Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020, ... Notes in Business Information Processing) 3030633950, 9783030633950

This book constitutes the proceedings papers from the 17th European, Mediterranean, and Middle Eastern Conference on Inf

242 68 50MB

English Pages 808 [809] Year 2020

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Preface
Organization
Contents
Big Data and Analytics
Towards Designing Conceptual Data Models for Big Data Warehouses: The Genomics Case
Abstract
1 Introduction
2 Related Work
3 The Big Data Warehouse Conceptual Metamodel
4 The Big Genome Warehouse Conceptual Model
4.1 Data Modeling Rules
4.2 Data Modeling Patterns
5 Conclusions
Acknowledgements
References
Automating Data Integration in Adaptive and Data-Intensive Information Systems
Abstract
1 Introduction
2 Related Work
3 Data Integration in Adaptive and Data-Intensive Information Systems
3.1 System Architecture
3.2 Similarity Assessment
4 Demonstration
4.1 Datasets Description
4.2 Similarity Graph
5 Discussion and Conclusions
5.1 Analysis and Discussion of Results
5.2 Conclusions
Acknowledgements
References
Raising the Interoperability of Cultural Datasets: The Romanian Cultural Heritage Case Study
Abstract
1 Motivation
2 Related Work
3 Problem Statement
3.1 Research Questions
3.2 Paper’s Contribution
3.3 Research Limitations
4 Data Source
5 Methodology Overview
6 Knowledge Base Representation
7 Data Challenges
7.1 Timestamp Normalization
7.2 Assigning the URIs for Resources
7.3 Identifying Similar Resources
7.4 Handling the Cardinality Constraints
7.5 Extending the EDM Vocabulary
8 Experimental Results
9 Conclusions and Further Development
References
An Inspection and Logging System for Complex Event Processing in Bosch’s Industry 4.0 Movement
Abstract
1 Introduction
2 Related Work
3 The Inspection and Logging System as a IEB Mapping and Drill-Down Feeder
3.1 System Architecture
3.2 Design Rules for the Code Inspector Component
4 Demonstration Case
4.1 Code Inspector Flowchart
4.2 Graph Data Model
5 Conclusions
Acknowledgements
References
DECIDE: A New Decisional Big Data Methodology for a Better Data Governance
Abstract
1 Introduction
2 Literature Review
3 DECIDE and Data Governance Fundamentals
4 Overview of DECIDE
4.1 Preparation Phase
4.2 Transversal Phase
4.3 Data Collection and Storage Phase
4.4 Data Analysis and Presentation Phase
5 Data Governance Focus in DECIDE
5.1 Storage Design for Better Big Data Governance
5.2 Data Quality
5.3 Data Team Workforce
6 Conclusion
References
Towards the Machine Learning Algorithms in Telecommunications Business Environment
Abstract
1 Introduction
2 Machine Learning and Data Science Algorithms
3 Model Building – Resources and Data Processing
4 Research Methodology and Implementation of Selected Methods
4.1 Random Forest Model
4.2 K-Nearest Neighbors Model
4.3 Extreme Gradient Boosting Model
4.4 Logistic Regression
5 Results and Discussion – Choosing a Machine Learning Model and Its Implementation
6 Conclusions
References
Blockchain Technology and Applications
Blockchain Technology for Hospitality Industry
Abstract
1 Introduction
2 Methodology
3 Literature Review: Blockchain Technology and Hospitality Industry
4 Case Studies
5 Conclusion
References
Blockchain in Smart Energy Grids: A Market Analysis
Abstract
1 Introduction
2 Blockchain Background
3 Blockchain in the Smart Energy Grid
3.1 Smart Grid
3.2 Blockchain and the Smart Grid
4 Market Analysis
4.1 Opportunities
4.2 Threats and Challenges
5 Conclusions
Acknowledgements
References
Leadership Uniformity in Raft Consensus Algorithm
1 Introduction
2 Literature Review and Background
2.1 Literature Review
2.2 Raft: Background
3 Model
3.1 Definitions
3.2 Performance Metrics
4 Experiments
5 Analysis of Performance
6 Conclusions
References
Positive and Negative Searches Related to the Bitcoin Ecosystem: Relationship with Bitcoin Price
Abstract
1 Introduction
2 Background and Motivation of Hypotheses
3 Data and Methodology
3.1 Data
3.2 Models
4 Empirical Results
4.1 Trend Analysis and Descriptive Statistics
4.2 Garch and Egarch Results
5 Conclusions and Discussion
5.1 Conclusions
5.2 Limitations
5.3 Future Research
References
LOKI Vote: A Blockchain-Based Coercion Resistant E-Voting Protocol
1 Introduction
2 Related Work
3 Basic Notions
3.1 El-Gamal Cryptosystem
3.2 Proof of Knowledge
3.3 Group Signature Scheme of Boneh, Boyen and Shacham
3.4 Loki
4 Protocol Description
4.1 Entities
4.2 Phases
5 Security Evaluation
5.1 Informal Security Evaluation
5.2 Formal Security Evaluation
6 Conclusion
References
Blockchain for Smart Cities: A Systematic Literature Review
Abstract
1 Introduction
2 Methodology
3 Results
3.1 Why was Blockchain Chosen as the Solution?
3.2 What Blockchains are Being Considered for Use in Smart Cities?
3.3 What Blockchain Based Applications are Being Researched for Smart Cities?
4 Discussion and Conclusions
References
Blockchain in Digital Government: Research Needs Identification
Abstract
1 Introduction
2 Research Method
3 Analysis of Research Method
3.1 Project Analysis
3.2 Scenario Analysis
4 Synthesis of Research Needs
5 Conclusions and Limitations
Acknowledgments
A Appendix
References
An Exploratory Study of the Adoption of Blockchain Technology Among Australian Organizations: A Theoretical Model
Abstract
1 Introduction
1.1 Why Did We Choose Australia?
2 Literature Review
3 Theoretical Foundations
4 Research Methodology
5 Proposed Theoretical Model
5.1 Technology Context
5.2 Organizational Context
5.3 Environment Context
6 Discussion and Conclusion
References
Digital Government
Analyzing a Frugal Digital Transformation of a Widely Used Simple Public Service in Greece
Abstract
1 Introduction
2 Background
2.1 Public Sector Innovation
2.2 Diffusion of Innovation
3 Digital Transformation of a Simple Service
3.1 Certification of Authenticity of Signature: Paper-Based Form
3.2 The New e-Services
4 Evaluation Methodology
5 Results
6 Conclusions
Appendix – Survey Questionnaire
References
Why are Rankings of ‘Smart Cities’ Lacking? An Analysis of Two Decades of e-Government Benchmarking
Abstract
1 Introduction
2 Justification and Methodological Approach
3 Smart City Rankings
4 e-Government Rankings
4.1 European Union’s Ranking
4.2 UN e-Government Survey
5 Why Are ‘Smart City’ Rankings Lacking?
6 Conclusions
References
Citizens’ Perceptions of Mobile Tax Filing Services
Abstract
1 Introduction
2 Literature Review
2.1 Mobile Government Drivers and Benefits
2.2 Mobile Government Challenges
2.3 Mobile Government Case Study Overview
3 Theoretical Foundation of the Study
4 Research Methods
5 Research Results
5.1 Descriptive Statistics
5.2 Hypothesis Testing
5.3 Discussion of the Findings
6 Conclusion, Recommendations and Future Research
6.1 Concluding Remarks
6.2 Limitations and Future Research
References
Knowledge Graphs for Public Service Description: Τhe Case of Getting a Passport in Greece
Abstract
1 Introduction
2 Background Work
2.1 Methods for Providing PS Information About Public Services
2.2 Core Public Service Vocabulary
2.3 Knowledge Graphs
2.4 GRAKN.AI
3 Methodology
4 A Knowledge Graph for “Get a Passport”
4.1 Analysis of “Get a Passport” Based on CPSV-AP Model
4.2 Construct KG Schema
4.3 Implement KG in Grakn
4.4 Populate KG with Data
4.5 KG Usage Scenarios
4.6 Evaluation of the KG
5 Conclusions and Future Work
Appendix
References
Digital Services and Social Media
e-Commerce Websites and the Phenomenon of Dropshipping: Evaluation Criteria and Model
Abstract
1 Introduction
2 Literature Review
3 Research Questions Development
4 Research Approach
5 Findings
5.1 Suggesting Product Replacements to Streamline Delivery Costs
5.2 Product Price Juxtaposition Mechanics that Hints a New Competitive Price Proposal Automatically
5.3 Wizard for Creating Customized Product Descriptions
5.4 Delivery Time- and Location-Driven Shipping
5.5 Management of Multi-instance Advertising Campaigns
6 Conclusions
References
E-Learning Improves Accounting Education: Case of the Higher Education Sector of Bahrain
Abstract
1 Introduction
2 Literature Review
3 Research Methodology
4 Data Analysis and Findings
5 Conclusions and Recommendations
References
Influence of Website Design on E-Trust and Positive Word of Mouth Intentions in E-Commerce Fashion Websites
Abstract
1 Introduction
2 Literature Review and Research Model
2.1 Product Information
2.2 Website Aesthetics
2.3 Website Usability
2.4 E-trust
2.5 Word of Mouth
2.6 Research Model
3 Method
3.1 Measures
3.2 Sample
4 Results
4.1 Reliability and Validity
4.2 Hypothesis Testing
5 Discussion
6 Conclusion
References
When Persuasive Technology Gets Dark?
1 Introduction
2 Background
2.1 Persuasive Technology
2.2 Possible Pitfalls When Designing Persuasive Technology
2.3 Dark Patterns and Computer Game
3 Visibility-Darkness Matrix
4 Use Case
5 Discussion
6 Conclusions and Future Research
References
Influential Nodes Prediction Based on the Structural and Semantic Aspects of Social Media
1 Introduction
2 Related Work
2.1 Link Prediction Approaches
2.2 Social Influence Prediction Approaches
2.3 Preliminaries and Problem Statement
3 Semantic and Structural Influential Nodes Prediction
3.1 Phase 1
3.2 Phase 2
4 Experiments
4.1 Datasets
4.2 Algorithms and Parameters
4.3 Results
5 Conclusion
References
Determinants of the Intention to Use Online P2P Platforms from the Seller’s Perspective
Abstract
1 Introduction
2 Theoretical Framework
2.1 P2P Platforms
2.2 Formulation of Hypotheses
2.3 Research Model
3 Methodology
4 Results
5 Discussion of Results and Conclusions
5.1 Discussion of Results
5.2 Study Contributions
5.3 Limitations and Suggestions for Future Research
References
Social Media Impact on Academic Performance: Lessons Learned from Cameroon
Abstract
1 Introduction
2 Theoretical Background
3 Methodology
4 Results
5 Conclusions, Limitations and Future Research Directions
References
Emerging Computing Technologies and Trends for Business Process Management
Towards Applying Deep Learning to the Internet of Things: A Model and a Framework
Abstract
1 Introduction
2 Background and Review of Previous Related Research
2.1 Overview on Edge Computing and Internet of Things (IoT)
2.2 Overview on Deep Learning Model Management Systems (DL-MMS)
2.3 Gap in Literature
2.4 Objectives for DL Optimization
2.5 Knowledge Management Challenges for DL Optimization
3 Research Methodology
4 Proposed Solution
4.1 The DL Optimization Model Schema
4.2 Performance Measures Class
5 The DL for IoT Model Management Framework (DLOM2)
5.1 Graphical User Interface (GUI)
5.2 Cloud Repository
5.3 The DL Modeling Network
6 Illustrative Example
7 Discussion and Conclusion
References
HapiFabric: A Teleconsultation Framework Based on Hyperledger Fabric
1 Introduction
2 From BitCoin to Hyperledger Fabric
3 HapiFabric
3.1 Architecture
3.2 Participants and Assets
3.3 Teleconsultation Workflow
3.4 Storage
3.5 Chaincode
4 Use Case
4.1 Scenario - 1
4.2 Scenario - 2
4.3 Discussion
5 Conclusion
References
Enterprise Systems
Evaluating the Utility of Human-Machine User Interfaces Using Balanced Score Cards
Abstract
1 Introduction
2 Related Work
3 The Evaluation Approach
4 Using Balanced Scorecards
5 Result Analysis
6 Conclusions and Future Work
Acknowledgement
References
Enterprise Systems, ICT Capabilities and Business Analytics Adoption – An Empirical Investigation
Abstract
1 Introduction
2 Literature Review
3 Research Hypotheses
3.1 Technological Factors
3.2 Organizational Factors
3.3 Environmental Factors
4 Data and Method
5 Results - Discussion
6 Conclusions
Appendix
References
Evaluation of Cloud Business Intelligence Prior to Adoption: The Voice of Small Business Enterprises in a South African Township
Abstract
1 Introduction
2 Review of Related Works
3 Research Design and Data Collection Method
3.1 Ethical Issues
3.2 Trustworthiness
4 Analysis and Interpretation of Results
4.1 Evaluation Strategies Used by Decision Makers in Selecting Cloud Business Intelligence Solutions
4.2 Description of Challenges Faced in the Evaluation of Cloud Business Intelligence
4.3 Important Aspects Considered When Evaluating Cloud Business Intelligence Solutions
5 Discussion of Findings
5.1 What Security Evaluation Techniques Did SBEs Use When Selecting Cloud Business Intelligence Prior to Adoption?
5.2 What Challenges Did SBEs Face in Implementing the Evaluation Techniques?
5.3 What Did SBEs Consider to Be Important Aspects in Security Evaluation of CBIs?
6 Conclusions and Limitations
References
Healthcare Information Systems
Hospital Information Systems: Measuring End-User Satisfaction
Abstract
1 Introduction
2 Theoretical Background
3 Methodology
4 Results and Discussion
5 Conclusion
References
Performance Evaluation of ANOVA and RFE Algorithms for Classifying Microarray Dataset Using SVM
Abstract
1 Introduction
2 Materials and Methods
2.1 Dataset Used for Analysis
2.2 Experimental Methodology
2.3 Analysis of Variance (ANOVA)
2.4 Recursive Feature Elimination (RFE)
2.5 Classification
2.6 Support Vector Machine (SVM)
3 Related Works
4 Results
5 Conclusion
References
Telemedicine in Shipping Made Easy - Shipping eHealth Solutions
1 Introduction
1.1 Telemedicine – Definition, Applications and Operations
1.2 Telemedicine and the Maritime Industry
1.3 Issues Arising from Storing and Transferring of Data
1.4 Limitations and Weaknesses of Existing Systems
1.5 Medical Data Encryption
1.6 Presentation of the New e-Health and m-Health System Designed for Use on Marine Vessels
2 Description
3 e-Health and m-Health: Practical Applications
3.1 Kit Presentation
3.2 Drivers and Encryption Process Presentation
4 Conclusions
References
Information Systems Security and Information Privacy Protection
Game-Based Information Security/Privacy Education and Awareness: Theory and Practice
Abstract
1 Introduction
2 Theories and Approaches for Motivated Learning
2.1 Framework for Gamification and Game-Based Learning
2.2 Novel Theories (Game-Based) for Information Security/Privacy Learning
3 Challenge-Based and Gamification-Based Tools for Computer Security Education and Awareness
3.1 Capture the Flag (CTF) Platforms and Cyber Ranges
3.2 Serious Games and Computer Games Integrating Educative Context
3.3 Tabletop Games
3.4 Alternate Reality Games (ARG)
3.5 Puzzle/Interactive Books
3.6 Escape Rooms
4 Conclusions
References
Big Data Analytics in Healthcare Applications: Privacy Implications for Individuals and Groups and Mitigation Strategies
Abstract
1 Introduction
2 Background: Applications of Big Data in Healthcare and Privacy Issues
3 Privacy Challenges in the Healthcare Context
3.1 Case Study: Fighting Against COVID-19 Pandemic with Big Data
4 Privacy Threats for Individuals and Groups
5 Privacy-Preserving Techniques
6 Discussions and Conclusions
References
A Multiple Algorithm Approach to Textural Features Extraction in Offline Signature Recognition
Abstract
1 Introduction
2 Related Work
3 Proposed Method
3.1 Signature Image Filtering
3.2 Signature Image Cropping
3.3 Signature Image Resizing
4 Features Extraction
4.1 Local Binary Pattern
4.2 Grey Level Co-occurrence Matrix
5 Matching
6 Experimental Result
6.1 MYCT Dataset
6.2 GPDS Dataset
7 Conclusion
References
Modified Least Significant Bit Technique for Securing Medical Images
Abstract
1 Introduction
2 Related Works
3 Material and Method
3.1 Proposed Method
3.2 Materials
3.3 Proposed Method Algorithms
4 Results and Discussion
4.1 Embedding Phase of the System
4.2 Extracting Phase of the System
5 Qualitative Evaluation Metric
5.1 Comparative Evaluation
6 Conclusion
References
A New Text Independent Speaker Recognition System with Short Utterances Using SVM
Abstract
1 Introduction
2 Support Vector Machines
2.1 Linear Support Vector Machines
2.2 Non-linear Support Vector Machines
2.3 Kernel Support Vector Machines
3 Related Works
4 Experiments
4.1 Test Database
4.2 Acoustic Features
4.3 SVM Systems
5 Results and Discussion
6 Conclusions and Perspectives
References
Innovative Research Projects
Artificial Intelligence for Air Safety
Abstract
1 Introduction and Applications of AI in Aviation
2 Research Methodology
3 Air Safety
4 Classification of Air Accidents
5 Analysis of Air Accidents
6 Potential of Artificial Intelligence in Air Safety
7 AI Based Smart Cockpit Assistant
8 Cost of Accidents
9 Conclusions
References
A Creative Information System Based on the SCAMPER Technique
Abstract
1 Introduction
2 Research on Creativity
2.1 SCAMPER Technique
2.2 Creative Information System
3 Information System Architecture for the SCAMPER Technique
4 Discussion
5 Conclusion
References
Using Knowledge Graphs and Cognitive Approaches for Literature Review Analysis: A Framework
Abstract
1 Introduction
2 Literature Review Process Challenges
2.1 Accessibility to Scientific Databases
2.2 Bias of Scientific Databases
2.3 Inefficient Search and Retrieve Algorithms
2.4 Human Cognitive Limitations
2.5 Approachability of New Ideas
3 Why to Reuse Thematic Codes?
4 Theoretical Lens
5 Literature Review
5.1 Gap in Literature
6 Research Methodology
7 The Proposed Framework
7.1 The User Interface
7.2 The Controlling System
7.3 The Code Project Repository
8 Implementation
8.1 Building the Framework Components
8.2 Illustrative Scenario
9 Discussion and Conclusion
References
IT Governance and Alignment
The Influence of Cloud Computing on IT Governance in a Swedish Municipality
Abstract
1 Introduction
2 Research Background
2.1 Cloud Computing Service Models
2.2 IT Governance Framework
2.3 Cloud Computing Influence on IT Governance
2.4 Research Conceptual Framework
3 Research Methodology
4 Results
4.1 IT Governance Structures, Processes and Relational Mechanisms in the Swedish Municipality
4.2 SaaS Influence on IT Governance Structure, Processes and Relational Mechanisms in the Swedish Municipality
5 Conclusions
References
Cultural Barriers in Digital Transformation in a Public Organization: A Case Study of a Sri-Lankan Organization
Abstract
1 Introduction
2 Research Background
2.1 Culture and Barriers in Digital Transformation
2.2 The Importance of Digital Transformation in Public Organizations
2.3 Factors Affecting Digital Transformation Identified in Research Literature
3 Research Methodology
4 Results and Discussion
5 Conclusions
Acknowledgements
References
Strategic Alignment During Digital Transformation
Abstract
1 Introduction
2 Prior Studies
2.1 Digital Transformation
2.2 Strategic Alignment in the Digital Transformation Era
2.3 Conceptual Research Framework
3 Research Methodology
4 Results and Discussions
4.1 The Case Organisations
4.2 Digital Transformation- and Strategic Alignment Maturity
4.3 Determinant Factors for Strategic Alignment in the Digital Transformation Era
5 Conclusion
References
Management and Organisational Issues in Information Systems
A Chief Information Officer (CIO) Framework for Managing the Fourth Industrial Revolution (4IR): An Exploratory Research Synthesis
1 Introduction
2 Methodology
3 Research Synthesis
3.1 CIO Roles and Capabilities not Directly Related to the 4IR
3.2 4IR Themes Relevant to CIO Roles and Capabilities
3.3 CIO Framework for Managing the Fourth Industrial Revolution (4IR)
4 Conclusion
References
A Change and Constancy Management Approach for Managing the Unintended Negative Consequences of Organizational and IT Change
1 Introduction
2 Relevant Literature
3 Methodology
3.1 Philosophy, Methodological Choice and Strategy
3.2 Data Selection and Collection
4 Findings
4.1 Respondent Characteristics
4.2 Perceptions of Change and Constancy
4.3 Success Rates of Large Organizational and IT Changes
4.4 Unintended Negative Consequences of Large Organizational and IT Changes
4.5 Actively Managing Both the Organizational and IT Aspects that Are Intended for Change and Those not Intended for Change
4.6 Interdependence of Large Organizational and IT Changes
5 Conclusion
References
Evaluating the Impacts of IoT Implementation on Inter-organisational Value Co-creation in the Chinese Construction Industry
Abstract
1 Introduction
2 Literature Review
2.1 Internet of Things (IoT)
2.2 Supply Chain Collaboration (SCC)
2.3 Inter-organisational Value Co-creation (VCC)
2.4 IoT Implementation and Inter-organisational VCC
3 Conceptual Framework and Hypothesis
3.1 IoT Implementation and Competency Alignment (CA)
3.2 IoT Implementation and Behavioural Alignment (BA)
3.3 IoT Implementation and Process Alignment (PA)
3.4 IoT Implementation and Congruence of Expectations (CE)
4 Methodology
5 Findings
5.1 Reliability Analysis and Results
5.2 Correlation Analysis, Regression Analysis and Discussion
5.2.1 IoT Implementation and Competency Alignment
5.2.2 IoT Implementation and Behavioural Alignment
5.2.3 IoT Implementation and Process Alignment
5.2.4 IoT Implementation and Congruence of Expectation
6 Conclusion, Implications and Directions for Future Research
References
Enhancing Decision-Making in New Product Development: Forecasting Technologies Revenues Using a Multidimensional Neural Network
Abstract
1 Introduction
2 Literature Review
3 Research Design
3.1 Proposed Methodology
3.2 Neural Network Structures
4 Experimentation
4.1 Data Collection
4.2 Training, Testing and Prediction Datasets Creation
4.3 Neural Networks Implementation
4.4 Results
5 Conclusion/Discussion
References
The Effects of Outsourcing on Performance Management in SMEs
1 Introduction
1.1 Understanding the Concept of Outsourcing
2 Theoretical Framework
2.1 The Core Competencies Theory
2.2 The Transaction Cost Theory
2.3 The Social View Theory
3 Conceptual Framework
3.1 Classification, According to (Isaksson and Lantz 2015)
3.2 Classification, According to Harward (2010)
4 Discussion
4.1 Research Gaps and Expansion of Existing Literature
5 Conclusion
References
The Attitude of Consumer Towards a Brand Source: Context of UAE
Abstract
1 Introduction
1.1 Problem of the Research
1.2 Aims of the Research
1.3 Objectives of the Research
2 Literature Review
2.1 Brand Attractiveness and Customer’s Attitude
2.2 Brand Loyalty and Customer’s Attitude
2.3 Celebrity Endorsement and Customer’s Attitude
3 Related Theories and Concepts
3.1 Social Identification Theory
3.2 Functional Theory
4 Conceptual Framework and Hypotheses
5 Research Methodology
5.1 Population, Sample Size and Selection
5.2 Data Collection
5.3 Data Analysis Method
6 Discussion
6.1 Research Gaps
6.2 Expanding Existing Literature
6.3 Possible Research Questions
7 Conclusion
References
Assessing the Success of the University Information System: A User Multi-group Perspective
Abstract
1 Introduction
2 University Study-Oriented System
3 DeLone and McLean IS Success Model
4 Data and Scales Reliability
5 Comparison of USOS Success Models
5.1 Measurement Equivalence of Constructs
5.2 Comparison of Multi-group Models
5.3 Mediation Analysis
6 Conclusions and Limitations
Acknowledgements
References
IS Project Management Success in Developing Countries
1 Introduction
2 Background and Related Research
2.1 IS Project Management Success
2.2 IS Project Management Success in Developing Countries
3 Method
4 Results and Discussion
5 Conclusion
References
An Iterative Information System Design Process Towards Sustainability
1 Introduction
2 Background
2.1 Sustainability and Information System Design
2.2 Design Process
3 Proposed Design Process
3.1 Foundation of the Design Phases
3.2 Structure of the Triggers as Design Phases
4 Design Principles
4.1 Design Principles for Iterative Design Process for Sustainability
5 Discussions and Future Work
6 Conclusions
References
Extensive Use of RFID in Shipping
1 Introduction
2 Related Work
2.1 Cargo Safety
2.2 Cargo Management and Positioning
2.3 Quality Assurance
2.4 Emergency Tracking
3 RFID Technology
3.1 RFID Tags and Their Categories
3.2 RFID Readers
3.3 RFID Applications
4 RFID Applications in Shipping
4.1 Electronic Container Seal
4.2 Cargo Management and Positioning
4.3 Quality Assurance
4.4 Emergency Tracking
5 Advantages and Disadvantages
5.1 Advantages
5.2 Disadvantages
6 Conclusions
References
Author Index

Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020, ... Notes in Business Information Processing)
 3030633950, 9783030633950

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers