Latest articles

02
Jul
2010

Clean Production Strategies Adoption: A Survey on Food and Beverage Manufacturing Sector

Communications of the IBIMA
Clean production strategies are the continuous application of an integrated, preventive environmental strategies applied to process, products and services to increase overall efficiency and reduce risks to humans and the environment. This paper provides an analysis of factors influencing the adoption of clean production strategies…
02
Jul
2010

A Proposed Framework for E-Government Knowledge Infrastructures for Africa’s Transition Economies

Journal of e-Government Studies and Best Practices
This paper proposes an empirically founded framework for building E-Government knowledge infrastructures in transition economies such as those in Africa. The proposed framework builds on the concepts of nomadic information environments. The framework, under the acronym NECE (Nomadic E-Government Co-Evolutionary) framework, caters for the three…
24
Jun
2010

The Control Environment, Employee Fraud and Counterproductive Workplace Behaviour: An Empirical Analysis

Communications of the IBIMA
The increasing use of technology for both productive and managerial business functions raises new issues related to fraud and internal control.  Fraud is on an increasing trend and if left unchecked can cause significant losses to employers. This study therefore investigates the relationship between employees’…
22
Jun
2010

Entertainment and Informativeness as Precursory Factors of Successful Mobile Advertising Messages

Communications of the IBIMA
The use of mobile advertising allows marketers to directly communicate with their consumers anytime and anyplace. However, it is unknown which is the best way to build these advertisements in order to positively affect attitudes’ formation and consumers’ behavior. Thus we suggest utilitarian (informativeness) and…
16
Jun
2010

Tax E-filing Adoption in Malaysia: A Conceptual Model

Journal of e-Government Studies and Best Practices
Tax e-filing is one of the e-government services that is gaining importance for public to perform their responsibility to the country through tax payment. Despite the rapid adoption of e-filing in Malaysia, the e-filing system is still unreliable especially at peak period which lead to…
16
Jun
2010

Framework to Manage Information Security for Malaysian Academic Environment

Journal of Information Assurance & Cybersecurity
Among the ICT challenges of most organizations including those from the academic sector is securing their information. Apart from technological aspect, Higher Education Institutions (HEIs) also must implement and enforce proper policies, procedures, and standards in compliance with laws and regulations to safeguard and secure…
15
Jun
2010

The Role of Moderating Factors in Mobile Coupon Adoption: An Extended TAM Perspective

Communications of the IBIMA
This research represents a theoretical extension of the extended Technology Acceptance Model (TAM) to study the consumer adoption of mobile coupons. We developed a model to test the relationship between theoretical constructs spanning technological and cognitive influence processes and their impact on Behavioural Intention. This…
15
Jun
2010

Sharing Knowledge to A Knowledge Management System: Examining the motivators and the benefits in an Omani organization

Journal of Organizational Knowledge Management
Knowledge is a powerful resource that enables individuals and organizations to achieve several benefits such as improved learning and decision-making. Repository knowledge management system (KMS) assists organizations to efficiently capture their knowledge for later reuse. However, the breadth and depth of a knowledge management system…
10
Jun
2010

Information Systems Security Measures and Countermeasures: Protecting Organizational Assets from Malicious Attacks

Communications of the IBIMA
Determining the exact requirements for security for a given organization is essential for implementing the proper security measures. Such measures are designed to protect information systems from security breaches.  The Internet and computer networking requires a new security measures and policies to reduce the threats…
09
Jun
2010

Factors related to IT outsourcing result

Journal of Outsourcing and Organizational Information Management
As IT outsourcing increases, this study is timely to revisit the key variables anticipated to influence IT outsourcing result. Prior to this study, very few studies have focused specifically on this aspect and by addressing this shortfall; it is the contribution of this study to…