Latest articles

12
Feb
2009

The Relationship between the Perceived Threat from Information Technology Outsourcing and Job Satisfaction of Information Technology Professionals

Journal of Outsourcing and Organizational Information Management
This study examines the relationship between the perceived threat of information technology (IT) outsourcing and the job satisfaction of information technology professionals. As corporations intensify their outsourcing activities, incumbent IT professionals are naturally affected in the process. IT professionals who perceived IT outsourcing as a…
10
Feb
2009

A Secure Remote User Authentication System — Digital Certificates

Journal of Mobile Technologies, Knowledge and Society
This paper presents remote user authentication mechanism by using digital certificates. Mutual authentication is used to authenticate both user and server before a secure connection is established. We present the mechanism involved in creating these certificates and how these can be used so as to…
15
Jan
2009

E-Biz of Photo Films Outlets in Malaysia: A Review of Two Cases Venturing Into E Business in Varying Levels

IBIMA Business Review
The importance of online business to get a competitive advantage is ell known. It is important to determine through a review of some outfits that have taken the initiative. The researcher therefore analyzed the progress made by technical and marketing issues of two photo film…
08
Jan
2009

Do ‘Bricks’ Branding Lead to ‘Clicks’ Banking Adoption? Perspectives for Future Researches

Journal of Mobile Technologies, Knowledge and Society
While several studies are conducted to identify drivers and inhibitors of Internet Banking (IB) adoption, little is known about the impact and the potential of offline corporate branding on the adoption of IB. Internet is broadly discussed as a mean of business differentiation and source…
31
Dec
2008

From Virtual Teams to Online Communities: Fostering Group Based Collaboration for Innovation and Knowledge Management

Communications of the IBIMA
This paper contrasts the characteristics of Virtual Teams and Online Communities with regard to their potentials for fostering Open Innovation Management. We develop scenarios to illustrate the potentially most effective usage for Virtual Teams and Open Innovation Communities in an enterprise and analyze how discontinuous…
26
Dec
2008

The effects of Knowledge Process for Customer on the achievement of Customer Knowledge Retention

Communications of the IBIMA
It is evident that there is a strong competition among organizations and a sort of rapid change in the business environment is taking place. Therefore; organizations start thinking of how to improve their processes to stay competent. Knowledge has become a strategic resource and a…
19
Dec
2008

Use of ICT to design a teaching tool in heat conduction field

Communications of the IBIMA
This work aims to achieve a teaching tool using ICT to help engineering students in their learning of heat transfer by conduction mode. A numerical simulation based on the finite volume method was necessary, followed by the achievement of an interface which aims to achieve…
10
Dec
2008

Cyberterrorism: The Next Arena of Confrontation

Communications of the IBIMA
This paper presents a research conducted over the increasing dangers of cyberterrorism. It discusses the cyberterrorism parameters - the cyberterrorists, the attacks, and the countermeasures — as well as the Internet’s physical security.  The paper sounds an alarm over the current accessibility of critical intranets…
05
Dec
2008

Analysis Study of Culture’s Impact on E-Readiness Assessments in Developing Countries

Communications of the IBIMA
Nowadays the world is witnessing huge and rapid developments in Information and Communication Technology [ICT] systems which can affect all aspects of our daily lives. Therefore, no country in the world can live in an environment isolated from the rest of the world. This paper…
01
Dec
2008

An Algorithm for Mining Large Sequences in Databases

Communications of the IBIMA
Frequent sequence mining is a fundamental and essential operation in the process of discovering the sequential rules.  Most of the sequence mining algorithms use apriori methodology or build the larger sequences from smaller patterns, a bottom-up approach. In this paper, we present an algorithm that…