Scielo RSS <![CDATA[JISTEM - Journal of Information Systems and Technology Management]]> http://www.scielo.br/rss.php?pid=1807-177520140003&lang=pt vol. 11 num. 3 lang. pt <![CDATA[SciELO Logo]]> http://www.scielo.br/img/en/fbpelogp.gif http://www.scielo.br <![CDATA[Editorial]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300515&lng=pt&nrm=iso&tlng=pt <![CDATA[THE IMPACT OF E-TICKETING TECHNIQUE ON CUSTOMER SATISFACTION: AN EMPIRICAL ANALYSIS]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300519&lng=pt&nrm=iso&tlng=pt Recently, internet technology is considered to be the most used information and communication technology by organizations: it can ease the process of transactions and reinforce the relation between companies and customers. This investigation empirically examines the impact of e-ticketing technique on customer satisfaction; a convenience sample of Jordanian airline passengers that had booked flights in the last 12 months through companies offering e-ticketing services was acquired. The findings indicate that customer satisfaction with e-ticketing services was influenced by all of the independent variables measured (Data security, Customer and Technical Support, and User-Friendliness) were noted to have significant impact on customer satisfaction with e-ticketing services. <![CDATA[DETERMINING FACTORS OF BANK EMPLOYEE READING HABITS OF INFORMATION SECURITY POLICIES]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300533&lng=pt&nrm=iso&tlng=pt This paper seeks to answer the question 'What factors determine bank employee reading habits of security policies? Using the chi-square test, this research analyses the reading habits of bank staff to ascertain whether there is significant difference in their reading habits with regards to the following independent variable- gender, the section of bank the employee works (whether department or branch), number of years the staff has worked with the bank and the ownership status of the bank (public, private or foreign owned). In addition, logistic regression was employed to determine the predictors of these reading habits. This paper adopts a quantitative research methodology to study the information security reading habits of 136 Ghanaian bank staff from various banks and concludes that bank staffs working in departments are more likely to regularly read their banks policies than employees working in a branch. This paper also shows that there is statistical significant difference in reading habits with regards to the number of years an employee has worked with the bank. The paper finally shows that there is no statistical significant difference in security reading habits with regards to gender and ownership status of the bank. The logistic regression analysis also reveals that a respondent in a department is 4.4 times more likely to read the security policies relative to those in a branch. The analysis also concludes that , respondents who have worked for less than 5 years were less likely to read the policy relative to those who have worked more than 5 years (OR=.51) <![CDATA[THE CASE OF INCA´S NATIONAL TUMOR BANK MANAGEMENT SYSTEM IN BRAZIL]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300549&lng=pt&nrm=iso&tlng=pt Information Technologies can provide the basis for new directions in cancer research, supplying tools that identify subtle but important signs from the analysis of clinical, behavioral, environmental and genetic data. The purpose of this paper is to describe and analyze the system developed for managing Banco Nacional de Tumores (SISBNT) - National Tumor Bank System - highlighting its role in the technological innovation of Instituto Nacional do Câncer (INCA) - Brazilian National Cancer Institute. It is a qualitative empirical theoretical paper, descriptive and exploratory in nature, based on the single case study method and on participant observation. The results show the importance of good practices in information management for the full operation of a biobank in a research-oriented pharmaceutical company. There is also evidence that the implementation of SISBNT has contributed to the improvement of cancer treatment quality and to the support of efforts towards the organization of the integration of clinical, translational and basic research. The non-use of data mining techniques for the identification of molecular patterns and structures associated with the different types of cancer undergoing study at INCA seems to occur due to the early stage of Bioinformatics and translational research, as well as the National Tumor Bank, in the institution. <![CDATA[CONTEXT MANAGEMENT: TOWARD ASSESSING QUALITY OF CONTEXT PARAMETERS IN A UBIQUITOUS AMBIENT ASSISTED LIVING ENVIRONMENT]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300569&lng=pt&nrm=iso&tlng=pt This paper provides an approach to assessing Quality of Context (QoC) parameters in a ubiquitous Ambient Assisted Living (AAL) environment. Initially, the study presents a literature review on QoC, generating taxonomy. Then it introduces the context management architecture used. The proposal is verified with the Siafu simulator in an AAL scenario where the user’s health is monitored with information about blood pressure, heart rate and body temperature. Considering some parameters, the proposed QoC assessment allows verifying the extent to which the context information is up-to-date, valid, accurate, complete and significant. The implementation of this proposal might mean a big social impact and a technological innovation applied to AAL, at the disposal and support of a significant number of individuals such as elderly or sick people, and with a more precise technology. <![CDATA[PROPOSIÇÃO DE UM PORTAL DE EGRESSO (ALUMNI) BASEADO EM BENCHMARKING E PROCESSO INOVADOR]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300591&lng=pt&nrm=iso&tlng=pt A common concern in institutions of higher education is to keep its former students involved with academic activities. It is a consensus that one of the most valuable assets of universities is their alumni, given that their accomplishments ensure more exposure for the university. In recent years, universities have encouraged a movement toward the establishment of alumni associations, as they provide networking opportunities and contact between the university and the alumni or among the alumni. An association that seeks membership and participation of its alumni should invest in the development of an attractive portal. In this sense, this research aims to analyze the portal of alumni associations of well-ranked universities, using a benchmarking process and a creative technique called SCAMPER. We also present a portal prototype that meets the current needs of the market.<hr/>Uma preocupação comum em Instituições de Ensino Superior (IES) é manter o aluno formado ligado às atividades acadêmicas, pois é consenso que um dos ativos mais valiosos das universidades é o seu egresso (alumni), já que suas ações práticas garantem mais visibilidade à universidade. Nos últimos anos, percebe-se um movimento das IES no sentido de incentivar a criação de associações de alumni, pois elas propiciam oportunidades de networking e manutenção do contato entre IES e alumni ou alumni entre si. Uma associação que busque adesão e participação de seus alumni deve investir no desenvolvimento de portal atrativo, contemplando informações que despertem o interesse do público-alvo. Esta pesquisa se propõe a analisar o portal de associações de alumni de universidades bem avaliadas, por meio de benchmarking e de um processo inovador denominado SCAMPER. Ao final, apresenta-se a um protótipo de portal de egresso que atenda as atuais necessidades do mercado. <![CDATA[ENVIRONMENTAL SCANNING, STRATEGIC BEHAVIOR AND PERFORMANCE IN SMALL COMPANIES]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300611&lng=pt&nrm=iso&tlng=pt This paper’s theme lies in the interaction between the organizational strategy and the environment of small companies and aims to analyze the relation between the scanning of environmental information, strategic behavior and performance. As a research method, the survey-type quantitative approach was used. The application of questionnaires and data analysis were also used alongside this method, using correlations and analysis of variance to verify the differences among companies classified as prospector, analyzer and defender, in their scanning efforts and use of information sources. The main results show that prospectors scan data from the competition as well as technological aspects and access written sources of information and internal sources of information more frequently than those that adopt another type of strategic behavior. Overall, the scanning of information sources was more associated with the performance than with the strategy measured by the strategic behavior typology. <![CDATA[ARCHITECTURE OF AN ELECTION-ORIENTED BUSINESS INTELLIGENCE SYSTEM]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300629&lng=pt&nrm=iso&tlng=pt Le processus de prise de décision électorale est un processus complexe. Que ce soit pour les électeurs, ou bien pour les partis politiques. L'intégration de l'informatique décisionnelle dans ce processus peut devenir une des clés importantes, qui peut offrir un appui et apporter une amélioration dans les prises de décisions électorales. La présente investigation a porté une attention particulière sur l'intégration de l'informatique décisionnelle dans le processus électoral, en s'inspirant du modèle IMC, et sur la base de l'informatique nuageuse. La présente conception architecturale propose la définition de quatre importants niveaux décisionnels. Ces niveaux prennent en compte le maximum de facteurs qui peuvent influencer la réussite du processus décisionnel électoral.<hr/>The election decision-making process is very complex, whether to voters or to political parties. The integration of business intelligence into this process may become one of the key elements that support and improve the election decision-making process. This research paid special attention to the integration of business intelligence into such a process. It is inspired by the IMC model and based on cloud computing. This structural concept offers a definition to the four important levels of decision. These levels take into account the maximum number of factors that may influence the success of an election process. <![CDATA[THE PATENT INFORMATION FOR THE OIL & GAS INDUSTRY: CASE STUDY OF DRILL BITS DESIGN AND OPTIMIZATION BY REVERSE ENGINEERING]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300645&lng=pt&nrm=iso&tlng=pt Le but de cet article est de montrer les résultats d'une étude réalisée initialement pour le compte d'une Entreprise Publique Algérienne ENSP (Direction Fabrication / ex-ALDIM), spécialisée dans la fabrication des outils de forage, afin d'évaluer les opportunités d'innovation offertes par l'utilisation du reverse engineering assisté par l'information brevet dans l'industrie pétrolière. Cette recherche appliquée, basée principalement sur l'information utile et actionnable, est couronnée par la mise en place d'un processus dynamique et évolutif de fabrication des outils de forage qui s'appuie sur un processus d'apprentissage continu par la pratique. Nous mettrons en perspective le processus cognitif permettant la capitalisation des connaissances lors du processus technique du reverse engineering ainsi que la contribution de l'information brevet dans le suivi des é...<hr/>The aim of this paper is to show the results of a study originally conducted for an Algerian State-Owned Company ENSP (Manufacturing Branch / formerly ALDIM) specialized in drill bits manufacturing. We show innovation opportunities offered by the use of reverse engineering assisted by patent information in the oil industry. This applied research, mainly based on the useful and actionable information, is crowned by the implementation of a dynamic and evolving process of drilling tools production and based on a continuous process of practical learning. We outline the cognitive processes for knowledge capitalization during the technical process of reverse engineering and the contribution of patent information in a technology development survey, identifying promising valuable technologies in the field of drill bits design and manufacturing. We conclude with tangible results by exposing performance obtained by a drill bit manufactured by ENSP (formerly ALDIM) according to the process described in this paper, while drilling an oil well in the region of Hassi Berkine (Algeria). <![CDATA[STANDARDIZATION INITIATIVES IN THE PRODUCTION OF VIRTUAL LEARNING OBJECTS]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300677&lng=pt&nrm=iso&tlng=pt Contemporary training processes have been identified in TIC and virtualization, key strategies to strengthen training. This process is mediated through the production of digital content for learning purposes, which is a development that requires standards to take advantage factors such as reusability, scalability, and accessibility, among others. This article presents a review of the main specifications and standards that circumscribe the technological production of learning objects, such as the discussion about the selection and use of the standardization strategy defined as one of the results proposed in the research process. Review within which it is identified that, according to key features of the virtual object learning, and taking into account aspects such as communication interface, metadata and packaging, different standardization strategies are identified such as LOM, DCMI, SCORM; also, IMS is analyzed. To this purpose, we will study the classification and taxonomy of learning objects; there will be a general characterization of the major initiatives to standardize the technological production of learning objects and an analyzis of their contributions.<hr/>Los procesos de formación contemporáneos han identificado en las TIC y en la virtualización, estrategias claves para fortalecer la formación. Este proceso se ve mediado por la producción de contenidos digitales orientados al aprendizaje. Desarrollo que requiere de unos estándares que permitan aprovechar factores como reusabilidad, escalabilidad y accesibilidad, entre otros. Este artículo presenta una exploración de las principales especificaciones y estándares que circunscriben la producción tecnológica de objetos de aprendizaje, como la discusión acerca de la selección y el uso de la estrategia de estandarización definida, como uno de los resultados propuestos en el proceso de investigación. Revisión dentro de la cual se identifica que, acorde a las características claves del Objeto de Aprendizaje, y teniendo en cuenta aspectos como la interfaz de comunicaciones, los metadatos y el empaquetamiento, se identifican diferentes estrategias de estandarización, tales como LOM, DCMI, SCORM e IMS. Para tales efectos se estudiará la clasificación y la taxonomía de los Objetos de aprendizaje, se hará una caracterización general de las principales iniciativas que buscan estandarizar la producción tecnológica de los objetos de aprendizaje, se analizarán sus respectivos aportes, el trabajo a seguir y las conclusiones. <![CDATA[SEGURANÇA DA INFORMAÇÃO DE PRODUÇÃO E OPERAÇÕES: UM ESTUDO SOBRE TRILHAS DE AUDITORIA EM SISTEMAS DE BANCO DE DADOS]]> http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752014000300717&lng=pt&nrm=iso&tlng=pt Special care should be taken to verify the integrity and to ensure that sensitive data is adequately protected. One of the key activities for data loss prevention is anaudit. And in order to be able to audit a system, it is important to have reliable records of its activities. Systems that store critical data, whether financial or productive, must have features such as audit log, also called audit trail, which records all activities on critical data. This allows to identify harmful actions that can be internal or external, intentionally or unintentionally caused. Therefore, this paper presents major studies in security audit trail (audit log), especially records of logs, and it presents what is available in terms of commercial tools and what they offer.<hr/>Special care should be taken to verify the integrity and to ensure that sensitive data is adequately protected. One of the key activities for data loss prevention is anaudit. And in order to be able to audit a system, it is important to have reliable records of its activities. Systems that store critical data, whether financial or productive, must have features such as audit log, also called audit trail, which records all activities on critical data. This allows to identify harmful actions that can be internal or external, intentionally or unintentionally caused. Therefore, this paper presents major studies in security audit trail (audit log), especially records of logs, and it presents what is available in terms of commercial tools and what they offer.