it decision making
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 5)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 67 (3) ◽  
pp. 84-94
Author(s):  
Martin Mizla ◽  
◽  
Denisa Šefčíková ◽  
Jozef Gajdoš ◽  
◽  
...  

In the case of the integration process, economic and social differences between economic units represent a barrier. There are reasonable and active efforts of many administrative bodies to transfer the existing inequalities to equalities. In practical life, it is often necessary to order different objects and take a decision based on it. Decision-making can be intuitive or, conversely, based on various quantitative methods. The paper discusses some quantitative methods of multi-criteria decision-making (MCDM), namely Analytical Hierarchy Process (AHP), Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), and Weighted Linear Combination (WLC); and their use for innovation projects. Autonomous orders of objects (projects) are performed on the same basic data set by the above-mentioned methods, and they are compared with each other. The Spearman’s rank correlation coefficient was used for mutual comparison. The test results showed that the investigated methods do not provide results with a close dependence, which means that the order of objects (projects) created depends on the method used.


Changes in IT governance is urgently needed to support the business transformation. PT XYZ is a bank that transformed its business model to compete optimally in today's digital era. The reasons are to modernize legacy systems and existing work units, develop more customer-centric products, and expand banking service coverage. This research’s objectives were to look at elements of IT governance by De Haes & Grembergen which are structures, processes, and relational mechanisms. The analysis was carried out by looking at the condition of the bank before and after the transformation that happened because of changes in the governance of IT decision making that will be seen using theory from Weill & Ross. Data were collected from annual and internal reports, also interviews with parties related to IT governance at PT XYZ. The results of this research showed that transformation happened in all elements of IT governance. Changes in organizational structure and alignment processes between business and IT, as well as product development methods such as the application of bi-modal governance, which uses both waterfall and agile, occurred after the transformation. Recommendations are given to PT XYZ to restructure the organization and schedule regular meetings to affiliate IT project development.


Author(s):  
Anupam Panwar

Malware or virus is one of the most significant security threats in Internet. There are mainly two types of successful (partially) solutions available. One is anti-virus and other is backlisting. This kind of detection generally depends on the existing malware or virus signature database. Cyber-criminals bypass defenses by generating variants of their malware program. Traditional approach has limitations such as unable to detect zero day threats or generate so many false alerts et al. To overcome these difficulties, a system is built based on Atanassov's intuitionistic fuzzy set (AIFS) theory based clustering method that takes care of these problems in a robust way. It not only raises an alert for new kind of malware but also decreases the number of false alerts. This is done by giving it decision-making intelligence. There is not much work done in the field of network forensics using AIFS theory. Some clustering techniques are used in these fields but those have limitations like accuracy, performance or difficulty to cluster noisy data. This method clusters the malwares/viruses with high accuracy on the basis of severity. Experiments are performed on several pcap files with malware traffic to assess the performance and accuracy of the method and results are compared with different clustering algorithms.


2019 ◽  
pp. 1809-1828
Author(s):  
Juhua Wu ◽  
Fang Ding ◽  
Meng Xu ◽  
Zan Mo ◽  
Anran Jin

This article analyzed decision-making in terms of the adoption of public cloud computing and its determinants in the context of e-government. The authors proposed a theoretical model and related hypotheses after reviewing the literature and combining technology adoption theory with IT decision-making authority theory. Then, they collected samples from 227 public sectors and tested hypotheses using structural equation modeling. The results show that the determinants of the three modes (IaaS, SaaS, and PaaS) of decision-making on adoption are different. The significant determinants of IaaS adoption include technical factors and business factors, those of PaaS adoption include technical factors and management factors, whereas those of SaaS include technical factors, business factors and management factors. The authors also find managerial/controlling power, which characterizes the special nature of Chinese culture, only have a significant influence on the decision-making on adoption of PaaS mode and SaaS mode.


2016 ◽  
Vol 24 (3) ◽  
pp. 71-89 ◽  
Author(s):  
Juhua Wu ◽  
Fang Ding ◽  
Meng Xu ◽  
Zan Mo ◽  
Anran Jin

This article analyzed decision-making in terms of the adoption of public cloud computing and its determinants in the context of e-government. The authors proposed a theoretical model and related hypotheses after reviewing the literature and combining technology adoption theory with IT decision-making authority theory. Then, they collected samples from 227 public sectors and tested hypotheses using structural equation modeling. The results show that the determinants of the three modes (IaaS, SaaS, and PaaS) of decision-making on adoption are different. The significant determinants of IaaS adoption include technical factors and business factors, those of PaaS adoption include technical factors and management factors, whereas those of SaaS include technical factors, business factors and management factors. The authors also find managerial/controlling power, which characterizes the special nature of Chinese culture, only have a significant influence on the decision-making on adoption of PaaS mode and SaaS mode.


2016 ◽  
Vol 4 (1) ◽  
pp. 1-15 ◽  
Author(s):  
Anupam Panwar

Malware or virus is one of the most significant security threats in Internet. There are mainly two types of successful (partially) solutions available. One is anti-virus and other is backlisting. This kind of detection generally depends on the existing malware or virus signature database. Cyber-criminals bypass defenses by generating variants of their malware program. Traditional approach has limitations such as unable to detect zero day threats or generate so many false alerts et al. To overcome these difficulties, a system is built based on Atanassov's intuitionistic fuzzy set (AIFS) theory based clustering method that takes care of these problems in a robust way. It not only raises an alert for new kind of malware but also decreases the number of false alerts. This is done by giving it decision-making intelligence. There is not much work done in the field of network forensics using AIFS theory. Some clustering techniques are used in these fields but those have limitations like accuracy, performance or difficulty to cluster noisy data. This method clusters the malwares/viruses with high accuracy on the basis of severity. Experiments are performed on several pcap files with malware traffic to assess the performance and accuracy of the method and results are compared with different clustering algorithms.


2014 ◽  
Vol 67 ◽  
pp. 95-107
Author(s):  
Gediminas Rumšas ◽  
Rimvydas Skyrius

Informacinėms sistemoms (toliau – IS) išplitus ir įsitvirtinus organizacijų veikloje, nemažai dėmesio skirta jų plėtrai ir tobulėjančioms technologijoms, tačiau santykinai mažesnio dėmesio sulaukė jų sukuriama vertė ir jos didinimo keliai. Vienas iš kritinių IS sėkmės veiksnių yra IS ir verslo suderinamumas, kurio tyrimų svarbą jau gerą dešimtmetį pabrėžia daugelis mokslininkų. Šiuolaikinės organizacijos taip pat supranta, kad būtina užtikrinti naudojamų IS ir verslo strategijos, tikslų bei procesų suderinamumą, tačiau nėra apibrėžtų metodų šiam suderinamumui užtikrinti.Šio darbo tikslas – pateikti teorinio modelio, kuris leistų geriau užtikrinti IS ir verslo suderinamumą, pagrindines nuostatas. Darbe nustatomos verslo ir IS suderinamumą sukeliančios problemos, siūlomas suderinamumo užtikrinimo modelis, kurį sudaro suderinamumo užtikrinimo bei sėkmės vertinimo metodai.Pagrindiniai žodžiai: IS strateginis planavimas, IS ir verslo suderinamumasInformation systems and business alignment modelGediminas Rumšas, Rimvydas Skyrius SummaryThe paper analyses information systems and business alignment as a critical factor for information system success. After performing an analysis of current alignment issues it is stated that main such issues in various stages of information systems planning could be handled by thorough systematical approach. An alignment model consisting of recommendations in Planning, Implementation, Evaluation and Improvement phases is proposed and implemented during a project in Lithuanian organization. Alignment model implementation during strategic planning sessions led to following results: 1) identification of main organizational IT priorities; 2) evaluation of current software solutions and their importance to business; 3) data-based support for strategic IT decision making.


Sign in / Sign up

Export Citation Format

Share Document