International Journal on Information Technology and Computer Science http://ijitcs.info/index.php/ijitcs en-US info@ijitcs.info (Prof. Dr. Prem Bdr Nepali) support@ijitcs.info (Buddhi Thapa) Tue, 15 Jan 2013 00:00:00 +0000 OJS 3.2.1.1 http://blogs.law.harvard.edu/tech/rss 60 Towards an integrated model for citizen adoption of E-government services http://ijitcs.info/index.php/ijitcs/article/view/55 <p>This paper considers the challenges that face the widespread adoption of E-government in developing countries. We will be using the Saudi Arabian experience as our main case study. E-government can be defined based on an existing set of requirements. In this paper we define E-government as a matrix of stakeholders; governments to governments, governments to business and governments to citizens using information and communications technology to deliver and consume services. E-government has been implemented for a considerable time in developed countries. However E-government services still faces many challenges their implemented and general adoption in developing countries. Therefore, this paper addressed an integrated model for ascertaining the intention to adopt E-government services and thereby aid governments in accessing what is required to increase adoption. </p> Sulaiman A. Alateyah, Richard M. Crowder, Gary B. Wills Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/55 Thu, 22 Oct 2020 00:00:00 +0000 Extentional Approach of Semantic Enrichment of Queries in Search Engines http://ijitcs.info/index.php/ijitcs/article/view/53 <p>Expressing the need of the user (user query) is the starting point of a set of processes which finishes with the selection from the array of documents returned.<br />Finding a relevant document is the outcome a good expression of the user need, as well as an efficient reformulation of the initial query, one of the keys to improving the performance of information search systems (ISS). We remark that the reformulation of queries is a significant process for both the ISS because it facilitates the task of searching for documents and for the end user because it allows obtaining appropriate results.<br />This study offers a technique of query reformulation that consists of multiple words based on definition sentences retrieved directly from the Internet.<br />In our approach, for each word in the initial query, we search for all their corresponding definition sentences, and each sentence contains a set of words that we call in our approach "associated words". The intersection between the different sets of associated words gives us a single set of related words among the various lists. These words will be used to enrich the initial user query<br />To test our approach, we have made a comparison between the returned result using our approach of reformulation and without. Therefore, the obtained result has showed the importance of our suggestion</p> Mohamed Rachdi, El Habib Benlahmar, El Hassan Labriji Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/53 Thu, 22 Oct 2020 00:00:00 +0000 An Overview of the Development Indonesia National Cyber Security http://ijitcs.info/index.php/ijitcs/article/view/51 <p>Currently, the threat for the countries will be come from cyber threats. Cyber threats potentially attack national assets and interests. Furthermore, every country needs to develop national cyber security strategies to anticipate the cyber threats. Indonesia as a country that is growing rapidly in the ICT sector has make efforts to address cyber threats. This paper describes the state of the art national cyber security in Indonesia, which is consist of five aspects, such as (1) Legal Measures, (2) Technical and Procedural Measures, (3) Organizational Structures, (4) Capacity Building and (5) International Cooperation. This paper also proposed national cyber security principles and strategies for implementation and development national cyber security in Indonesia.&nbsp;</p> Farisya Setiadi, Yudho Giri Sucahyo, Zainal A. Hasibuan, Zainal A. Hasibuan Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/51 Thu, 22 Oct 2020 00:00:00 +0000 Multi Battalion Search Algorithm (MBSA): New optimization search algorithm http://ijitcs.info/index.php/ijitcs/article/view/49 <p>Optimization problems can be defined as the problems of making the best possible decision(s) from a set of candidate decisions by utilizing different types of modeling and simulations to support improved choicemaking. Optimization is used for many&nbsp; practical problems arising in electronic, civil, chemical, mechanical, and other disciplines of engineering. Many deterministic and none-deterministic algorithms have been proposed for such problems in literatures. The proposed algorithm in this paper, Multi-Battalion Search Algorithm (MBSA), is a heuristic algorithm that simulates the battle field strategies and tactics to find optimal or near optimal solutions for optimization problems. In military aspect, each battalion consists of a specified number of soldiers. One of them is addressed to be the leader (or Colonel) as he represents the most qualified person. The other soldiers should obey and follow his commands. On the other hand, in the MBSA the population is divided into battalions each head by a leader followed by a hierarchy of other ranks. This algorithm solves optimization problems by forcing movement of soldiers in different battalions towards promising areas highlighted by leaders and leadership hierarchy. In addition, it utilizes the power of parallel search represented by the existence of multiple battalions. This algorithm is tested and analyzed against different benchmark problems to check its efficiency for solving optimization problem.&nbsp;</p> Abeer Al-Shammari, Dr., Prof. Copyright (c) 2013 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/49 Thu, 22 Oct 2020 00:00:00 +0000 Technology Trend Analysis Tool using Twitter as a Source http://ijitcs.info/index.php/ijitcs/article/view/56 <p>As the rise of social networking, people started to share information through different kinds of social media. Among all varieties of social media, Twitter is a valuable resource for data mining because of its prevalence and recognition by celebrities. In this paper we present a novel system which collects Tweets from technology celebrities, by using data mining technique, we’ll be able to do trend analysis on those Tweets and thus provide some prediction of future trend. Results of trend analysis will be display as a website with different sections presenting top news, trend topics, active users, and top sources.</p> Yi-Chun Lin, Ping-che Yang, Wen-Tai Hsieh, Seng-cho T. Chou Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/56 Sat, 15 Dec 2012 00:00:00 +0000 The Dynamics of Online Readers Comments and the Online Media – A Content Analysis http://ijitcs.info/index.php/ijitcs/article/view/54 <p>New technologies, especially the Web 2.0 has shifted the old paradigm of one way Communication to a two way interactive communication by allowing the users to participate. The new model rightly termed as the “Produsage” by Bruns (2007) has a significant consequence on the users, the media and of-course the society creating a democratic landscape. The aim of the study is to explore the User Generated Content and its effects on the content of the online news sites. Based on Jurgen Habermas (1984) theory of communicative action this paper strives to study, using a content analysis of 5 popular mainstream news websites the readers’ comments to journalistic articles. The comments of the homes page of the news paper and the most commented stories are taken as samples and analysed for - R1 – Does User Generated Content (Comments) broaden mass media agenda by raising new issues of public concern R2 Does UGC enrich mass media content by providing additional information on reported news R3 Do users utilize the space provided by the mass media to express their opinions on issues of public interest.&nbsp;</p> Asst Professor, Prof. Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/54 Sat, 15 Dec 2012 00:00:00 +0000 The State of E-Government and M-Government Readiness in Malawi http://ijitcs.info/index.php/ijitcs/article/view/52 <p>This paper investigates the readiness of the Malawian government to engage in mobile government (mgovernment). The study’s importance derives from the potential of mobile technologies to leapfrog egovernment in some least-developed countries (LDCs) where e-government has not achieved the desired benefits due to the lack of fixed communications infrastructure and citizen access. First the paper presents an assessment of the current e-government status in Malawi. The research then used a qualitative approach by interviewing more than 20 important government and non-government stakeholders. The theoretical framework to assess the Malawi government readiness was a combination of the technology-organisation-environment&nbsp;<br>(TOE) framework and the task-technology fit (TTF) model. The findings are that Malawi is, to a large extent, ready to embrace mobile government. However, other LDCs can also benefit from the factors and themes which were uncovered and determine mobile readiness.</p> John Mtingwi, Jean-Paul Van Belle Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/52 Thu, 22 Oct 2020 00:00:00 +0000 Identifying the relationships between key development stages and critical success factors for customer relationship management http://ijitcs.info/index.php/ijitcs/article/view/50 <p>Customer Relationship Management (CRM) becomes essential solution for organisation looking for increasing, retaining and satisfying their customers. Many organisations change their business process from being product-centric to being customer-centric. By the end of 2012, it is predicted that companies will be spending more than $13 billion on CRM packages. A survey conducted by Gartner (2012) for Chief Executive Officers (CEOs) revealed that CEOs quoted CRM as their most significant area of investment to improve their business over the next five years. However, studies have found that it is only a minority of CRM projects that achieve success. It is argued that one of the reasons for this is the inappropriate assessment of Critical Success<br>Factors (CSFs) during the development life cycle of CRM implementation. In a project, CSFs need to be applied in certain stages during life cycle of the project to achieve the purpose of adopting them. Therefore, the aim of this research is to determine the relationships between the identified CSFs associated with CRM implementation and the key development stages of CRM implementation, which revealed the important of these relationships for the success of the implementation. The research involves fieldwork based on one particular national context; the Kingdom of Saudi Arabia (KSA).</p> Ahmed Sanad, Christine Fidler, Neil McBride Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/50 Sat, 15 Dec 2012 00:00:00 +0000 Institutional preparedness for e-governance in Indian Affiliating Universities – A Study on Teaching Faculties perspective http://ijitcs.info/index.php/ijitcs/article/view/48 <p>The application of technology world over has brought radical changes in the traditional view on career option and security. Within the context of rapid technological change and shift in market conditions, the Indian education system is challenged with the problem of expanding its educational opportunities. The concept of governance applied to universities in India is related to the exercise of controlling the power of different centers and departments which are part of an Indian affiliating university. This research paper aims to understand the institutional preparedness for e-governance in Indian Affiliating Universities from the perspective of teaching faculty. The data is collected through questionnaire and analyzed using factor analysis</p> A Balasubramanian, P Govindaraju Copyright (c) 2012 International Journal on Information Technology and Computer Science https://creativecommons.org/licenses/by-sa/4.0 http://ijitcs.info/index.php/ijitcs/article/view/48 Thu, 22 Oct 2020 00:00:00 +0000