Development of an adoption model to assess user acceptance of e-service technology: E-Service Technology Acceptance Model

Development of an adoption model to assess user acceptance of e-service technology: E-Service Technology Acceptance Model Abstract With remarkable growth of ICT development and the Internet popularity, the widespread use of the electronic service is becoming inevitable. Furthermore, as the user adoption plays an important role for successful and effective…

Understanding of E-service Security Dimensions and its effect of Quality and Intention to Use

Understanding of E-service Security Dimensions and its effect of Quality and Intention to Use Abstract Purpose Security has been a critical matter in the development of electronic services. The purpose of this research is to develop a new model to help e-service practitioners and researchers in the evaluation of e-service…

Decision Making Using the Analytic Hierarchy Process (AHP); A Step by Step Approach

Decision Making Using the Analytic Hierarchy Process (AHP); A Step by Step Approach Abstract Analytical Hierarchy Process is one of the most inclusive system which is considered to make decisions with multiple criteria because this method gives to formulate the problem as a hierarchical and believe a mixture of quantitative…

Appraising the Smart Card Technology Adoption; Case of Application in University Environment

Appraising the Smart Card Technology Adoption; Case of Application in University Environment Abstract Recently, smart card technology is used in a large variety of applications in many industries. Because of its personal security features such as access control, ability to perform multiple functions and also the capability to upgrade, it…

Measurement and Scaling Techniques in Research Methodology; Survey / Questionnaire Development

Measurement and Scaling Techniques in Research Methodology; Survey / Questionnaire Development Abstract One of the important research tool is questionnaire. In order to develop a survey/questionnaire, first the researcher should decide how the data is measured to collect. Scaling is the branch of measurement that involves the construction of an…

Leadership Effectiveness Measurement and Its Effect on Organization Outcomes

Leadership Effectiveness Measurement and Its Effect on Organization Outcomes Abstract According to the leadership's researchers, effective leadership is a key analyst of organizational success or failure while examining the factors that lead to organizational success [1]. The undeniable question is, do leadership or leaders and effective leadership matter and positively…

How to Design and Create an Effective Survey/Questionnaire; A Step by Step Guide

How to Design and Create an Effective Survey/Questionnaire; A Step by Step Guide Abstract Businesses and researchers across all industries conduct surveys to uncover answers to specific, important questions. In fact, questionnaires and surveys can be an effective tools for data collection required research and evaluation The challenge is how…

Validity and Reliability of the Research Instrument; How to Test the Validation of a Questionnaire/Survey in a Research

Validity and Reliability of the Research Instrument; How to Test the Validation of a Questionnaire/Survey in a Research Abstract Questionnaire is one of the most widely used tools to collect data in especially social science research. The main objective of questionnaire in research is to obtain relevant information in most…

Frame Effect Theories; Review and Assessment

Frame Effect Theories; Review and Assessment Abstract Framing effect is observed when representation of options in different terms of gains (positiveframe) or losses (negative frame) provokes systematically different choices or decisions. Several theories were identified by empirical studies and explained the framing effect, which afterwards been categorized into four models…

The Relationship between Ethical Leadership, Leadership Effectiveness and Organizational Performance: A Review of Literature in SMEs Context

The Relationship between Ethical Leadership, Leadership Effectiveness and Organizational Performance: A Review of Literature in SMEs Context Abstract Nowadays, the purpose of any organizations is to survive and maintain its entity by improving their performance. Organizations must always increase their performance to be highly competitive in markets. Nowadays, ethical leadership…

A Novel Approach for Genetic Audio Watermarking

A Novel Approach for Genetic Audio Watermarking Abstract This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would…

Perusing of Organizational Culture Effects on E-Mail Communication

Perusing of Organizational Culture Effects on E-Mail Communication Abstract Today most business communications and transactions are conducted via Computer Mediated Communication (CMC) and email is the most familiar type of CMC. In fact, email plays a crucial role in establishing and maintaining business relationships, both within a company and with…

Examination of Electronic Service Definitions

Examination of Electronic Service Definitions Abstract The electronic service concept stands for one prominent application of using the information and communication technologies in dissimilar areas. However, providing an exact definition of e-service is hard to come by as researchers have been using different definitions to describe e-service. This paper presents…

Critical Factors that Lead to Projects’ Success/Failure in Global Marketplace

Critical Factors that Lead to Projects’ Success/Failure in Global Marketplace Abstract There is empirical evidence that project sphere has not been valued appropriately in many organizations because it seems certain that the company's projects are not unified and consequently spread across several other spheres. However, it is necessary to know…

Proposing a Framework for Exploration of Crime Data Using Web Structure and Content Mining

Proposing a Framework for Exploration of Crime Data Using Web Structure and Content Mining Abstract Anonymous and suitable information always are provided by criminal web data for Law enforcement agencies. The digital data that are used in forensic analysis comprises of pieces of information which are about the accused social…

Computer and Information Security Ethics’ Models

Computer and Information Security Ethics' Models Abstract Recently the gap between technology and peoples? mental power notably shrinks. The available computer and information resources, software and assorted output devices have enlightened many unethical activities, privacy invasion and illegal purposes. Computer and information ethics are viewed as one of the leading…

Assessment of Electronic Service Applications’ Practice: Domains Perspective

Assessment of Electronic Service Applications' Practice: Domains Perspective Abstract Traditionally, electronic services have been considered in two domains, using information technology for interaction and the actual service deliver via the electronic channels. Newly, three constructs have been identified, namely, transform, informate and automate. Based on these concepts, the e-service applications…

A retrospective critic Re-Debate on Stakeholders’ resistance checklist in software project management within multi-cultural, multi-ethnical and cosmopolitan society context: The Malaysian experience

A retrospective critic Re-Debate on Stakeholders’ resistance checklist in software project management within multi-cultural, multi-ethnical and cosmopolitan society context: The Malaysian experience Abstract Risks stemming from software projects were extensively studied. However, software project risk management has rarely researched organizational risks within multi-cultural and multi-ethnical atmospheres. The fact of the…

Evaluation of Electronic Services’ Usage in Malaysia

Evaluation of Electronic Services’ Usage in Malaysia Abstract Nowadays, the increasing use of modern information and communication technologies is one of the characteristics of today’s society. E-services as computer applications are being developed to provide efficient access to services, electronically. The increasing use of e-services has raised the need to…

E-Service Security; Acceptance Perspective

E-Service Security; Acceptance Perspective Abstract In today?s competitive marketing environment, many service/product providers have already or planning to extend their business using online environment. In order to get success in this expansion, it is important to consider client?s expectations and needs. According to the studies in the field of information…

A Review Paper on E-Service; Technology Concepts

A Review Paper on E-Service; Technology Concepts Abstract Recent growth in information technology has set the pace for an electronic revolution leading to emergence of electronic services. Business to consumer e-service assists organizations to decrease costs, speed up delivery time and serve more customers. Therefore, many enterprises have already moved…

Exploratory Factor Analysis; Concepts and Theory

Exploratory Factor Analysis; Concepts and Theory Abstract Exploratory factor analysis is a complex and multivariate statistical technique commonly employed in information system, social science, education and psychology. This paper intends to provide a simplified collection of information for researchers and practitioners undertaking exploratory factor analysis (EFA) and to make decisions…

Illustration of the Pathways Involved in Association of Genetic Variation and Frame Effect

Illustration of the Pathways Involved in Association of Genetic Variation and Frame Effect Abstract Previous studies demonstrated that the various single and multiple genetic variations are associated with intermediate or behavioral phenotypes, which lead to different emotional decision-making and subsequently different susceptibility to framing effect. Researchers in many prior literatures…

A Theoretical Review on IT Project Success/Failure Factors and Evaluating the Associated Risks

A Theoretical Review on IT Project Success/Failure Factors and Evaluating the Associated Risks Abstract There is empirical evidence that information technology projects are exposed to multiple sources of risks because it seems certain that the IT projects are considered as agile, technical and complex projects. However, it is necessary to…

Appraisal of Individual Understanding of Social and Ethical Circumstances; Information Technology Utilization

Appraisal of Individual Understanding of Social and Ethical Circumstances; Information Technology Utilization Abstract During the growth of information technology (IT), we can define smart cards as an ideal device for any transaction such as e-commerce, banking, telecommunication, transportation and numerous other technologies. According to users? security and customization, smart card…

Enhancing Project Performance through Integrated Risk Management

Enhancing Project Performance through Integrated Risk Management Abstract This paper provides a systematic and plastic guideline for identifying, classifying, and evaluating of either potential or active risk factors in project management concept. It concludes that risk management is essential to project-oriented activities in minimizing losses and enhancing project performance through…

Managing Successful IT Project; Marketing Perspective

Managing Successful IT Project; Marketing Perspective Abstract With increasing pressure on user and market perspectives importance to play a crucial role in the Information Technology (IT) projects success, this study investigates based on theoretical reviews, how the concept of user acceptance, expectation, and finally marketing perspective are made manifest within…

Marketing vs E-Marketing

Marketing vs E-Marketing Abstract Marketing is a societal process, which discerns consumer?s wants, focusing on a product or service to fulfill those wants, attempting to mould the consumers toward the products or services offered. With change in time, marketing also affected positively with advance technology. E-marketing have added thrill in…

The Analytic Network Process Approach to Select Location for Industrial Area for Projects

The Analytic Network Process Approach to Select Location for Industrial Area for Projects Abstract Decision making has become a challenge for managers and organizations in the complicated world today. Multiplicity of decision factors, Variety of quantitative and qualitative criteria, and the need to consider them at the same time and…

How Security Issues Can Influence on Usage of Electronic Services

How Security Issues Can Influence on Usage of Electronic Services Abstract Due to the fast growth of Information Communication Technologies, many traditional services already moved to the electronic environments. In order to achieve the success in implementation of e-services, service providers need to pay attention to customers? needs and concerns.…

An Artificial-Intelligence-Based Approach for Audio Steganography

An Artificial-Intelligence-Based Approach for Audio Steganography Abstract This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio steganography. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be…

Information Mining on the Web: E-business Application

Information Mining on the Web: E-business Application Abstract At the recent development in the application of Information Communication Technologies (ICT), Internet has been at the forefront. Since, people have been becoming more interested in the Internet and Electronic Businesses (e-business), a growing number of organizations have been already entered or…

E-Services Usage Evaluation; Applications? level of Co-Creation and Digitalization

E-Services Usage Evaluation; Applications? level of Co-Creation and Digitalization Abstract Nowadays, many traditional services have been moved or planning to move to the electronic environment. As a result of this movement enterprises need to realize the users? motivations regarding the electronic service applications. Electronic services have been classified on two…

Marketization of Higher Education Institute; Identifying a Set of Performance Measurements Based on Analytic Hierarchy Process

Marketization of Higher Education Institute; Identifying a Set of Performance Measurements Based on Analytic Hierarchy Process Abstract Nowadays, Higher Education is bearing significant alters. These alters are in replying to diversity factors; the expansion of information and communication technologies, globalization, internationalization and regionalization, progress network society, developing information society, socio-cultural…

Features’ Evaluation of Goods, Services and E-Services; Electronic Service Characteristics Exploration

Features' Evaluation of Goods, Services and E-Services; Electronic Service Characteristics Exploration Abstract The term service has several meanings depending on the field of expertise and the viewpoint it is considered from. Although the exportation of services is not new the degree to which information and communications technologies are facilitating the…

How to Enhance Performance of Universities by Implementing Balanced Scorecard with Using FDM and ANP

How to Enhance Performance of Universities by Implementing Balanced Scorecard with Using FDM and ANP Abstract The present research recommended balanced scorecard (BSC) framework to appraise the performance of the universities. As the original model of balanced scorecard has four perspectives in order to implement BSC in present research the…

What Extent Lesson Learned Can Help Project Mangers under Probability of Success or Failure Circumstances

What Extent Lesson Learned Can Help Project Mangers under Probability of Success or Failure Circumstances Abstract Project managers usually pave the way toward achieving the project success. However, some projects completed either successfully or not, or may be left unfinished. Central to debate on the importance of the project management…

Taxonomy of Semantic Web Service Development: Model-Driven Approaches

Taxonomy of Semantic Web Service Development: Model-Driven Approaches Abstract Nowadays, with widespread use of Web services in current application systems, the demand for automatic Web service composition has significantly increased. However, Semantic Web service enriches Web services by semantic description to facilitate automatic Web service discovery, composition, invocation, and interoperation.…

Estimation of Electronic Services Usage based on the Applications? level of Digitalization and Co-Creation

Estimation of Electronic Services Usage based on the Applications? level of Digitalization and Co-Creation Abstract Nowadays, many traditional services have been moved or planning to move to the electronic environment. As a result of this movement enterprises need to realize the users? motivations regarding the electronic service applications. Electronic services…

Importance of Higher Education Performance Evaluation; Balance Scorecard Approach

Importance of Higher Education Performance Evaluation; Balance Scorecard Approach Abstract In recent times, higher education institutions as the centres for developing human resource play a vital role in the economic and development growth of countries. Therefore, strategic planning has an essential significance for such institutions to gain a better future.…

A Classification of Model-Driven Approaches to Develop Semantic Web Service

A Classification of Model-Driven Approaches to Develop Semantic Web Service Abstract Nowadays, the number of infrastructure strategies based on Service-oriented architecture (SOA) is growing and demands for reusing and composing available Web services have increased significantly. Therefore, a rich Semantic Web service description is required to reach an automated Web…

Accomplishment of Critical Success Factor in Organization; Using Analytic Hierarchy Process

Accomplishment of Critical Success Factor in Organization; Using Analytic Hierarchy Process Abstract The importance role of performance evaluation in the organization has been proven. Complexity of decision making process will make strategic management as imperative affair. On the other hand, strategy is a plan of action designed to achieve a…

How to Lead to Sustainable and Successful IT Project Management; Propose 5Ps Guideline

How to Lead to Sustainable and Successful IT Project Management; Propose 5Ps Guideline Abstract Projects failure may negatively affect the whole implementing enterprise and there is empirical evidence that failure is a persistent trauma within project-oriented organizations. However, it is necessary to know why majority of IT projects fail and…

Classification of Internet Products and Evaluation of Application Utilization Based on the Product Fulfillment Process

Classification of Internet Products and Evaluation of Application Utilization Based on the Product Fulfillment Process Abstract These days, many traditional services have been moved or planning to move to the electronic environment. Therefore, it is critical for enterprises to understand the users? motivations about the applied e-service applications. Internet goods…

Development of a Research Framework for Analyzing Smart Card Technology Acceptance

Development of a Research Framework for Analyzing Smart Card Technology Acceptance Abstract Smart Card technology has an outstanding growth and among the fastest growing use of current technologies. In fact smart cards greatly improve the comfort and security of any transaction. It is important to note that consumer acceptance and…

Criminal Network Mining by Web Structure and Content Mining

Criminal Network Mining by Web Structure and Content Mining Abstract Criminal web data provide unknown and valuable information for Law enforcement agencies continuously. The digital data which is applied in forensics analysis includes pieces of information about the suspects? social networks. However, there is challenging issue with regard to analyzing…

Proposed an Educational Plan for Computer Ethics and Information Security

Proposed an Educational Plan for Computer Ethics and Information Security Abstract As the general public becomes increasingly computer literate, the gap between technology and peoples? mental power notably shrinks. However, at the same time computer technology may raise some unethical issues with current life style and developments. Information security and…

Propose a Methodology to Implement Balanced Scorecard for Operational Appraisal of Industrial Groups

Propose a Methodology to Implement Balanced Scorecard for Operational Appraisal of Industrial Groups Abstract The value of operation assessment has been specified for organizations and it plays a vital role in most of the organizations. Complexity and frailty of decision making in business makes Strategic management imperative. On the other…

Propose a Model to Design and Implement Key Operational Indicators Relate to Performance Evaluation in Industrial Group

Propose a Model to Design and Implement Key Operational Indicators Relate to Performance Evaluation in Industrial Group Abstract The performance evaluation play significant role in organization and the importance of their role has been proven. Complexity of decision making Strategic will make strategic management as imperative affair. The operational indicators…

Information Security and Ethics in Educational Context: Propose a Conceptual Framework to Examine Their Impact

Information Security and Ethics in Educational Context: Propose a Conceptual Framework to Examine Their Impact Abstract Information security and ethics are viewed as major areas of interest by many academic researchers and industrial experts. They are defined as an all-encompassing term that refers to all activities needed to secure information…

Smart Card Adoption Model: Social and Ethical Perspectives

Smart Card Adoption Model: Social and Ethical Perspectives Abstract In the current growth of information technology (IT), without realizing, smart cards have been brought as an ideal device for any transaction such as transportation, healthcare, e commerce, telecommunication, banking and many other applications. Smart card improved the quality of services…

Propose a Framework for Criminal Mining by Web Structure and Content Mining

Propose a Framework for Criminal Mining by Web Structure and Content Mining Abstract Anonymous and suitable information always are provided by criminal web data for Law enforcement agencies. The digital data that are used in forensic analysis comprises of pieces of information which are about the accused social networks. Nevertheless,…

Utilizing the BSC and EFQM as a Combination Framework; Scrutinizing the Possibility by TOPSIS Method

Utilizing the BSC and EFQM as a Combination Framework; Scrutinizing the Possibility by TOPSIS Method Abstract Increasing the competition between organizations in the field of productions and services leads them to use the samples and patterns to assess their activities and performance. Appearing this kind of needs and inefficiency of…

Adoption Framework Expansion based on the Computer Ethics; Related Research Models and Ethical Scenarios Analysis

Adoption Framework Expansion based on the Computer Ethics; Related Research Models and Ethical Scenarios Analysis Abstract Information security and computer ethics are one of the foremost integration of current computer scientist in cyber era. However, at the same time computer technology may raise some unethical issues with current life style…

Review Paper on Computer Ethics and Related Research Models

Review Paper on Computer Ethics and Related Research Models Abstract As the general public becomes increasingly computer literate, the gap between technology and peoples? mental power notably shrinks. The available computer resources, software, and assorted output devices have enlightened many unethical activities, privacy invasion and illegal purposes. Computer ethics is…

Social Modeling of Smart Card Technology Acceptance Based On Ethical Scenarios Analysis

Social Modeling of Smart Card Technology Acceptance Based On Ethical Scenarios Analysis Abstract In the current growth of information technology, the last decades have brought smart card as an ideal device for any transaction such as healthcare, telecommunication, banking, and many other applications. Smart card provides better possibilities for security,…

Enabling Security Requirements for Enterprise Service-Oriented Architecture

Enabling Security Requirements for Enterprise Service-Oriented Architecture Abstract In today?s Web environment, service-oriented architecture (SOA) becomes as an efficient paradigm to integrate distributed applications. Due to loosely coupled nature of SOA, security is one of the most important items that must be considered in SOA -based environments. Therefore, providing a…

Definitions and Criteria of CIA Security Triangle in Electronic Voting System

Definitions and Criteria of CIA Security Triangle in Electronic Voting System Abstract Confidentiality, Integrity, and Availability are three sides of the famous CIA security triangle. Since the e-voting systems are built from particular components, the CIA security triangle of these systems has particular definitions for each side. This paper presents…

Computer Ethics ; Review of Global Perspective

Computer Ethics ; Review of Global Perspective Abstract As the general public becomes increasingly computer educated, the gap between peoples` principles and technological development is increasing. The available computer resources and software in cyber crimes have enlightened many unethical activities, privacy invasion and illegal intentions. The aim of proposed paper…

Investigation of User Awareness Influence on Smart Card Technology Acceptance

Investigation of User Awareness Influence on Smart Card Technology Acceptance Abstract Recently, in most of the countries smart card technology are used in many applications such as banking, transportation, telecommunication, internet security, loyalty and many other industries. Although smart cards are being used in a number of ways around the…

Development a Smart Card Acceptance Model from Ethical Perspective

Development a Smart Card Acceptance Model from Ethical Perspective Abstract In the current growth of information technology (IT), without realizing, smart cards have been brought as an ideal device for any transaction such as transportation, healthcare, ecommerce, telecommunication, banking and many other applications. Smart card improved the quality of services…

Study of Smart Card Technology and Probe User Awareness about It: A Case Study of Middle Eastern Students

Study of Smart Card Technology and Probe User Awareness about It: A Case Study of Middle Eastern Students Abstract Right now, in most of the countries, inside the people?s wallet, they probably have a couple of credit cards, an identification card, automatic machine teller cards (ATM card), and maybe a…

Development of an Instrument to Measure Smart Card Technology Acceptance

Development of an Instrument to Measure Smart Card Technology Acceptance Abstract Recently smart card is used all over the world in different applications such as financial, telecommunication, network, and physical access where the security is considered very crucial. User acceptance is very significant in successful implementation of smart card technology.…

Evaluating Measurement Models for the Acceptance of Smart Card Technology: Security Aspects

Evaluating Measurement Models for the Acceptance of Smart Card Technology: Security Aspects Abstract Security has become significant in information technology, especially in those application involving data sharing and transactions through the internet. This study is mainly to evaluate measurement models for smart card technology acceptance, which reflects a tendency of…

Evaluation of Smart Card Acceptance: Security, Technology and Usage

Evaluation of Smart Card Acceptance: Security, Technology and Usage Abstract Today smart cards are used all over the world as personal identification cards for corporate building security systems and personal computer equipment access control. Governments, financial services, telecommunications, healthcare, education, retail, and many other industries are using smart cards as…