A Multi-objective Model of Services Assignment to Bank Customers by Data Mining and Optimization via Simulation
Mohamammad Ali
KhatamiFirouzabadi
Associate Professor, Department of Management and Accounting, Allameh Tabataba’i University, Tehran
author
MohammadTaghi
TaghaviFard
Associate Professor, Department of Management and Accounting, Allameh Tabataba’i University, Tehran
author
Khalil
Sajjadi
PhD student in Operational Research, Department of Management and Accounting, Allameh Tabataba’i University, Tehran
author
Jahanyar
Bamdad Soufi
Associate Professor, Department of Management and Accounting, Allameh Tabataba’i University, Tehran
author
text
article
2018
per
Knowing customer behavior patterns, clustering and providing proper services to the customers is one of the most important issues for the banks.In this research, 5 criteria of each customer, including Recency, Frequency, Monetary, Loan and Deferred, were extracted from a bank database during a fiscal year, and then customers were clustered using K-Means algorithm. Then, a multi-objective model of bank service allocation was designed for each of the clusters. The purpose of the designed model was to increase customer satisfaction, reduce costs, and reduce the risk of allocating services. Given the fact that the problem does not have an optimal solution, and each client feature has a probability distribution function, simulation was used to solve the models. To determine the optimal solution, Simulated Annealing algorithm was used to create neighboring solutions and consequently a simulation model was implemented. The results showed a significant improvement in the current situation. In this research, we used Weka and R-Studio software for data mining and Arena for simulation and optimization
Business Intelligence Management Studies
Allameh Tabataba’i University
2821-0964
7
v.
25
no.
2018
5
40
https://ims.atu.ac.ir/article_9740_0e72da742e0ab7b97dae99ed5bae6c67.pdf
dx.doi.org/10.22054/ims.2018.9740
An Organizational Change Readiness Model to Implement Business Processes
Hamidreza
Yazdani
Assistant Professor, Human resources management, Faculty of Management and Accounting, University of Tehran, Tehran
author
Niloofar
Jalali
Masters, information systems Management, Faculty of Management and Accounting, University of Tehran College of Farabi, Qom.
author
Bahram i
Moazeni
Ph.D. student, Human resources management, Faculty of Management, kharazmi University, Tehran
author
text
article
2018
per
Most of organizations are working in an environment in which, their business is exposed to inevitable changes. So, these organizations need to adapt their business processes according to the changes constantly, to maintain their competitive advantages. The risky nature of business process management requires a careful examination of key factors and failure causes. Therefore, the main goal of the current research is to provide a change management model for implementing business process management. To reach to the goal, the combination of Dematel and Fuzzy ANP methods are used. The method used in this research is applied-developmental in terms of purpose and descriptive in terms of analysis. Also, based on the type of data, it can be considered as a survey. In the first step, through comprehensive literature review the effective management factors affecting the implementation of business process management were identified and extracted. In the next step, Fuzzy Delphi technique was used to screen the identified variables. Subsequently, with a survey of experts in the field of change management, key factors were grouped into 7 main factors. In the next step, the internal relations between the main factors were calculated using Dematel method. Then, Dematel and Fuzzy ANP were combined to calculate the weights and rank the factors. Identifying the causal factors and prioritizing the effective change management factors in implementing business process management in organizations is one of the important results of the research
Business Intelligence Management Studies
Allameh Tabataba’i University
2821-0964
7
v.
25
no.
2018
85
118
https://ims.atu.ac.ir/article_9741_119b37fdc85700d592eee8f569d5d9d6.pdf
dx.doi.org/10.22054/ims.2018.9741
Schematic Design of Hotel Recommendation Systems by user Precedence on Twitter
Venus
Mohammadi
Department of Electrical and Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran.
author
Mohsen
Hosseinzadeh
PNU, faculty member, Department of Computer Engineering and Information Technology. Payame Noor University, Tehran
author
Mehdi Hosseinzadeh
Hosseinzadeh
Iran University of Medical sciences, Tehran .(Corresponding Author: hosseinzadeh.m@lums.ac.ir)
author
text
article
2018
per
v Recommender systems utilization has proven sales enhancement in most e-commerce platforms. This system objected to provide more options, comfort and flexibility to user which could make him interested, as well as providing better chance for companies to increase sells in their products and services. Flourishing popularity of web site has originated intrigue for recommendation systems. By penetrating in infinite fields, recommendation systems give deceptive suggestion on services compatible with user precedence. Integrating recommender systems by data management techniques to can targeted such issues and quality of suggestions will be improved considerably. Recent research reveals an idea of utilizing social network data to refine weakness points of traditional recommender system and improve prediction accuracy and efficiency. In this paper we represent views of recommender systems based on Twitter social network data by usage of variety interfaces, content analysis Methods, computational linguistics techniques and MALLET topic modeling algorithm. By deep exploration of objects, methodologies and available data sources, this paper will helps interested people to develop travel recommendation systems and facilitates future research by achieved direction.
Business Intelligence Management Studies
Allameh Tabataba’i University
2821-0964
7
v.
25
no.
2018
85
118
https://ims.atu.ac.ir/article_9745_5600b176d5b2f7e27bf5bc2815ddeb6e.pdf
dx.doi.org/10.22054/ims.2018.9745
Schematic Design of Hotel Recommendation Systems by user Precedence on Twitter
Seyyed Jalaladdin
Hosseini Dehshiri
Ph.D. student of Operation and Production Management, Faculty of Management and Accounting, Allameh Tabataba’i University, Tehran.
author
Mojtaba
Aghaei
Ph.D. student of Operation Research, Faculty of Management and Accounting, Allameh Tabataba’i University, Tehran. (Corresponding Author: mojtaba_aghaei68@yahoo.com)
author
Mohammad’Taghi
Taghavifard
Associate Professor, Department of Industrial Management, Faculty of Management and Accounting, Allameh Tabatabaei University,Tehran
author
text
article
2018
per
Recommender systems utilization has proven sales enhancement in most e-commerce platforms. This system objected to provide more options, comfort and flexibility to user which could make him interested, as well as providing better chance for companies to increase sells in their products and services. Flourishing popularity of web site has originated intrigue for recommendation systems. By penetrating in infinite fields, recommendation systems give deceptive suggestion on services compatible with user precedence. Integrating recommender systems by data management techniques to can targeted such issues and quality of suggestions will be improved considerably. Recent research reveals an idea of utilizing social network data to refine weakness points of traditional recommender system and improve prediction accuracy and efficiency. In this paper we represent views of recommender systems based on Twitter social network data by usage of variety interfaces, content analysis Methods, computational linguistics techniques and MALLET topic modeling algorithm. By deep exploration of objects, methodologies and available data sources, this paper will helps interested people to develop travel recommendation systems and facilitates future research by achieved direction.
Business Intelligence Management Studies
Allameh Tabataba’i University
2821-0964
7
v.
25
no.
2018
119
146
https://ims.atu.ac.ir/article_9742_df4c1edea85e1ee6b94bd6fb4481b5c1.pdf
dx.doi.org/10.22054/ims.2018.9742
Systematic Review Approaches to Information Security Investment
Mohammad
Lagzian
Associate Professor, Department of Management, Faculty of Administrative and Economic Sciences, Ferdowsi University of Mashhad
author
parisa
mousavi
PhD student of Information Technology Management, Department of Management, Faculty of Administrative and Economic Sciences, Ferdowsi University of Mashhad (Corresponding Author: p.mousavi@mail.um.ac.ir)
author
text
article
2018
per
Information security is an extremely important aspect of information systems. A lot of research has been done in the field of technological security of information, but with the development of security needs, attention has been paid to the role of management in information security. Economic valuation of investment in the information security of organizations is one of the issues of management in this field. In this research, to examine the issue of evaluating investment in information security and finding suitable methods for it, a systematic review of the approaches in information security investment has been done. Other goals of this study are to study the evolution of approaches used in the years 2006 to 2017. In order to carry out this systematic review of all studies in the field of information security investment using the research keywords, extracted Springer, IEEE-Explore, Web of Science, Science Direct databases, ultimately 146 articles related to This topic have been investigated. The research findings identified eight main approaches (game theory, risk-based approach, decision support systems, Utility maximization, rate of return on investment, Net Present Value, expected utility theory, real options theory). According to the results of this research there has been more interested in using game theory in recent years.
Business Intelligence Management Studies
Allameh Tabataba’i University
2821-0964
7
v.
25
no.
2018
147
182
https://ims.atu.ac.ir/article_9743_ece46b42d2e6eb5de8965ed233ff5810.pdf
dx.doi.org/10.22054/ims.2018.9743
Analysis and Prioritization of VoIP Security Challenges
Saeid
Bakhtiari
Faculty Member, Department of Information Technology, Amin Police University,
author
Esmaeil
Zareh
MA, Information Technology Management, Amin Police University, Tehran
(Corresponding Author: ezaree1354@chmail.ir).
author
text
article
2018
per
P network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP applicationIP network architecture is fragile from security point of view, and Voice over IP (VoIP), which uses the standards of this network, is vulnerable to multiple attacks that reduce the quality and, in some cases, disconnect services and waste VoIP resources. In this regard, VoIP security is essential, and typically the implementation of security solutions in systems such as VoIP will slow down and reduce the quality of performance and increase the costs of upgrade and maintenances. Therefore, IT managers should consider high-security security solutions. To do this, by reviewing the research literature, VoIP comprehensive security matrix has been extracted from a comprehensive list of VoIP security challenges and coping strategies that make a significant contribution to the intelligence and risk management of organizations. The results obtained showed that the implementation of 3 strategies including "Separation of Voice and Data Traffic VLANs", "Signaling Authentication" and "Port Authentication" would have the most positive impact on Amin Police University VoIP security. The results are consistent with the recommendations and security countermeasures mentioned by previous research and security institutions, and only the proposed priorities are different. Therefore, in strategic IT planning, decision making, and supervision of IT managers, the three mentioned strategies should be considered as a priority for VoIP application
Business Intelligence Management Studies
Allameh Tabataba’i University
2821-0964
7
v.
25
no.
2018
183
218
https://ims.atu.ac.ir/article_9744_adb05e75db94400b12fbfe4a6e5dac40.pdf
dx.doi.org/10.22054/ims.2018.9744