Search results

1 – 10 of 18
Article
Publication date: 4 December 2018

Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao and Yuqing Lin

Malicious web domain identification is of significant importance to the security protection of internet users. With online credibility and performance data, the purpose of this…

Abstract

Purpose

Malicious web domain identification is of significant importance to the security protection of internet users. With online credibility and performance data, the purpose of this paper to investigate the use of machine learning techniques for malicious web domain identification by considering the class imbalance issue (i.e. there are more benign web domains than malicious ones).

Design/methodology/approach

The authors propose an integrated resampling approach to handle class imbalance by combining the synthetic minority oversampling technique (SMOTE) and particle swarm optimisation (PSO), a population-based meta-heuristic algorithm. The authors use the SMOTE for oversampling and PSO for undersampling.

Findings

By applying eight well-known machine learning classifiers, the proposed integrated resampling approach is comprehensively examined using several imbalanced web domain data sets with different imbalance ratios. Compared to five other well-known resampling approaches, experimental results confirm that the proposed approach is highly effective.

Practical implications

This study not only inspires the practical use of online credibility and performance data for identifying malicious web domains but also provides an effective resampling approach for handling the class imbalance issue in the area of malicious web domain identification.

Originality/value

Online credibility and performance data are applied to build malicious web domain identification models using machine learning techniques. An integrated resampling approach is proposed to address the class imbalance issue. The performance of the proposed approach is confirmed based on real-world data sets with different imbalance ratios.

Article
Publication date: 12 January 2024

Peilin Zhang, Najmul Hasan, Raymond Chiong and Chih-Wei (Fred) Chao

The aim of this study was to conduct a systematic literature review (SLR) on vlog marketing. The focus was to analyse the major themes in this field and provide insights for…

Abstract

Purpose

The aim of this study was to conduct a systematic literature review (SLR) on vlog marketing. The focus was to analyse the major themes in this field and provide insights for future research directions.

Design/methodology/approach

The authors reviewed a total of 49 peer-reviewed publications that include the search terms “vlog” or “video blog” in their titles, keywords and abstracts, retrieved from digital databases Scopus and Web of Science, up to the end of July 2023. Thematic analysis was used to examine and synthesise the articles.

Findings

The authors found 19 sub-themes and identified four major themes that emerged from the literature: (1) endorsement outcomes, (2) vlogger characteristics, (3) consumer credibility and (4) vlog content crafting.

Originality/value

There are many unanswered questions in the literature, suggesting that vlog marketing research is still in its infancy, and that in-depth further studies are required for a more comprehensive understanding of the field. This study has identified potential avenues for future research that may contribute to the existing body of knowledge and valuable insights on vlog marketing.

Details

Asia Pacific Journal of Marketing and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 19 November 2019

Shamim Talukder, Raymond Chiong, Sandeep Dhakal, Golam Sorwar and Yukun Bao

Despite the widespread use of mobile government (m-government) services in developed countries, the adoption and acceptance of m-government services among citizens in developing…

1108

Abstract

Purpose

Despite the widespread use of mobile government (m-government) services in developed countries, the adoption and acceptance of m-government services among citizens in developing countries is relatively low. The purpose of this study is to explore the most critical determinants of acceptance and use of m-government services in a developing country context.

Design/methodology/approach

The unified theory of acceptance and use of technology (UTAUT) extended with perceived mobility and mobile communication services (MCS) was used as the theoretical framework. Data was collected from 216 m-government users across Bangladesh and analyzed in two stages. First, structural equation modeling (SEM) was used to identify significant determinants affecting users' acceptance of m-government services. In the second stage, a neural network model was used to validate SEM results and determine the relative importance of the determinants of acceptance of m-government services.

Findings

The results show that facilitating conditions and performance expectancy are the two important precedents of behavioral intention to use m-government services, and performance expectancy mediates the relationship between MCS, mobility and the intention to use m-government services.

Research limitations/implications

Academically, this study extended and validated the underlying concept of UTAUT to capture the adoption behavior of individuals in a different cultural context. In particular, MCS might be the most critical antecedent towards mobile application studies. From a practical perspective, this study may provide valuable guidelines to government policymakers and system developers towards the development and effective implementation of m-government systems.

Originality/value

This study has contributed to the existing, but limited, literature on m-government service adoption in the context of a developing country. The predictive modeling approach is an innovative approach in the field of technology adoption.

Details

Journal of Systems and Information Technology, vol. 21 no. 4
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 17 August 2018

Md Shamim Talukder, Raymond Chiong, Yukun Bao and Babur Hayat Malik

The purpose of this paper is to identify the key facilitators and inhibitors of fitness wearable technology (FWT) adoption and the intention to recommend this technology.

4934

Abstract

Purpose

The purpose of this paper is to identify the key facilitators and inhibitors of fitness wearable technology (FWT) adoption and the intention to recommend this technology.

Design/methodology/approach

An innovative and integrated research model was developed by combining constructs from two well-established theoretical models, the extended unified theory of acceptance and use of technology (UTAUT2) and diffusion of innovation (DOI). The proposed research model was empirically validated using data collected from 392 respondents in China. The data was analyzed using the partial least squares method, a statistical analysis technique based on structural equation modeling.

Findings

The results indicate that performance expectancy, effort expectancy, social influence, habit, compatibility and innovativeness have significant direct and indirect effects on FWT adoption and the intention to recommend it. The significance of people’s intention to recommend FWT to others in social networking sites (e.g. Facebook, Weibo, and WeChat) is also confirmed.

Practical implications

The findings may facilitate the design and implementation of FWT products, applications and functionalities that can achieve high consumer acceptance and positive recommendations in social networks.

Originality/value

This study is among the first to investigate FWT adoption from behavioral, social and environmental perspectives. It also highlights the importance of social marketing campaigns and suggests directions of future wearable technology adoption research.

Article
Publication date: 27 November 2020

Chaoqun Wang, Zhongyi Hu, Raymond Chiong, Yukun Bao and Jiang Wu

The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of…

Abstract

Purpose

The aim of this study is to propose an efficient rule extraction and integration approach for identifying phishing websites. The proposed approach can elucidate patterns of phishing websites and identify them accurately.

Design/methodology/approach

Hyperlink indicators along with URL-based features are used to build the identification model. In the proposed approach, very simple rules are first extracted based on individual features to provide meaningful and easy-to-understand rules. Then, the F-measure score is used to select high-quality rules for identifying phishing websites. To construct a reliable and promising phishing website identification model, the selected rules are integrated using a simple neural network model.

Findings

Experiments conducted using self-collected and benchmark data sets show that the proposed approach outperforms 16 commonly used classifiers (including seven non–rule-based and four rule-based classifiers as well as five deep learning models) in terms of interpretability and identification performance.

Originality/value

Investigating patterns of phishing websites based on hyperlink indicators using the efficient rule-based approach is innovative. It is not only helpful for identifying phishing websites, but also beneficial for extracting simple and understandable rules.

Details

The Electronic Library , vol. 38 no. 5/6
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 10 August 2015

Ronda Harrison, Angelique Parker, Gabrielle Brosas, Raymond Chiong and Xuemei Tian

This paper aims to provide an introductory overview of internal business intelligence (BI) and the role that technology plays in its management and exploitation. BI represents the…

2070

Abstract

Purpose

This paper aims to provide an introductory overview of internal business intelligence (BI) and the role that technology plays in its management and exploitation. BI represents the tools and systems that play a key role in the strategic planning process of a corporation, allowing the integration of applications, databases, software and hardware essential to users and enabling the analysis of information to optimise decision-making.

Design/methodology/approach

In reviewing the existing literature, this paper examines the core components, current trends and operational issues of a typical internal BI system architecture. The implications of these trends and their effects on business processes and culture are also explored.

Findings

The successful implementation of an internal BI system should include the core components and address operational issues, whilst also providing meaningful output to the organisation. It is contended, however, that to be truly successful, the internal BI system must be embedded within organisational processes and be adaptable to changing technologies, allowing the exploitation of the organisation’s internal BI.

Originality/value

This general review is the first to provide a high-level overview of internal BI and explores the role of technology in the management and exploitation of internal BI.

Details

Journal of Systems and Information Technology, vol. 17 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 10 August 2015

Janelle Boyton, Peter Ayscough, David Kaveri and Raymond Chiong

The purpose of this paper is to examine the failures of business intelligence (BI) implementations and to understand why they fail as well as what action can be taken to ensure…

2249

Abstract

Purpose

The purpose of this paper is to examine the failures of business intelligence (BI) implementations and to understand why they fail as well as what action can be taken to ensure implementation success.

Design/methodology/approach

The paper is based on a literature review of academic journals and case studies relating to BI, and the success and failure of the implementation of such projects. It focuses on four areas of BI projects to measure success: return on investment, non-concrete measures, project management measures and user satisfaction. The literature provides insights into what factors contribute to the success of a BI implementation and what factors contribute to the failure. Once the failures can be ascertained, a strategic approach to remedying the failure is discussed.

Findings

Implementation failure specifically relating to BI is a rarely discussed topic. This paper provides an understanding of why BI implementations fail and how organisations can ensure, prior to implementing such a solution, the considerations that need to be made to ensure that success is achieved from a technological, organisational and process perspective.

Originality/value

The paper uses empirical evidence from the literature to provide an understanding of why BI implementations fail. The factors contributing to BI failure are examined along with insights into how to succeed with a BI implementation.

Details

Journal of Systems and Information Technology, vol. 17 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Abstract

Details

Journal of Systems and Information Technology, vol. 17 no. 3
Type: Research Article
ISSN: 1328-7265

Article
Publication date: 10 August 2015

Amelia Cahyadi and Adi Prananto

– The purpose of this paper is to explore the complexities in dashboard design process.

3257

Abstract

Purpose

The purpose of this paper is to explore the complexities in dashboard design process.

Design/methodology/approach

The authors chose case study research, following Benbasat et al. (2002) who argued that it is suitable for information system research, as researchers could perform the study in the organisation as a natural setting. As a result, the authors could learn and generate insights from practice. Another reason was mainly as the phenomenon being studied cannot be taken away from its context (Yin, 2003). In addition, through case study, the authors aim to achieve a deeper understanding and richer descriptions on the subject of research in a “real-world context” (Yin, 2012). In addition, it aims to understand the intricacy of the processes going on in the organisation by focusing more towards organisational rather than the technological issues (Benbasat et al., 1987).

Findings

Through research, the authors highlighted that it is important to align the dashboard design with the organisation’s visions and goals. This creates a more persuasive rationale for adoption amongst the users, as they could use the dashboard as a means to assist them in achieving the vision and goals of the organisation. More importantly, the analysis clearly indicates the need to consider the creation of a dashboard as a holistic exercise. The intricate processes of designing a dashboard are often underestimated. Instead of focusing into a specific aspect (such as user interface or functionality) of designing dashboards, the authors should look into the multi-faceted aspects in designing an effective dashboard.

Research limitations/implications

This paper articulates the findings from a single case study. However, arguably, the results of this study are transferable to other entities responsible for designing business intelligence (BI) and business analytics dashboards. Research on dashboard design and the use of design thinking across different type organisations is currently ongoing to allow for cross-case analyses.

Practical implications

The study has determined that interdisciplinary and cross-functional group communications play a significant role in designing a dashboard. The ability to collaborate with “data owners”, would be dashboard users, managers of the technical infrastructure, and process owners leads to a workable and effective dashboard. In this sense, design thinking could be used and/or regarded as a holistic, creative and solutions-oriented framework.

Originality/value

With an increasing interest on BI and business analytics, dashboards have an increasingly pivotal role in providing a summary of data for business users. The literature review shows in designing a dashboard; there is much emphasis on the graphical user interface and in providing features and functionalities for the dashboards. This paper presents a case study outlining the key considerations of a team in charge of business analytics and dashboard creations for a university. Through the case study analysis, the authors explore the key aspects that influence a dashboard design and analyse the design processes using the concept of design thinking as the theoretical framework.

Details

Journal of Systems and Information Technology, vol. 17 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 10 August 2015

Aaron Wolfgang Baur, Julian Bühler and Markus Bick

The purpose of this paper is to investigate the development of software pricing, following the advent of cloud-based business intelligence & analytics (BI & A…

1424

Abstract

Purpose

The purpose of this paper is to investigate the development of software pricing, following the advent of cloud-based business intelligence & analytics (BI & A) Software. A value-based conceptual software model is developed to ignite and structure further research.

Design/methodology/approach

A two-step research approach is applied. In step one, the available literature is screened and evaluated, and this is followed by ten semi-structured expert interviews. With that input, a conceptual software pricing model is designed. In step two, this model is validated and refined through discussions with representatives of the five leading business intelligence suites.

Findings

The paper sheds light on the value perception of customers and suggests a clear focus on the interaction between customers and vendors, and less on technical issues. The developed customer-centric, value-based pricing framework helps to improve pricing techniques and strategies.

Research limitations/implications

The research is focused on the pricing strategy of software houses and excludes differentiations of technical specifications and functionalities.

Practical implications

The research can support practitioners in the field of BI & A in rethinking their pricing methods. Placing the customer at center stage can lead to lower customer churn rates, higher customer satisfaction and more pricing flexibility.

Originality/value

This empirical study reveals the importance of a customer-centric pricing approach in the specific case of BI & A. It can also be applied to other fast-developing sectors of the software industry.

Details

Journal of Systems and Information Technology, vol. 17 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

1 – 10 of 18