Most used project management tools and techniques in information systems projectsVarajão, João; Fernandes, Gabriela; Silva, Hélio
2020 Journal of Systems and Information Technology
doi: 10.1108/jsit-08-2017-0070
The purpose of this paper is to increase the understanding of practice in information systems (IS) project management (PM) by analyzing the use of tools and techniques by IS project managers.Design/methodology/approachThe authors carried out an international questionnaire-based survey with experienced IS project managers.FindingsResults reveal that, notwithstanding the similarities between the tools and techniques used in IS projects and projects from other areas, there are also significant differences concerning those more frequently used. The top five tools and techniques most used are “kick-off meeting,” “progress meetings,” “progress reports,” “requirements analysis” and “activity list.” However, the low use of some tools and techniques, from management areas such as risk and quality management, or related to the project monitoring and control, should raise concern.Research limitations/implicationsThrough the results of this research, researchers, organizations and practitioners can identify ways of developing and enhancing PM by examining the tools and techniques identified as the most used and those that are not being used as frequently as expected.Originality/valueIt provides a useful benchmarking basis for evaluating the most applicable tools and techniques, designing training and teaching programs and identifying academic research opportunities in IS PM.
Mobile banking usage and gamification: the moderating effect of generational cohortsÇera, Gentjan; Pagria, Ina; Khan, Khurram Ajaz; Muaremi, Lindita
2020 Journal of Systems and Information Technology
doi: 10.1108/jsit-01-2020-0005
The extended unified theory of acceptance and use of technology (UTAUT2) model has been adapted and applied by scholars to gain insight into mobile banking (m-banking) usage. By combining three perspectives, UTAUT2, gamification (GM) and generational cohort theory, this study aims to investigate the factors which impact m-banking usage and examine the moderating effect of generations Y and Z on the relationship between GM and intention to use m-banking.Design/methodology/approachThe adopted model was tested in a quantitative study by using partial least square structural equation modelling. A total of 380 valid questionnaires from a transition country, Albania, have been examined.FindingsIn the study, scientific evidence concerning the UTAUT2 model and GM elements are provided. Thus, facilitation conditions, habit and hedonic motivation were found to be significant determinants of GM. Moreover, the results revealed that age moderates the relationship between GM and behavioural intention (BI). Compared to generation Z, individuals born prior to 1996 (generation Y), exhibited a much stronger relationship.Research limitations/implicationsAlthough Albania bears similarities with other transition countries in terms of regional, economic and political environments, the generalisation of these results to another context is rather limited.Practical implicationsThis paper offers a model integrating UTAUT2, GM and generational cohorts in the context of a transition country. The findings can be applied in the form of guidelines for a number of financial institutions.Originality/valueBesides identifying the determinants of m-banking adoption and GM, this study notably reveals the importance of generational cohorts because it governs the effect of GM on m-banking BI.
Examining differences in perceptions of trust, privacy and risk in home and public Wi-Fi internet channelsKaleta, Jeffrey P.; Mahadevan, Lakshman
2020 Journal of Systems and Information Technology
doi: 10.1108/jsit-04-2019-0075
Research of people’s perceptions of trust, privacy and risk on the internet has generally neglected the impact of the variety of channels used to access the internet. People primarily access the internet using internet channels at home, work, public Wi-Fi (hotspots) or through their mobile data network. The technology infrastructure of each of these channels combined with the vulnerabilities of the environment may form different perceptions, as it relates to trust, privacy and risk. The purpose of this study is to understand how people perceive the home and public Wi-Fi channel from a trust, privacy and risk perspective.Design/methodology/approachAdapting existing trust, privacy and risk scales, the authors conducted a survey of people’s perceptions, as it relates to home and public Wi-Fi internet channels.FindingsThe results of this study suggest significant differences in people’s perception of trust and risk depending on an internet channel. However, with regard to privacy, the results of this study provide non-conclusive, yet intriguing, outcomes motivating the need for future studies.Originality/valueTo the best of the authors’ knowledge, this is the first study that parses out people’s perceptions of trust, privacy and risk, as it pertains to specific internet channels. The authors expect future research to benefit from their findings of how different channel perceptions influence people’s online activities.
Exploiting multiclass classification algorithms for the prediction of ship routes: a study in the area of MaltaLo Duca, Angelica; Marchetti, Andrea
2020 Journal of Systems and Information Technology
doi: 10.1108/jsit-10-2019-0212
Ship route prediction (SRP) is a quite complicated task, which enables the determination of the next position of a ship after a given period of time, given its current position. This paper aims to describe a study, which compares five families of multiclass classification algorithms to perform SRP.Design/methodology/approachTested algorithm families include: Naive Bayes (NB), nearest neighbors, decision trees, linear algorithms and extension from binary. A common structure for all the algorithm families was implemented and adapted to the specific case, according to the test to be done. The tests were done on one month of real data extracted from automatic identification system messages, collected around the island of Malta.FindingsExperiments show that K-nearest neighbors and decision trees algorithms outperform all the other algorithms. Experiments also demonstrate that linear algorithms and NB have a very poor performance.Research limitations/implicationsThis study is limited to the area surrounding Malta. Thus, findings cannot be generalized to every context. However, the methodology presented is general and can help other researchers in this area to choose appropriate methods for their problems.Practical implicationsThe results of this study can be exploited by applications for maritime surveillance to build decision support systems to monitor and predict ship routes in a given area. For example, to protect the marine environment, the use of SRP techniques could be used to protect areas at risk such as marine protected areas, from illegal fishing.Originality/valueThe paper proposes a solid methodology to perform tests on SRP, based on a series of important machine learning algorithms for the prediction.