Latest articles

11
Mar
2009

Wireless Application Deploying Cell Broadcast, and Bulk SMS/MMS

Journal of Mobile Technologies, Knowledge and Society
Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the entire network. This technology is used in deploying location-based…
19
Feb
2009

Development of TQM in Steel Manufacturers’ Production

IBIMA Business Review
The objective of this study was to examine the development of quality management in Rautaruukki Plc’s Production division. The idea is to describe critical incidents in the development of quality management in the light of the historical development, current state and theoretical framework, as well…
12
Feb
2009

The Relationship between the Perceived Threat from Information Technology Outsourcing and Job Satisfaction of Information Technology Professionals

Journal of Outsourcing and Organizational Information Management
This study examines the relationship between the perceived threat of information technology (IT) outsourcing and the job satisfaction of information technology professionals. As corporations intensify their outsourcing activities, incumbent IT professionals are naturally affected in the process. IT professionals who perceived IT outsourcing as a…
10
Feb
2009

A Secure Remote User Authentication System — Digital Certificates

Journal of Mobile Technologies, Knowledge and Society
This paper presents remote user authentication mechanism by using digital certificates. Mutual authentication is used to authenticate both user and server before a secure connection is established. We present the mechanism involved in creating these certificates and how these can be used so as to…
15
Jan
2009

E-Biz of Photo Films Outlets in Malaysia: A Review of Two Cases Venturing Into E Business in Varying Levels

IBIMA Business Review
The importance of online business to get a competitive advantage is ell known. It is important to determine through a review of some outfits that have taken the initiative. The researcher therefore analyzed the progress made by technical and marketing issues of two photo film…
08
Jan
2009

Do ‘Bricks’ Branding Lead to ‘Clicks’ Banking Adoption? Perspectives for Future Researches

Journal of Mobile Technologies, Knowledge and Society
While several studies are conducted to identify drivers and inhibitors of Internet Banking (IB) adoption, little is known about the impact and the potential of offline corporate branding on the adoption of IB. Internet is broadly discussed as a mean of business differentiation and source…
31
Dec
2008

From Virtual Teams to Online Communities: Fostering Group Based Collaboration for Innovation and Knowledge Management

Communications of the IBIMA
This paper contrasts the characteristics of Virtual Teams and Online Communities with regard to their potentials for fostering Open Innovation Management. We develop scenarios to illustrate the potentially most effective usage for Virtual Teams and Open Innovation Communities in an enterprise and analyze how discontinuous…
26
Dec
2008

The effects of Knowledge Process for Customer on the achievement of Customer Knowledge Retention

Communications of the IBIMA
It is evident that there is a strong competition among organizations and a sort of rapid change in the business environment is taking place. Therefore; organizations start thinking of how to improve their processes to stay competent. Knowledge has become a strategic resource and a…
19
Dec
2008

Use of ICT to design a teaching tool in heat conduction field

Communications of the IBIMA
This work aims to achieve a teaching tool using ICT to help engineering students in their learning of heat transfer by conduction mode. A numerical simulation based on the finite volume method was necessary, followed by the achievement of an interface which aims to achieve…
10
Dec
2008

Cyberterrorism: The Next Arena of Confrontation

Communications of the IBIMA
This paper presents a research conducted over the increasing dangers of cyberterrorism. It discusses the cyberterrorism parameters - the cyberterrorists, the attacks, and the countermeasures — as well as the Internet’s physical security.  The paper sounds an alarm over the current accessibility of critical intranets…