Research Paper
Mahdi Joneidi Jafari; Mohammad Taghi Taghavifard; Mohammad Reza Taghva
Abstract
In today's business, projects are considered as an important part of business operations. Thus, the success of projects has a direct impact on the success of the firm. Researchers and practitioners have been attempting to improve project performance by suggesting and implementing several project ...
Read More
In today's business, projects are considered as an important part of business operations. Thus, the success of projects has a direct impact on the success of the firm. Researchers and practitioners have been attempting to improve project performance by suggesting and implementing several project management methods and methodologies. The present research is written to answer the question of how to improve Project performance through the consideration of information technology governance and project governance. The research was conducted using a descriptive-survey research method with a sample of 183 employees of Mellat Bank, using a questionnaire, and using structural equation modeling method, using Smart PLS and SPSS software for analyzing data. The research results indicate that both information technology governance and project governance have a positive impact on project performance. These findings provide evidence for project management professionals that information technology governance and project governance are part of an operational strategy to facilitate project success. This research also highlights the importance of strategic alignment between governance and project governance in enhancing project performance.
Research Paper
Vahideh Alipoor; Mohammad Reza Saadi; Atefeh Mehri Bazghaleh
Research Paper
Manijeh Haghighinasab; Zahra Taghavi
Research Paper
Majid Kalantari; Jalal Haghighat Monfared; Mohammad'Ali Keramati
Research Paper
Elham Vahidinia; Masoomeh hoseinzadeh Shahri; Seyyed Hamid Khodadad Hoseini; Neda Abdollahvand
Abstract
Hard conditions of today's hypercompetition markets have not only dramatically increased the cost and risk of entering the market, but have also caused failure of new entrants. Coopetitions are born in response to this need. One of the important issues facing decision makers in coopetition projects is ...
Read More
Hard conditions of today's hypercompetition markets have not only dramatically increased the cost and risk of entering the market, but have also caused failure of new entrants. Coopetitions are born in response to this need. One of the important issues facing decision makers in coopetition projects is how to evaluate the consequences so that decide whether to enter the coopetition or not, as well as whether to continue or not. The purpose of this research is design and explain the consequences of coopetition for entering the ICT market of Iran, by analyzing the data gathered from systematic literature review over the past 15 years and interviewing with 16 ICT experts, through Multi Grounded Theory (MGT). Finally, a conceptual model is developed about the consequences of coopetition for entering the Iranian ICT market, which composed of three groups: "Brand Performance", "Industry Performance", and "Market entry Performance ".v
Research Paper
Behnam Golshahi; Nahid Dorostkar Ahmadi; Nahid Sadeghi
Abstract
This study has the goal of assessing and prioritizing self-serving technologies with a combined approach to continuous usage of electronic banking services. To achieve this goal we used literature review and interviewing banking experts to determine parameters affecting continuous usage of ...
Read More
This study has the goal of assessing and prioritizing self-serving technologies with a combined approach to continuous usage of electronic banking services. To achieve this goal we used literature review and interviewing banking experts to determine parameters affecting continuous usage of self-serving technologies. And to prioritize these parameters we used paired comparison analysis questionnaires and fuzzy analytic hierarchy process.Validity of questionnaire was attained by content method and its stability was attained by calculating the rate of compatibility of aggregation matrix of experts’ opinions. Statistical population of this research includes 30 managers and deputy managers of selected Saman Banks’s branches in the region of northern Tehran which by snowball sampling method 12 of them were selected to participate in this study. Data analysis were done using fuzzy AHP and using MATLAB software. Analysis of data showed that self-serving services have different weighs according to three parameters of customer value, quality of service and customer readiness in which POS devices (0.662 weigh) have the most usability and importance from the view of banking experts. Other services rank as ATM (0.181). Mobile banking services (0.101) and Internet bank (0.056) respectively. In addition ranking of self-serving technologies according to 14 indexes also justifies the previous results.
Research Paper
Mohsen Shafiei Nikabadi; Samane. Toghi; Amir Hakaki
Abstract
The study conducted with aim of ranking each aspect of information security risk management. At the first stage, the dimensions and characteristics of each have been identified based on the research literature and expert opinions. In order to rank the factors under study using a hybrid approach using ...
Read More
The study conducted with aim of ranking each aspect of information security risk management. At the first stage, the dimensions and characteristics of each have been identified based on the research literature and expert opinions. In order to rank the factors under study using a hybrid approach using FEMA and Gray theory, 50 questionnaires collected among IT, soft ware, and network experts that choosed based on researchers’ judgement and accessible one. According to the results, the security of communications was ranked first. Infrastructure of hard ware and network, human factors, security management, access to information and systems and the development of secure information systems were ranked second to sixth, respectively.Therefore, it is recommended that organizations set up an independent security department within the organization. Also, providing a list of all the information assets of the organization and specifying control and strategic goals in the area of information security in the organization can be useful for organizations. Moreover, if the organization has several branches and need internet connection, preferably communications are available as VPN. In addition, if organizations have web automation for outside usage, the site should be licensed with SSL and https protocol.
Research Paper
, Reza Yousefi Zenouz; Seyed Sajjad Najafi esfahani; , Ebrahim Koulivand
Abstract
While electronic government could help the development of the country and also boost the security and decrease the corruption, but, at the same time it can prepare an infrastructure for other types of crimes and facilitate some type of corruptions. This paper attempts to identify and prioritize the security ...
Read More
While electronic government could help the development of the country and also boost the security and decrease the corruption, but, at the same time it can prepare an infrastructure for other types of crimes and facilitate some type of corruptions. This paper attempts to identify and prioritize the security features and necessities that Government Service Bus(GSB) should have as an electronic government infrastructure. Afterwards vast literature review and interview with the designers and users of this system, the security requirements of different stakeholders were identified. After that by content analysis, these requirements were refined and codified. Three categories of requirements are strategic,, technical and legal or national security requirements. Then adopting Kano model and quality function deployment (QFD) the requirements were processed and prioritized. The results and findings of this research showed that GSB is better than other systems like peer to peer(P2P) and physical document interchange and outperformed them in all dimensions. The main concern of all of respondents and experts were in the area of security. They are unanimous that security framework and standards of the system should be developed and implemented. This also emphasizes the importance of this type of researches.
Research Paper
farajallah rahimi; Mohammad hassan baghalinejad shooshtari; mahdi nadaf
Abstract
Organizations face different problems in the optimal use of data. Business intelligence helps organizations achieve that. This article is based on the qualitative research, using Grounded Theory approach, and it aims to design a business intelligence modelin petrochemical companies located in Mahshahr ...
Read More
Organizations face different problems in the optimal use of data. Business intelligence helps organizations achieve that. This article is based on the qualitative research, using Grounded Theory approach, and it aims to design a business intelligence modelin petrochemical companies located in Mahshahr Special Economic Zone. In this study, 13 executives/experts were interviewed as a sample using semi-structured method and the collected data were analyzed with the open coding, axial and selective stages. and the model was tested and confirmed by the interviewers using the Delphi method. The results of this research provide a model the petrochemical companies, the motivations and the factors affecting successful implementation of Business Intelligence, transition into an intelligent enterprise, and optimized decision-making in all areas.
Research Paper
Soraya Bakhtiari bastaki,; Peyman Ghafari ashtiani,; Ali Hamidizadeh,; Rasoul Sanavi Fard,
Abstract
he present research aimed at developing a model for perceived social media advertising deception. To attain the aim, the interpretive structural modeling approach was employed. The research sample included all of the lecturers and experts of social media marketing and advertisement field selected by ...
Read More
he present research aimed at developing a model for perceived social media advertising deception. To attain the aim, the interpretive structural modeling approach was employed. The research sample included all of the lecturers and experts of social media marketing and advertisement field selected by the purposeful sampling method. Eventually, eight lecturers and experts of social media marketing and advertisement answered the considered questions. The selected experts had at least ten years of experience in studying, teaching, or working in the field of social media. The sampling continued up to the theoretical saturation point. To determine the reliability of the measurement instrument, the ICC value was confirmed in terms of its consistency and absolute agreement. The research results indicated that in relation to the research subject and the proposed model for perceived social media advertising deception, social media advertising attributes had the strongest effect, while the perceived usefulness, customer knowledge, perceived trust, customer attitude, customer attributes, and media attributes were mostly affected by and their own effects were trivial. In addition, the results revealed that the primary factor in the research i.e. social media advertising attributes, was among the influential or driving variables due to its high directional power and low dependency. Other factors were described with high directional power and high dependency. The variables were non-static and so classified as the hybrid variables.
Research Paper
Mohammad Baradaran; Abbas Tolouei Ashlaghi; Mohammad Al i Afshar Kazemi; Mohammad Reza Motadel
Abstract
Smart transport is an indispensable necessity in today's smart cities. In this thesis, six scenarios were implemented based on intelligent transportation. In the first scenario, the speed control process was implemented. In the second and third scenarios, the process of traffic planning was even and ...
Read More
Smart transport is an indispensable necessity in today's smart cities. In this thesis, six scenarios were implemented based on intelligent transportation. In the first scenario, the speed control process was implemented. In the second and third scenarios, the process of traffic planning was even and odd. In the fourth scenario, the vehicle relief system was implemented. In the fifth scenario, an emergency relief system was implemented. In the sixth scenario, the message was executed at the time of the car theft. The message delivery process has been fully implemented in the smart city area so that all vehicles in the smart transport process receive the message. An access point is called an access point whose task is to send a message. Given that the number of messages sent to the network decreases, there are two advantages to the low cost of sending messages as well as full coverage. So instead of sending the message directly to each car individually, the messages are sent to the roadside equipment and then sent to the vehicles passing the road through the roadside equipment. This roadside equipment is called fixed nodes. Certainly, sending messages to all these fixed nodes is not optimal and has two major drawbacks. The first disadvantage is that a car may cross several fixed target nodes and receive all of these fixed target nodes of the message. Also the second problem is that the number of messages received creates terrible statistics and imposes a computational overhead. So the solution to this problem is to select some of these fixed nodes as the target constant node. Only send the message to fixed target nodes and send it to the cars passing by. The first challenge of this thesis is the selection of these target constant nodes, which is implemented using the fuzzy ranked idealized programming algorithm. After solving the first challenge due to the communication board problem in the car network, the challenge of routing the message from the access point to the fixed node is raised. The solution to this challenge is computed using the Dijkstra algorithm and compared with the eTGMD algorithm in terms of message delivery rate, delivery delay, number of packets used, and number of fixed target nodes. The results of the proposed algorithm show a good and optimal improvement over the eTGMD algorithm.