Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science

Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science

Evon M. O. Abu-Taieh (The Arab Academy for Banking and Financial Sciences, Jordan), Asim A. El-Sheikh (Arab Academy for Banking and Financial Sector, Jordan) and Jeihan Abu-Tayeh (The World Bank, USA)
Indexed In: SCOPUS View 1 More Indices
Release Date: March, 2009|Copyright: © 2009 |Pages: 364
DOI: 10.4018/978-1-60566-616-7
ISBN13: 9781605666167|ISBN10: 1605666165|EISBN13: 9781605666174|ISBN13 Softcover: 9781616925390
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

With continual computer advances in the information technology age, information systems have become an integral part of many disciplines. Business, medicine, geography, aviation, forensics, agriculture, even traffic lights all have one thing in common – computers.

Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science provides original material concerned with all aspects of information resources management, managerial and organizational applications, as well as implications of information technology. An advanced reference work in its field, this book is instrumental in the improvement and development of the theory and practice of information resources management, appealing to both practicing managers and academicians.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Assessing quality of e-commerce systems
  • Enhanced information retrieval evaluation
  • Ethics and economics of cyber security
  • Governing information technology
  • Hybrid artificial intelligence heuristics
  • Landmark-based shape context
  • Query similarity relevant documents methodology
  • Recognition of handwritten digits
  • Web developing firms
  • Web-based supply chain collaboration adoption
Reviews and Testimonials

This book focuses on major breakthroughs within the technological arena, with particular concentration on the accelerating principles, concepts and applications.

– Evon M. O. Abu-Taieh, Civil Aviation Regulatory Commission, Jordan
Table of Contents
Search this Book:
Reset
Editor Biographies
Evon M. O. Abu-Taieh currently holds the position of Economic Commissioner for Air Transport in the Civil Aviation Regulatory Commission-Jordan. She has a PhD in simulation and is a USA graduate for both her Master of Science and Bachelor’s degrees with a total experience of 20 years. Dr. Abu-Taieh is an author of many renowned research papers in the airline, IT, PM, KM, GIS, and AI simulation, security, and ciphering. She is the editor/author of Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science, Handbook of Research on Discrete Event Simulation Environments: Technologies and Applications, and Simulation and Modeling: Current Technologies and Applications. She is Editor-in-Chief of the International Journal of Aviation Technology, Engineering and Managementand has been a guest editor for the Journal of Information Technology Research. Dr. Abu-Taieh holds positions on the editorial board of the International Journal of E-Services and Mobile Applications, International Journal of Information Technology Project Management , and International Journal of Information Systems and Social Change. In her capacity as head of IT department in the ministry of transport for 10 years, she developed some systems like ministry of transport databank, auditing system for airline reservation systems, and maritime databank among others. Furthermore, she has worked in the Arab Academy as assistant professor, a dean’s assistant, and London School of Economics (LSE) Director. She has been appointed many times as track chair and reviewer in many international conferences: IRMA, CISTA, and WMSCI.
Asim A. El Sheikh got a BSc (honors) from University of Khartoum (Sudan), a MSc and a PhD from University of London (UK). El Sheikh worked for University of Khartoum, Philadelphia University (Jordan) and The Arab Academy for Banking & Financial Sciences (Jordan). El Sheikh is currently the dean of the faculty of information systems & technology at the Arab Academy for Banking & Financial Sciences. El Sheikh’s areas of research interest are computer simulation and software engineering.
Jeihan Abu-Tayeh attended school at the Rosary School in Amman, then she acquired her bachelor's in Pharmaceutical Science and Management from Al-Ahlyya Amman University. Furthermore, in 2002, she got her MBA with emphasis on “International Marketing & Negotiations Technique”, with outstanding GPA of 3.87 out of 4 (with honors) from Saint Martin’s College, State of Washington; USA. Currently, Jeihan Abu-Tayeh is a Head of the International Agencies & Commissions Division at the Jordanian Ministry of Planning and International Cooperation. In her capacity, she has the opportunity to maintain sound cooperation relations with the World Bank Group, as well as the UN Agencies, in order to extend to Jordan financial and technical support for developmental projects through setting appropriate programs and plans, building and improving relations with those organizations. This is achieved through loans and aids programs, by means of designing project proposals, conducting Problem & Needs Assessment for the concerned governmental and non-governmental Jordanian entities, followed by active participation in extensive evaluation processes, conducted by either the UN Country Team, or the World Bank Group Country Team.
Editorial Review Board
  • Walter Cazzola, University of Milano, Italy
  • David Gamez, University of Essex, UK
  • Gerrit K. Janssens, Hasselt University - Campus Diepenbeek, Belgium
  • Terry T. Kidd, University of Texas Health Science Center, USA
  • Alexander Kolker, Children’s Hospital of Wisconsin, USA
  • Mohamed Marzouk, Cairo University, Egypt
  • Istvan Molnar, Bloomsburg University of Pennsylvania, USA
  • Roberto Revetria, University of Genoa, Italy
  • Sabah Mohammed Abutayeh, Housing Bank, Jordan
  • Jari Salo, University of Oulu, Finland
  • Hessam S. Sarjoughian, Arizona State University, USA
  • Petros Theodorou, Athens University of Economics & Business, Greece
  • Andreas Tolk, Old Dominion University, USA
  • Peer Review Process
    The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
    Ethics & Malpractice
    IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.

    Preface

    In the information technology age coupled with computer advances, the information systems have become an integral part of many disciplines; accordingly, business, marketing, medicine, communication, banking, geography, physics, chemistry, aviation, pilots, forensics, agricultural, even traffic lights have one thing in common called computers. Interdisciplinary Information technology systems are called different names: Decision Support Systems (DSS), Geographic Information Systems (GIS), Knowledge Management Systems (KM), Management Information Systems (MIS), Data Mining (DM), Simulation and Modeling (SM), Artificial Intelligence (AI) etc. All the aforementioned systems are based on computer science whether that may be in terms of; hardware, software, software engineering, and hardware engineering. The goal of this book is not to look at computer science from traditional perspectives, but to illustrate the benefits and issues that arise from the application of computer science within other disciplines. This book focuses on major breakthroughs within the technological arena, with particular concentration on the accelerating principles, concepts and applications.

    The book catered to the needs of scholars, PhD candidates, researchers, as well as, graduate level students of computer science, operations research, and economics disciplines. The target audience for this book also includes academic libraries throughout the world that are interested in cutting edge research. Another important segment of readers are students of Master of Business Administration (MBA) and Master of Public Affairs (MPA) programs, which include information systems components as part of their curriculum. To make the book accessible to all, a companion website was developed that can reached through the link (http://www.computercrossroad.org/). As such, computer science has cross cutting edge along with many disciplines, whether that may be geography, linguistics, hand writing, security and the web industry, communications, Knowledge management and simulation. Within this context, this book is organized in 16 chapters. On the whole, the chapters of this book fall into five categories, while crossing paths with different disciplines, of which the first concentrates on Artificial Intelligence technology, while the second concentrates on Security: Interior, Exterior, and Security Standards, whereas the third section concentrates on web based industry: assessing quality, web engineering, and critical success factors, in addition to the fourth section that sheds light on computer science implementation in the business arena: aviation industry, learning organizations, multimedia, communications, banking, construction. The Fifth section is suggested readings of different authors. Aiming to enrich this book with others knowledge, experience, thought and insight.

    Chapter I, Hybrid Artificial Intelligence Heuristics and Clustering Algorithm for Combinatorial Asymmetric Traveling Salesman Problem, develops a set of meta-heuristics Genetic algorithms (GA), Simulated Annealing (SA) and Hybrid GA-SA to solve a variant of combinatorial optimization problem called Asymmetric Traveling Salesman Problem. The set of met heuristics is compared with clustering based heuristic and the results are encouraging.

    Chapter II, An Enhanced Text-Classification-Based Arabic Information Retrieval System, presents enhanced, effective and simple approach to text classification. The approach uses an algorithm to automatically classifying documents. The effects of the Arabic text classification on Information Retrieval have been investigated.

    Chapter III, Landmark-based Shape Context for Recognition of Handwritten Digits, introduces a new handwriting methodology based on landmark shapes. The primary contribution is a robust and simple algorithm for finding correspondence between handwritten digits using a variant of shapes. In this chapter, an approach to recognizing handwritten digits based on shape similarity computed through landmark-based shape context is presented. Shape context based object recognition being an iterative process; the reduction in the number of sample points provides a basis for faster recognition. Chapter IV, Enhanced Information Retrieval Evaluation between Pseudo relevance feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text, introduces an Enhanced Information Retrieval Evaluation between Pseudo relevance feedback and Query Similarity Relevant Documents Methodology Applied on Arabic Text. The new method uses global feedback information for query expansion in contrast to local feedback information.

    The second section concentrates on security: interior, exterior, and security standards, where it is covered in chapter five through seven as follows:
    Chapter V, New Technique to Detect CNP Fraudulent Transactions, presents comprehensive frameworks that mines and detect fraudulent transactions of Card-Not-Present (CNP) in the e-payment systems with a high degree of accuracy. The motivation for a comprehensive framework is that money in the e-commerce network is really bits and bytes. Which in turn, make digital crime within banking and financial systems happen very fast and may cost billions of dollars each year-undetected and unreported. Chapter VI, Key Topics in the Ethics and Economics of Cyber Security, studies key topics in a nascent literature on a cyber security. The chapters first concentrate on how inducements influence the major topics in information security. Three significant topics pertinent for a cyber security concerns are: an exterior security, the internet consequence and information sharing which make effect in the information security. The budding literature has started to study the relationships between vulnerability revelation, patching, manufactured goods prices and profits.

    Chapter VII, Using Maturity Model to Govern Information Technology Empirical study applied on the Jordanian Industrial Companies, introduces the COBiTs’ maturity model as a mean of studying the information technology (IT) governance and its affect on the perceived Security Threats. It argues that IT governance using the maturity model offers a probable influence on the level of security breaches frequency; such evidence would be extracted through a complex quantitative and qualitative approach, offers a better understanding of intricate relationships between different factors. Moreover, the authors aimed at understanding the influence of using the maturity model will not only inform the researchers of a better design for IT governance and defining implementation pitfalls, but also assist in the understanding of IT governance practices trend in the Jordanian environment.

    The third part of the book concentrates on web based industry: assessing quality of, web engineering, and critical success factors. The chapters eight through ten cover this part as follows:
    Chapter VIII, The Critical Success Factors of Web-Based Supply Chain Collaboration Adoption: An Empirical Study, identify the Critical Success Factors (CSFs) and outcomes of Web-based Supply Chain Collaboration (SCC). The study is conducted on seven manufacturing firms in Jordan that use Web systems to collaborate with supply chain members. The results showed that top management support, IT infrastructure, training and education, business processes reengineering, trust among partners, open information sharing, and performance measurement are critical factors for Web-based SCC implementation success. In addition, this study revealed that Web-based SCC implementation is positively related to supply chain relationship quality, performance effectiveness, and performance efficiency.

    Chapter IX, Web Engineering in Small Jordanian Web Development Firms: An XP based Process Model, proposes a theoretical model for small web project development and its special features in the context small web firms, which are capable of being 'tailor able' to the particular stage of organizational development of small web firms . Chapter X, A Proposed theoretical Framework for Assessing Quality of E-commerce Systems, suggests Framework for Assessing Quality of E-commerce Systems. The proposed framework consisted of new indicators that are clear, measurable, and flexible to the possibility of its application on all sites and services, regardless of the nature of the company or institution. Consequently, the proposed framework can be applied easily to evaluate the quality of any system.

    The fourth part of this book sheds light on computer science implementation in the business arena: aviation industry, learning organizations, multimedia, communications, banking, construction. The chapters eleven through sixteen will cover such topics: Chapter XI, Information technology and aviation industry: Marriage of convenience, pinpoints the affects of information technology on the aviation industry, specifically on the Airline ticket prices. The chapter first introduces the different costs that comprise the airline ticket. Then the chapter introduces the different information technology systems that are used in the aviation industry which in turn reduces the price of the airline ticket. Chapter XII, A Distributed Dynamic Channel Allocation Scheme in Cellular Communication Networks, presents a description and performance evaluation of an efficient distributed dynamic channels allocation (DDCA) scheme, which can be used for channel allocation in cellular communication networks (CCNs), such as the global system for mobile communication (GSM). The scheme utilizes a well known distributed artificial intelligence (DAI) algorithm, namely, the asynchronous weak-commitment (AWC) algorithm, in which a complete solution is established by extensive communication among a group of neighboring collaborative cells forming a pattern, where each cell in the pattern uses a unique set of channels. To minimize communication overhead among cells, a token based mechanism was introduced.

    Chapter XIII, Discovering Knowledge Channels in Learning Organization Case study of Jordan, aims to discover the knowledge channels in the learning organization in Jordan. The research studied three aspects of the trusted knowledge channels: first studied the worker perspective and understanding of the TRUST issue. Second the research studied the worker perspectives of the knowledge channels, finding that the worker consider boss, colleague, and assistant as the most important sources of knowledge in the organization. Third the research studied how the organization by providing the right environment will encourage knowledge sharing.

    Chapter XIV, Performance Optimization of DWT-Based Image Watermarking Using Genetic Algorithms, applies Genetic algorithms to locate the optimal discrete wavelet transform (DWT) sub-band and the corresponding watermark amplification factor that will lead to maximum imperceptible and robustness. The motivation for such researcher is the widespread of the Internet and the continuous advancements in computer technology have facilitated the unauthorized manipulation and reproduction of original digital multimedia products. The audio-visual industry has been the main victim of such illegal reproduction, and consequently, the design and development of effective digital multimedia copyright protection methods have become necessary more than ever.

    Chapter XV, Internet Banking System in South Asian Countries – Preliminary Findings, studies internet banking systems in South Asian Countries and concentrates on Pakistan as an example. The preliminary results indicate that Pakistani banks have been successful in the introductory phase of web based banking. The authors suggest that Pakistani web based banking to move forward with a view of conducting real financial transactions and improving electronic customer relationship. The results and recommendations can be generalized to banks in developing economies, which can no longer ignore the internet as a strategic weapon and distribution channel for their services. The study had are threefold: Examine the extent to which web based banking is practiced in Pakistan; Identify barrier to Internet banking and Offer future directions for both practice and research.

    Chapter XVI, Computer Simulation of Particle Packing in Bituminous Concrete, applies particle packing simulation concepts to study aggregate structure in asphalt pavements, in conjunction with the recent advances in nondestructive imaging techniques and Discrete Element Method simulations have tremendous potential to help develop a deeper understanding of the aggregate structure in asphalt concrete, develop and optimize the various parameters that describe the aggregate structure and relate them to the performance of pavements in a scientific way. Which in turn provide s the foundations to building more durable and long-lasting pavements. The fifth section of this book is made of 3 chapters as suggested readings. In chapter XVII, Information Technology as a Service, the discussion focuses on IT as a service. The author, presents IT development, research, and outsourcing as a knowledge service; on the other hand, argues that IT as a service helps enterprises align their business operations, workforce, and technologies to maximize their profits by continuously improving their performance. Numerous research and development aspects of service-enterprise engineering from a business perspective will be briefly explored, and then computing methodologies and technologies to enable adaptive enterprise service computing in support of service-enterprise engineering will be simply studied and analyzed. Finally, future development and research avenues in this emerging interdisciplinary field will also be highlighted.

    In Chapter XVIII, The Impact of Sociocultural Factors in Multicultural Communication Environments: A Case Example from an Australian University’s Provision of Distance Education in the Global Classroom, by providing insight on the impact multiple sociocultural and communicative norms have on virtual communication, this research uses qualitative discursive analysis of case examples to examine how variance in the structure and delivery of virtual communication environments at a leading distance education university in Australia affects student satisfaction, perception, and learning outcomes. Whereas previous research fails to include a theoretical or conceptual framework, this work draws upon interdisciplinary work from the fields of sociology, education, and science and technology studies. How “cyberspace” changes interaction rituals, masks cultural norms, and alters entrenched social expectations by creating new sensitivities is discussed, along with the ramifications of variation in technological availability, competence, and expectations in global classrooms. In sum, ideas for informing change in policy, administration, and the delivery of distance education and virtual communication in global environments are discussed to equip leaders and participants with skills to foster effective communicative and interaction strategies. Chapter XIX, Adaptive Computation Paradigm in Knowledge Representation: Traditional and Emerging Applications, is survey article discusses the new paradigm of the algorithmic models of intelligence, based on the adaptive hierarchical model of computation, and presents the algorithms and applications utilizing this paradigm in data-intensive, collaborative environment. Examples from the various areas include references to adaptive paradigm in biometric technologies, evolutionary computing, swarm intelligence, robotics, networks, e-learning, knowledge representation and information system design. Special topics related to adaptive models design and geometric computing are also included in the survey.

    As mentioned earlier, this book is not meant to look at computer science from traditional perspectives, but to illustrate the benefits and issues that arise from the application of computer science within other disciplines. This book focuses on major breakthroughs within the technological arena, with particular concentration on the accelerating principles, concepts and applications. As such, through this book, the reader will conclude that computer science crosses paths with many disciplines: geography, linguistics, hand writing, security and the web industry, communications, Knowledge management and simulation. Generally the chapters of this book fall into four categories while intersecting with different disciplines. The first section of the book, chapters one through four, concentrates on Artificial Intelligence technology. The second section, chapters five through seven, concentrates on security: interior, exterior, and security standards. The third part of the book, chapters eight through ten, concentrates on web based industry: assessing quality of, web engineering, and critical success factors. The fourth part, chapters eleven through sixteen, discusses computer science implementation in the business arena: aviation industry, learning organizations, multimedia, communications, banking, construction. The fifth part of the book, chapter seventeen to nineteen are chapter of suggested readings.