Results in Journal Communications of the IBIMA: 177
(searched for: journal_id:(360309))
Communications of the IBIMA pp 1-9; doi:10.5171/2016.943964
Communications of the IBIMA pp 1-17; doi:10.5171/2016.682007
Communications of the IBIMA pp 1-16; doi:10.5171/2016.979834
Communications of the IBIMA pp 1-13; doi:10.5171/2016.769097
Communications of the IBIMA pp 1-18; doi:10.5171/2016.790219
Communications of the IBIMA pp 1-17; doi:10.5171/2016.187526
Communications of the IBIMA pp 1-13; doi:10.5171/2015.561648
Communications of the IBIMA pp 1-32; doi:10.5171/2015.928262
Communications of the IBIMA pp 1-14; doi:10.5171/2015.574276
Communications of the IBIMA pp 1-13; doi:10.5171/2015.857912
Communications of the IBIMA pp 1-18; doi:10.5171/2015.794545
Communications of the IBIMA pp 1-13; doi:10.5171/2015.100244
Communications of the IBIMA pp 1-18; doi:10.5171/2015.440860
Communications of the IBIMA pp 1-10; doi:10.5171/2015.592253
Communications of the IBIMA pp 1-12; doi:10.5171/2015.185611
Communications of the IBIMA pp 1-12; doi:10.5171/2014.473436
Communications of the IBIMA pp 1-10; doi:10.5171/2012.675652
Communications of the IBIMA pp 1-22; doi:10.5171/2013.291607
Communications of the IBIMA pp 1-19; doi:10.5171/2013.120942
Communications of the IBIMA pp 1-12; doi:10.5171/2013.476066
Communications of the IBIMA pp 1-15; doi:10.5171/2013.131318
Communications of the IBIMA pp 1-10; doi:10.5171/2013.246123
Abstract:
Due to ubiquitous information requirements, market interest in mobile business intelligence (BI) has grown markedly. However, mobile BI market is a relatively new area that has been driven primarily by the IT industry. Yet, there is a lack of systematic study on the critical success factors for mobile BI. This research reviews the state-of-the-art of mobile BI, and explores the critical success factors based on a rigorous examination of the academic and practitioner literature. The study reveals that critical success factors of mobile BI generally fall into four key dimensions, namely security, mobile technology, system content and quality, and organisational support perspectives. The various research findings will be useful to organisations which are considering or undertaking mobile business intelligence initiatives
Communications of the IBIMA pp 1-12; doi:10.5171/2013.322363
Communications of the IBIMA pp 1-9; doi:10.5171/2013.135959
Abstract:
The aim of this study was to examine undergraduate students’ perceptions toward the adoption of the Graphing Calculator (GC) instructional approach in learning Probability. During the study, a sample of 55 students was provided GCs and self-designed instructional activities modules for their learning. At the end of the study, an adapted questionnaire was distributed to collect students’ views on the adoption of the GC instructional approach in Probability learning. The data collected from the questionnaire were categorized into six aspects: the GC usage, quality of the output from the GC, GC helped students to understand probability, GC helped in increasing students confidence in problem solving, GC helped in students communication, GC helped to foster students attitude towards probability learning, and it was found that students’ perceptions in these six aspects are favourable. ANOVA test also showed that there were no significant differences in the mean scores among students of different levels when the GC instructional approach was adopted. A majority of students found that leaning probability with the GC instructional approach was more funny and interesting. A positive attitude and increased motivation to learn Probability was cultivated as well
Communications of the IBIMA pp 1-13; doi:10.5171/2013.477923
Communications of the IBIMA pp 1-9; doi:10.5171/2013.311167
Communications of the IBIMA pp 1-9; doi:10.5171/2013.743515
Communications of the IBIMA pp 1-16; doi:10.5171/2013.567289
Abstract:
IBIMA Publishing is an open access journals publisher. "i research . i empower the world"
Communications of the IBIMA pp 1-15; doi:10.5171/2013.794626
The publisher has not yet granted permission to display this abstract.
Communications of the IBIMA pp 1-16; doi:10.5171/2013.480436
Communications of the IBIMA pp 1-12; doi:10.5171/2013.655710
Abstract:
Security and reliability of cloud computing services remain among the dominant concerns inhibiting their pervasive adaptation. The distributed and the multi-tenancy nature of the cloud computing paradigm can be considered as the root causes for their increased risks and vulnerabilities. Resource sharing and virtualization can also be mentioned as additional main factors contributing to or augmenting cross-site scripting and other cloud vulnerabilities. Cloud are also exposed to the risks and liabilities faced by other networked systems. Poorly designed APIs that may cause security problems or distributed denial of services attacks are the examples of this category that are considered in this paper. Public key infrastructure provides the foundations for provision of some essential security services. These include services such as confidentiality, authentication, and privacy that are of vital importance for establishing trust and confidence between the cloud providers and their clients. In this work, we will discuss the potential flaws of this infrastructure and examine how they may deteriorate the security and reliability levels of the cloud environments. To enable a comprehensive study of the challenges in security and reliability of the cloud computing environments, we categorize the risks and vulnerabilities they face. Traditional techniques, based on cryptography, can address some of these challenges to a certain degree. We will argue that they may not be efficient for use in cloud environments. We then focus on data-centric and homomorphic encryption methods that may provide more appropriate solutions in addressing the challenges in cloud computing security and reliability
Communications of the IBIMA pp 1-10; doi:10.5171/2013.462966
Communications of the IBIMA pp 1-17; doi:10.5171/2012.216771
Communications of the IBIMA pp 1-8; doi:10.5171/2012.834755
Communications of the IBIMA pp 1-10; doi:10.5171/2012.768706
Communications of the IBIMA pp 1-7; doi:10.5171/2012.385699
Communications of the IBIMA pp 1-13; doi:10.5171/2012.612096
Communications of the IBIMA pp 1-11; doi:10.5171/2012.790264
Communications of the IBIMA pp 1-13; doi:10.5171/2012.543281
Communications of the IBIMA pp 1-16; doi:10.5171/2012.970363
Communications of the IBIMA pp 1-21; doi:10.5171/2012.595761
Communications of the IBIMA pp 1-13; doi:10.5171/2012.406891
Communications of the IBIMA pp 1-15; doi:10.5171/2012.775316
Communications of the IBIMA pp 1-11; doi:10.5171/2012.348337
Communications of the IBIMA pp 1-10; doi:10.5171/2012.581504
Communications of the IBIMA pp 1-11; doi:10.5171/2012.871760
Communications of the IBIMA pp 1-10; doi:10.5171/2012.444553
Communications of the IBIMA pp 1-9; doi:10.5171/2012.532248
Communications of the IBIMA pp 1-15; doi:10.5171/2012.959796
Communications of the IBIMA pp 1-19; doi:10.5171/2012.369727