Monday, June 26, 2017
   
Text Size
Login

Journal of Information and Communication Technology (JICT) Vol. 9, 2010

COMPUTER AIDED TOOL SUPPORT (CATS) FOR INFORMATION STRATEGY PLANNING (ISP): GENERATING APPLICATION PORTFOLIO FOR BUSINESS AREA ANALYSIS
Juliana Wahid, Zulkhairi Md Dahalin, Mohd Rushdi Idrus, Mohd Adan Omar
College of Arts and Sciences
Universiti Utara Malaysia
w.juliana@uum.edu.my
zul@uum.edu.my
rushdi@uum.edu.my
adan@uum.edu.my
 
ABSTRACT FULL TEXT
Information Strategy Planning (ISP) is concerned with an organization’s plan to acquire appropriate “IT blueprint” encompassing suitable hardware, software and telecommunication facilities for the utilization of applications required by the business with adequate support structure. The purpose is to determine the enterprise’s business goals and a high-level overview of the enterprise, its functions, data and information needs. This research builds an ISP engine, i.e. the Computer Aided Tool Support (CATS) that has the capability to generate application portfolios that can support the business strategy of the enterprise. Application portfolio is a major part of the ISP deliverables which can signifi cantly aid in formulating suitable strategies for IT supply and IT support structure. CATS will help to facilitate End-User Computing as a tool not only to ease endusers in planning for their IT adoption, but also to ensure that their IT investment is aligned to business goals and strategies. CATS will be able to help the Small Medium Enterprise (SME) companies and other organizations in their information-systems planning so that they can achieve their missions and objectives in a more effi cient way.
 
Keywords: Information Strategic Planning (ISP), Computer Aided Tool Support (CATS), Application Portfolio, Small Medium Enterprise (SME).
 

 
STRUCTURING A SUCCESSFUL INFORMATION TECHNOLOGY TRANSFER PROCESS: A CASE STUDY FROM THE PERSPECTIVES OF ACTOR NETWORK THEORY
Huda Ibrahim and Hasmiah Kasimin
UUM College of Arts and Sciences
Universiti Utara Malaysia
 
Pusat Pengajian Ekonomi, Fakulti Ekonomi dan Perniagaan
Universiti Kebangsaan Malaysia
huda753@uum.edu.my
h_kasimin@yahoo.com
 
ABSTRACT FULL TEXT
An effi cient and effective information technology transfer from developed countries to Malaysia is an important issue as a prerequisite to support the ICT needs of the country to become not only a ICT user but also a ICT producer. One of the factors that infl uences successful information technology transfer is managing the process of how technology transfer occurs in one environment. It involves managing interaction between all parties concerned which requires an organized strategy and action toward accomplishing technology transfer objective in an integrated and effective mode. Using a conceptual framework based on the Actor Network Theory (ANT), this paper will analyse a successful information technology transfer process at a private company which is also a supplier of information technology (IT) products to the local market. This framework will explain how the company has come up with a successful technology transfer in a local environment. Our study shows that the company had given interest to its relationships with all the parties involved in the transfer process. The technology transfer programme and the strategy formulated take into account the characteristics of technology and all those involved.
 
Keywords: Information Technology Transfer, Actor Network Theory, Successful Information Technology Transfer, Managing Technology Transfer, Managing Interaction of Actors.
 

 
FUZZY SUBJECTIVE EVALUATION OF ASIA PACIFIC AIRPORT SERVICES
Ku Ruhana Ku-Mahamud and Mahmod Othman
College of Arts and Sciences
Universiti Utara Malaysia
ruhana@uum.edu.my
Faculty of Information Technology and Quantitative Science
Universiti Teknologi MARA
math401@hotmail.com
 
ABSTRACT FULL TEXT
This paper presents a fuzzy decision-making model to determine the ranking of fourteen Asia Pacific airports based on the services provided to passengers. Airport services were represented by six attributes namely comfort, processing time, convenience, courtesy of staff, information visibility and security. Data for the attributes given by travel experts are in the triangular fuzzy number form. Based on fuzzy set and approximate reasoning, the model allows decision makers to make the best choice in accordance with human thinking and reasoning processes. The use of fuzzy rules which are extracted directly from the input data in making evaluation, contributes to a better decision and is less dependent on experts. Experimental results show that the proposed model is comparable to previous studies. The model is suitable for various fuzzy environments.
 
Keywords: Subjective Evaluation; Fuzzy Set; Approximate Reasoning.
 

 
G2WAY: A PAIRWISE TEST DATA GENERATION STRATEGY WITH AUTOMATED EXECUTION SUPPORT
Kamal Zuhairi Zamli, Mohammed Fadel Jamil Klaib, Mohammad
Issam Younis and Ong Hui Yeh
School of Electrical and Electronic Engineering
Universiti Sains Malaysia Engineering Campus
eekamal@eng.usm.my
 
ABSTRACT FULL TEXT
This paper discusses a new strategy, called G2Way, for pairwise test data generation. Unlike existing strategies, G2Way also supports (concurrent) automated execution integrated within the strategy itself. Furthermore, empirical evidence demonstrates that G2Way, in some cases, outperformed existing strategies in terms of the number of generated test data (as compared to that of AETG and its variations, IPO, SA, GA, ACA, and All Pairs). Notwithstanding the differences in the computing environment employed as well as the overhead incurred to permit automated execution, the test generation time is also within reasonable value.
 
Keywords:Way, Combinatorial Testing, Pairwise Testing.
 

 
DATA LEAKAGE IN ICT OUTSOURCING: RISKS AND COUNTERMEASURES
Yap May Lin, Mas Idayu Zakariah and Azlinah Mohamed
Faculty of Computer & Mathematical Sciences
Universiti Teknologi MARA
maylin@tmsk.uitm.edu.my
azlinah@tmsk.uitm.edu.my
 
ABSTRACT FULL TEXT
Having been among the top ranks of worldwide ICT outsourcing indices for a number of years, Malaysia is familiar with the role outsourcing has played in changing today’s business landscape. However, concerns of data privacy and security, and the risks of data leakage arise during the course of outsourcing as the process may involve the exposure or handling of sensitive and confidential client and organization information to outsource providers since the company has little control over its outsourced data when it is in the provider’s possession. Empirical findings on the risks and countermeasures of data leakage are presented, in the context of outsourcing in Malaysia. From the findings, it was apparent that the inherent risks were signifi cant and that the countermeasures were positively correlated to reducing the risks. This study contributes to the limited pool of knowledge on data leakage issues in outsourcing. Organizations engaging in or contemplating outsourcing will find the results beneficial not only in understanding the data leakage concerns but also in supporting the high priority for these concerns to be addressed. However, more effort is required to enforce the countermeasures as prudent precautionary routines to reduce data leakage risks.
 
Keywords: ICT Outsourcing, Data Leakage, Risks, Countermeasures.
 

 
DAMAGELESS DIGITAL WATERMARKING USING COMPLEXVALUED ARTIFICIAL NEURAL NETWORK
Rashidah Funke Olanweraju, Abdurazzag Ali Aburas, Othman Omran
Khalifa and Aisha-Hassan Hashim Abdalla
Faculty of Engineering
International Islamic University Malaysia
frashidah@yahoo.com
 
ABSTRACT FULL TEXT
Several high-ranking watermarking schemes using neural networks have been proposed in order to make the watermark stronger to resist attacks. However, the current system only deals with real value data. Once the data become complex, the current algorithms are not capable of handling complex data. In this paper, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. Because neural networks perform best on detection, classification, learning and adaption, these features are employed to simulate the Safe Region (SR) to embed the watermark, thus, watermark are appropriately mapped to the mid frequency of selected coeffi cients. The algorithm was appraised by Mean Squared Error MSE and Average Difference Indicator (ADI). Implementation results have shown that this watermarking algorithm has a high level of robustness and accuracy in recovery of the watermark.
 
Keywords: Digital Watermarking, Complex Back Propagation Algorithm, Complex-Valued Data (CVD), Complex-Valued Neural Network (CVNN), Fast Fourier Transform (FFT).

Universiti Utara Malaysia Press
 Universiti Utara Malaysia, 06010 UUM Sintok
Kedah Darul Aman, MALAYSIA
Phone: +604-928 4816, Fax : +604-928 4792

All Right Reserved. Copyright © 2010, Universiti Utara Malaysia Press