric Process Mining Using Process Cubes
Authors: Anahita Farhang Ghahfarokhi, Alessandro Berti, Wil M.P. van der Aalst
Abstract:
Process mining provides ways to analyze business processes. Common process mining techniques consider the process as a whole. However, in real-life business processes, different behaviors exist that make the overall process too complex to interpret. Process comparison is a branch of process mining that isolates different behaviors of the process from each other by using process cubes. Process cubes organize event data using different dimensions. Each cell contains a set of events that can be used as an input to apply process mining techniques. Existing work on process cubes assume single case notions. However, in real processes, several case notions (e.g., order, item, package, etc.) are intertwined. Object-centric process mining is a new branch of process mining addressing multiple case notions in a process. To make a bridge between object-centric process mining and process comparison, we propose a process cube framework, which supports process cube operations such as slice and dice on object-centric event logs. To facilitate the comparison, the framework is integrated with several object-centric process discovery approaches.Keywords: Process mining, multidimensional process mining, multi-perspective business processes, OLAP, process cubes, process discovery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11191154 The Research and Application of M/M/1/N Queuing Model with Variable Input Rates, Variable Service Rates and Impatient Customers
Authors: Quanru Pan
Abstract:
How to maintain the service speeds for the business to make the biggest profit is a problem worthy of study, which is discussed in this paper with the use of queuing theory. An M/M/1/N queuing model with variable input rates, variable service rates and impatient customers is established, and the following conclusions are drawn: the stationary distribution of the model, the relationship between the stationary distribution and the probability that there are n customers left in the system when a customer leaves (not including the customer who leaves himself), the busy period of the system, the average operating cycle, the loss probability for the customers not entering the system while they arriving at the system, the mean of the customers who leaves the system being for impatient, the loss probability for the customers not joining the queue due to the limited capacity of the system and many other indicators. This paper also indicates that the following conclusion is not correct: the more customers the business serve, the more profit they will get. At last, this paper points out the appropriate service speeds the business should keep to make the biggest profit.Keywords: variable input rates, impatient customer, variable servicerates, profit maximization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19631153 Risks and Mitigation Measures in Build-Operate-Transfer Projects
Authors: Syed Kamarul Bakri Syed Ahmad Bokharey, Kalaikumar Vallyutham, Narayanan Sambu Potty, Nabilah Abu Bakar
Abstract:
Infrastructure investments are important in developing countries, it will not only help to foster the economic growth of a nation, but it will also act as a platform in which new forms of partnership and collaboration can be developed mainly in East Asian countries. Since the last two decades, many infrastructure projects had been completed through build-operate-transfer (BOT) type of procurement. The developments of BOT have attracted participation of local and foreign private sector investor to secure funding and to deliver projects on time, within the budget and to the required specifications. Private sectors are preferred by the government in East Asia to participate in BOT projects due to lack of public funding. The finding has resulted that the private sector or promoter of the BOT projects is exposed to multiple risks which have been discussed in this paper. Effective risk management methods and good managerial skills are required in ensuring the success of the project. The review indicated that mitigation measures should be employed by the promoter throughout the concession period and support from the host government is also required in ensuring the success of the BOT project.Keywords: BOT project, risks management, concessionaire, consortium.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 82051152 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia
Authors: Tim Nedyalkov
Abstract:
A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. Collecting, managing, and retaining large amounts of data in cloud environments make information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.
Keywords: Cloud compliance, cloud security, cloud security governance, data governance, privacy protection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9121151 Environmental Responsibility and Firm Performance: Evidence from Nigeria
Authors: Collins C. Ngwakwe
Abstract:
The objective of this paper is to establish a possible relationship between sustainable business practice and firm performance. Using a field survey methodology, a sample of sixty manufacturing companies in Nigeria was studied. The firms were categorised into two groups, environmentally 'responsible' and 'irresponsible' firms. An investigation was undertaken into the possible relationship between firm performance and three selected indicators of sustainable business practice: employee health and safety (EHS), waste management (WM), and community development (CD), common within the 30 'responsible' firms. Findings from empirical results reveal that the sustainable practices of the 'responsible' firms are significantly related with firm performance. In addition, sustainable practices are inversely related with fines and penalties. The paper concludes that, within the Nigerian setting at least, sustainability affects corporate performance and sustainability may be a possible tool for corporate conflict resolution as evidenced in the reduction of fines, penalties and compensations. The paper therefore recommends research into the relationship between sustainability and conflict management.
Keywords: Environmental responsibility, environmental investment, social responsibility, sustainable business, social ethics, environmental ethics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40051150 The Strategic Engine Model: Redefined Strategy Structure, as per Market-and Resource-Based Theory Application, Tested in the Automotive Industry
Authors: Krassimir Todorov
Abstract:
The purpose of the paper is to redefine the levels of structure of corporate, business and functional strategies that were established over the past several decades, to a conceptual model, consisting of corporate, business and operations strategies, that are reinforced by functional strategies. We will propose a conceptual framework of different perspectives in the role of strategic operations as a separate strategic place and reposition the remaining functional strategies as supporting tools, existing at all three levels. The proposed model is called ‘the strategic engine’, since the mutual relationships of its ingredients are identical with main elements and working principle of the internal combustion engine. Based on theoretical essence, related to every strategic level, we will prove that the strategic engine model is useful for managers seeking to safeguard the competitive advantage of their companies. Each strategy level is researched through its basic elements. At the corporate level we examine the scope of firm’s product, the vertical and geographical coverage. At the business level, the point of interest is limited to the SWOT analysis’ basic elements. While at operations level, the key research issue relates to the scope of the following performance indicators: cost, quality, speed, flexibility and dependability. In this relationship, the paper provides a different view for the role of operations strategy within the overall strategy concept. We will prove that the theoretical essence of operations goes far beyond the scope of traditionally accepted business functions. Exploring the applications of Resource-based theory and Market-based theory within the strategic levels framework, we will prove that there is a logical consequence of the theoretical impact in corporate, business and operations strategy – at every strategic level, the validity of one theory is substituted to the level of the other. Practical application of the conceptual model is tested in automotive industry. Actually, the proposed theoretical concept is inspired by a leading global automotive group – Inchcape PLC, listed on the London Stock Exchange, and constituent of the FTSE 250 Index.
Keywords: Business strategy, corporate strategy, functional strategies, operations strategy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8811149 Information System Security Effectiveness Attributes: A Tanzanian Company Case Study
Authors: Nerey H. Mvungi, Mosses Makoko
Abstract:
In today-s highly globalised and competitive world access to information plays key role in having an upper hand between business rivals. Hence, proper protection of such crucial resource is core to any modern business. Implementing a successful information security system is basically centered around three pillars; technical solution involving both software and hardware, information security controls to translate the policies and procedure in the system and the people to implement. This paper shows that a lot needs to be done for countries adapting information technology to process, store and distribute information to secure adequately such core resource.Keywords: security, information systems, controls, technology, practices.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26121148 Optimisation of Intermodal Transport Chain of Supermarkets on Isle of Wight, UK
Authors: Jingya Liu, Yue Wu, Jiabin Luo
Abstract:
This work investigates an intermodal transportation system for delivering goods from a Regional Distribution Centre to supermarkets on the Isle of Wight (IOW) via the port of Southampton or Portsmouth in the UK. We consider this integrated logistics chain as a 3-echelon transportation system. In such a system, there are two types of transport methods used to deliver goods across the Solent Channel: one is accompanied transport, which is used by most supermarkets on the IOW, such as Spar, Lidl and Co-operative food; the other is unaccompanied transport, which is used by Aldi. Five transport scenarios are studied based on different transport modes and ferry routes. The aim is to determine an optimal delivery plan for supermarkets of different business scales on IOW, in order to minimise the total running cost, fuel consumptions and carbon emissions. The problem is modelled as a vehicle routing problem with time windows and solved by genetic algorithm. The computing results suggested that accompanied transport is more cost efficient for small and medium business-scale supermarket chains on IOW, while unaccompanied transport has the potential to improve the efficiency and effectiveness of large business scale supermarket chains.
Keywords: Genetic algorithm, intermodal transport system, Isle of Wight, optimization, supermarket.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10051147 TheAnalyzer: Clustering-Based System for Improving Business Productivity by Analyzing User Profiles to Enhance Human-Computer Interaction
Authors: D. S. A. Nanayakkara, K. J. P. G. Perera
Abstract:
E-commerce platforms have revolutionized the shopping experience, offering convenient ways for consumers to make purchases. To improve interactions with customers and optimize marketing strategies, it is essential for businesses to understand user behavior, preferences, and needs on these platforms. This paper focuses on recommending businesses to customize interactions with users based on their behavioral patterns, leveraging data-driven analysis and machine learning techniques. Businesses can improve engagement and boost the adoption of e-commerce platforms by aligning behavioral patterns with user goals of usability and satisfaction. We propose TheAnalyzer, a clustering-based system designed to enhance business productivity by analyzing user-profiles and improving human-computer interaction. TheAnalyzer seamlessly integrates with business applications, collecting relevant data points based on users' natural interactions without additional burdens such as questionnaires or surveys. It defines five key user analytics as features for its dataset, which are easily captured through users' interactions with e-commerce platforms. This research presents a study demonstrating the successful distinction of users into specific groups based on the five key analytics considered by TheAnalyzer. With the assistance of domain experts, customized business rules can be attached to each group, enabling TheAnalyzer to influence business applications and provide an enhanced personalized user experience. The outcomes are evaluated quantitatively and qualitatively, demonstrating that utilizing TheAnalyzer’s capabilities can optimize business outcomes, enhance customer satisfaction, and drive sustainable growth. The findings of this research contribute to the advancement of personalized interactions in e-commerce platforms. By leveraging user behavioral patterns and analyzing both new and existing users, businesses can effectively tailor their interactions to improve customer satisfaction, loyalty and ultimately drive sales.
Keywords: Data clustering, data standardization, dimensionality reduction, human-computer interaction, user profiling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2281146 Design Systems and the Need for a Usability Method: Assessing the Fitness of Components and Interaction Patterns in Design Systems Using Atmosphere Methodology
Authors: P. Johansson, S. Mardh
Abstract:
The present study proposes a usability test method, Atmosphere, to assess the fitness of components and interaction patterns of design systems. The method covers the user’s perception of the components of the system, the efficiency of the logic of the interaction patterns, perceived ease of use as well as the user’s understanding of the intended outcome of interactions. These aspects are assessed by combining measures of first impression, visual affordance and expectancy. The method was applied to a design system developed for the design of an electronic health record system. The study was conducted involving 15 healthcare personnel. It could be concluded that the Atmosphere method provides tangible data that enable human-computer interaction practitioners to analyze and categorize components and patterns based on perceived usability, success rate of identifying interactive components and success rate of understanding components and interaction patterns intended outcome.
Keywords: atomic design, atmosphere methodology, design system, expectancy testing, first impression testing, usability testing, visual affordance testing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8541145 Review of Studies on Agility in Knowledge Management
Authors: Ferdi Sönmez, Başak Buluz
Abstract:
Agility in Knowledge Management (AKM) tries to capture agility requirements and their respective answers within the framework of knowledge and learning for organizations. Since it is rather a new construct, it is difficult to claim that it has been sufficiently discussed and analyzed in practical and theoretical realms. Like the term ‘agile learning’, it is also commonly addressed in the software development and information technology fields and across the related areas where those technologies can be applied. The organizational perspective towards AKM, seems to need some more time to become scholarly mature. Nevertheless, in the literature one can come across some implicit usages of this term occasionally. This research is aimed to explore the conceptual background of agility in KM, re-conceptualize it and extend it to business applications with a special focus on e-business.
Keywords: Knowledge management, agility requirements, agility in knowledge management, knowledge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12571144 Wangle the Organizational Internal and External Knowledge – A New Horizon for Sustaining the Business Stability
Authors: Asim N., M. Mazhar Manzoor, Shariq A.
Abstract:
Knowledge is renowned as a significant component for sustaining competitive advantage and gives leading edge in business. This study emphasizes towards proper and effectuate utilization of internal and external (both either explicit or tacit) knowledge comes from stakeholders, highly supportive to combat with the challenges and enhance organizational productivity. Furthermore, it proposed a model under context of IRSA framework which facilitates the organization including flow of knowledge and experience sharing among employees. In discussion section an innovative model which indulges all functionality as mentioned in analysis section.Keywords: Effective Decision-Making, Internal & ExternalKnowledge, Knowledge Management, Tacit & Explicit Knowledge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13161143 Chinese Entrepreneurship in the Internet Age: Lessons from Alibaba.com
Authors: Linda Sau-ling LAI
Abstract:
The story of Alibaba demonstrates a credible example of how a small start-up company can eventually make it big in the global economy through the Internet. This case study does not attempt to present Alibaba as a perfect formula; rather, it discusses the strategies carried out by the firm and, in the process, culls out the important lessons that can guide start-ups and aspiring entrepreneurs in the complex world of online trading. Similar to the interesting and exotic Asian cuisine that continuously evolves from the diversity of Asia-s people and their unique culture and personality, Alibaba has successfully transformed itself over the years, adapting to the changes in and demands of online businessto- business (B2B) commerce.
Keywords: Entrepreneurship, electronic commerce, leadership, business model, small and medium enterprises.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 71781142 Institutional Aspects of Information Security in Russian Economy
Authors: Mingaleva Zhanna, Kapuskina Tatiana
Abstract:
The article touches upon questions of information security in Russian Economy. It covers theoretical bases of information security and causes of its development. The theory is proved by the analysis of business activities and the main tendencies of information security development. Perm region has been chosen as the bases for the analysis, being the fastestdeveloping region that uses methods of information security in managing it economy. As a result of the study the authors of the given article have formulated their own vision of the problem of information security in various branches of economy and stated prospects of information security development and its growing role in Russian economy
Keywords: security of business, management of information security, institutional analyses.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13191141 Students as Global Citizens: Lessons from the International Study Tour
Authors: Ana Hol
Abstract:
Study and work operations are being transformed with the uses of technologies and are consequently becoming global. This paper outlines lessons learned based on the international study tour that Australian Bachelor of Information Systems students undertook. This research identifies that for the study tour to be successful, students need to gain skills that global citizens require. For example, students will need to gain an understanding of local cultures, local customs and habits. Furthermore, students would also need to gain an understanding of how a field of their future career expertise operates in the host country, how study and business are conducted internationally, which tools and technologies are currently being utilized on a global scale, what trends drive future developments world-wide and how business negotiations and collaborations are being undertaken across borders. Furthermore, this research provides a guide to educators who are planning, guiding and running study tours as it outlines the requirements of having a pre-tour preparatory session, carefully planned and executed tour itineraries and post-tour sessions during which students can reflect on their experiences and lessons learned so that they can apply them to future international business visits and ventures.Keywords: Global education, international experiences, international study tours, students as global citizens, student centered education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15991140 Emergence of New Capitalist Class and Issues of Market, Merit and Social Justice: The Business and Economics of Higher Education in India
Authors: Subramaniam Chandran
Abstract:
This paper analyses the structural changes in education sector since the introduction of liberalization policy in India. This paper explains how the so-called non-profit trusts and societies appropriated the liberalization policy and enhanced themselves as new capitalist class in higher education sector. Over the decades, the policy witnessed the role of private sector in terms of maintaining market equilibrium. The state also witnessed the incompatibility of the private sector in inculcating the values of social justice. The most important consequence of the policy is to witness the rise of new capitalist class and academic capitalism. When the state came to realize that it no longer cope up with market demands, it opens the entry of private sector in higher education. Concessions and tax exemptions were provided to the trusts and societies to establish higher education institutions. There is a basic difference between western countries and India in providing higher education by the trusts and societies. In western countries the big business houses contributed their surplus revenues to promote higher education and research as a complementary service to society and nation. In India, several entrepreneurs came up with business motive using education sector. Over the period, they accumulated wealth at the cost of students and concessions from the government. Four major results can now be identified: production of manpower in view of market demands; reduction of standards in higher education; bypassing the values of social justice; and the rise of new capitalist class from the business of education. This paper tries to substantiate these issues with the inputs from case studies.Keywords: New capitalism, market, social justice, higher education
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1471