Abstract-Recently, ERP implementation has been transformed from the business side into educational side. The failure implementation of ERP in higher education is referred to many factors. In addition to the increment of the level of risk that invoked on the study of ERP, the study of critical success factors has great effects on making system fail or success in implementation. Despite of efforts that had been done to enhance the implementation of ERP; it still suffers from failure, especially in higher education. The present study investigates that ERP system will succeed if we employ a set of factors such as clear vision and objectives, top management support and commitment, clear business process, information flow and organizational structure, budget size and cost, integrated department and solve the problem of human resources management, project management, training and education, careful change management and effective communication and connection in ERP higher education system. According to the preliminary results of this study, these factors help in successful implementation of ERP in higher education.
Blockchain is an emerging technology that depends on distribution, decentralization, and encryption. Recently, it has gained wide interest in various fields of studies. Several considerable research on blockchain adoption has appeared in international journals across different disciplines, however, a review of literature on the adoption of blockchain remains rare. This study aimed to provide a comprehensive literature review of the current blockchain adoption studies that use individual adoption models or theories. This paper included the papers that are published in the 7 Scopus database from 2017-2021. Studies were analyzed to determine the adoption models or theories that are used, industry, country, methodology, and identify the most important influencing factors that drive the user to accept the adoption of blockchain technology. The results showed that there are still limitations in adoption studies in various fields such as health and education however, the field of supply chain management is one of the areas that received the most attention in the studies. Common studies relied on the Technology Acceptance Model (TAM) model as well as the Unified Theory of Acceptance and Use of Technology (UTAUT). Moreover, perceived ease of use (PEOU), perceived usefulness (PU) are considered the most important factors affecting the intention of users in adopting blockchain technology in different fields. The research findings have implications on blockchain adoption research. In terms of theory, the findings provide a guideline for the other researchers to put their own research in a better context and thus contribute to understanding the relevant blockchain adoption issues that require further investigation.
Nowadays, with growing of computer's networks and Internet, the security of data, systems and applications is becoming a real challenge for network's developers and administrators. An intrusion detection system is the first and reliable technique in the network's security that is based gathering data from computer network. Further, the need for monitoring, auditing and analysis tools of data traffic is becoming an important factor to increase an overall system and network security by avoiding external attackers and monitoring abuse of the IT assets by employees in the workplace. The techniques that used for collecting and converting data to a readable format are called packet sniffing. Packet Sniffer is a tool that used to capture packets in binary format, converts that binary data into a readable data format and log of that captured data for analyzing and monitoring, displaying different used applications, cleartext user names, passwords, and other vulnerabilities. It is used by network administrator to keep the network is more secured, safe and to support better decision. There are many different sniffing tools for monitoring, analyzing, and reporting the network's traffic. In this paper we will compare between three different sniffing tools; TCPDump, Wireshark, and Colasoft according to various parameters such as their detection ability, filtering, availability, supported operating system, open source, GUI, their characteristics and features, qualitative and quantitative parameters. In addition, this paper may be considered as an insight for the new researchers to guide them to an overview, essentials, and understanding of the packet sniffing techniques and their working.
ISMS is a set of policies, activities, and procedures implemented by the Information Security Department to maintain the confidentiality, integrity, and availability of information from threats and risks. Activities and procedures include identifying security needs, strategies required for implementation, and measuring results for security improvement. This paper aims to review the previous literature to verify the factors that affect information security management. Examination of current information security frameworks and standards, and this paper concluded that, for an organization to adopt a specific framework, this framework must be evaluated based on the security needs of the organization. The framework must include all factors that affect information security from all organizational aspects, people, and technology. Otherwise, the organization will face difficulties and obstacles in implementing the framework and improving security.
Exposure of valuable assets of Yemen banking sector to various attacks and threats may violate the privacy, confidentiality, integrity and accessibility (availability) of their data, information or computer systems resulting in financial and valuable loss. Such a violation may adversely affect the continuity of the business and the competitive advantages they seek to achieve. The objective of this paper is to evaluate the current security performance of banking systems in Yemen and to introduce a framework for improving information security management based on the ISO 27002-2013 benchmark and standards. The proposed framework includes important security factors which are people, technology and process. IBM SPSS AMOS is applied for testing framework hypothesis on complex variable relationships and gain new insight. Such framework shows that the process variable has obtained the most direct positive effect on improving information security management system with value (0.990), while the technology variable has obtained the second direct positive effect on improving the information security management system with value (0.930). Finally, the people variable has obtained the least direct positive effect on improving the information security management system with value (0.740). The research methodology includes: data collection, data analysis, reliability testing and computing results. The model validated and compared with other similar models available in the literature and the results were in valid range. Also, the research hypotheses were significant and deferent results of the proposed model were very promising.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.