Volume 6 Issue 2
Volume 6 Issue 2
Editorial
We are happy to present the second issue of the sixth volume of Indore Management
Journal (IMJ). This is a special issue focusing on the domain of information technology
and management. Information technology is cutting across all the disciplines of
management studies in various ways. The present issue has tried to explore various
emerging topics of information technology and management along with its interaction
with real world applications.
This issue has various papers on contemporary topics of information technology
and management. Big Data is emerging as an important area for management
professionals. First article has discussed the various facets of Big Data and its
relevance in the present scenario. The article is supplemented by a HR practitioners'
view on Big Data. Technology acceptance is playing an important role for several
business models. Various technology acceptance models have been reported in the
second article. Social media has emerged as an important platform for expression
of views and likings of individuals. The third article has investigated the role of
self-disclosure for participating in social networking platforms. Besides that there
is also one article on e-Government services. Last article has discussed the role of
smart devices and its linkages with data mining.
We have also included three book reviews that are highly contemporary and useful
to manifest the importance of information technology and systems management.
We are confident that the articles presented in this issue will be useful to current
management researchers and practitioners.
Editorial Team
Indore Management Journal (IMJ)
IMJ
69
CONTENTS
EDITORIAL
1
15
17
30
39
47
56
Think Bigger: Developing a Successful Big Data Strategy for your Business
Shweta Grover
59
63
IMJ
ii
1. Introduction
Volume 6 Issue 2
Volume 6 Issue 2
Volume 6 Issue 2
2.
Volume 6 Issue 2
Volume 6 Issue 2
3.
Volume 6 Issue 2
3.1 Challenges
Volume 6 Issue 2
Volume 6 Issue 2
4.
Volume 6 Issue 2
and so on.
On the human development index front, monitoring of
diet and health data (including disease spread and
5.
10
Volume 6 Issue 2
6.
References
Abowd, John M. and Lane, Julia. (2004). New Approaches
to Confidentiality Protection: Synthetic Data, Remote
Access and Research Data Centers. English. In: Privacy
in Statistical Databases. Ed. by Josep Domingo-Ferrer and
Vicenc Torra. Vol.3050.Lecture Notes in Computer
Science. Springer Berlin Heidelberg, pp.282- 289. ISBN:
978-3-540-22118-0. DOI: 10.1007/978-3-540-259558_22. URL: http://dx.doi.org/10.1007/978-3-540-259558_22.
Conclusion
11
Volume 6 Issue 2
Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance
and challenges of big data research. Big Data Research
(In press).
12
Volume 6 Issue 2
Ruths, Derek and Jrgen Pfeffer. (2014). Social media for large
studies of behavior.In: Science 346.6213, pp.1063-1064.
DOI:10.1126/science.346.6213. 1063.eprint: http://
www.sciencemag.org/content/346/6213/1063. full.pdf.
URL: http://www.sciencemag.org/content/346/6213/
1063.short.
Podesta, J., Pritzker, P., Moniz, E.J., Holdren, J., & Zients,
J. (2014). Big Data: Seizing Opportunities, Preserving
Values. Tech. rep. Executive Office of the President. URL:
http://www.whitehouse.gov/ sites/default/files/docs/
big_data_privacy_report_may_1_ 2014.pdf.
IMJ
13
Volume 6 Issue 2
IMJ
14
Viewpoint
Volume 6 Issue 2
15
Debolina Dutta
Volume 6 Issue 2
IMJ
16
Debolina Dutta
1.
Introduction
2.
Research Methodology
17
Volume 6 Issue 2
3.
A. Diffusion of Innovation Theory (Roger, 1960): Research in diffusion can be traced back to the epic work
by Everett Roger's in 1960 named as the Diffusion
of Innovation Theory which has been widely applied
by the researchers over the years.
The main idea of the theory is that there are four
elements that influence the spread of a new idea: the
innovation, communication channels, time and social
system. The process of diffusion consists of five
stages, namely, knowledge, persuasion, decision,
implementation, and confirmation. It results in six
categories of users: innovators, early adopters, early
majority, late majority, laggards and the leapfroggers. The theory can be depicted as shown in
Figure 1.
18
Volume 6 Issue 2
IMJ
19
Volume 6 Issue 2
Definition
Attitudes
Subjective
norms
Behavioural
intention
Construct
Definition
Perceived
Behaviour
Control
20
Volume 6 Issue 2
Definition
Theoretical Background
Perceived usefulness
21
Volume 6 Issue 2
Definition
Job-fit
"The extent to which an individual believes that using a technology can enhance the
performance of his or her job."
Complexity
Long-term
consequences
Affect Towards
Use
Social Factors
Facilitating
Conditions
"Provision of support for users of PCs may be one type of facilitating condition that can
influence system utilization."
IMJ
22
Volume 6 Issue 2
23
Volume 6 Issue 2
Definition
Theoretical Background
Subjective Norm
Voluntariness
and Compliance
with Social
Influence.
Image
Job relevance
Output quality
Result
Demonstrability
24
Volume 6 Issue 2
Definition
Moderators
Performance
expectancy
Performance expectancy is
defined as the degree to
which an individual believes
that using the system will
help him or her to attain
gains in job performance.
Gender, Age
Effort
expectancy
Gender, Age,
Experience
Social influence
Gender, age,
voluntariness and
experience
Facilitating
conditions (no
effect on use
intention but
direct effect on
use behaviour)
25
Volume 6 Issue 2
Definition
Behavioral
intention
Behavioral intention is defined as "a person's subjective probability that he will perform
some behavior" (Fishbein and Azjen 1975, p. 288).
System use
System use is defined as the frequency, duration, and intensity of an employee's interactions
with a particular system (Venkatesh et al. 2003).
Facilitating
conditions
Network density
Network density describes the connectedness of a network and is defined as the actual
number of ties in a network as a proportion of the maximum possible number of ties.
Network
centrality
Valued network
centrality
Valued network centrality refers to peers' perceptions of the level of system-related resources
controlled by a focal employee.
Valued network
density
Valued network density refers to the connectedness of a focal employee to others, weighted
by the perceived strength of the tie and control of system-related information (such as
system features, upcoming releases, demo dates), knowledge (such as tips and tricks, short
cuts, process sequences), and other tangible resources (such as training resources, manuals,
tutorials) that are needed for effective use of a system.
26
Volume 6 Issue 2
Theory/Model
Developed By
1960
Diffusion of
Innovation Theory
Everett Roger
1975
Theory of Reasoned
Action
1985
Theory of Planned
Behaviour
Ajzen
1986
Affect, anxiety.
1989
Technical Adoption
Fred D Davis
1991
The Model of PC
Utilization
Thompson et al.
1992
Davis et al.
2000
2003
Unified Theory of
Acceptance and Use of
Technology (UTAUT)
Venkatesh et al.
2009
Model of Acceptance
with Peer Support
(MAPS)
Sykes et al.
5. Conclusions
27
Volume 6 Issue 2
References
Compeau, D. R., & Higgins, C. A. (1995). Computer selfefficacy: Development of a measure and initial test.
MIS quarterly, 19(2), 189.
28
Volume 6 Issue 2
Simon, S., Kaushal, R., Cleary, P., Jenter, C., Volk, L., Poon,
E., Oray, E.,Lo, H., Williams, D.& Bates, D. (2007).
Correlates of electronic health record adoption in office
practices: a statewide survey. Journal of the American
Medical Informatics Association, 14(1), 110-117.
IMJ
29
Manoj Das
Abstract
1.
Introduction
30
Manoj Das
Volume 6 Issue 2
Kollock (1999)
Dholakia, Bagozzi, & Pearo(2004) Purposive value ,self discovery, maintaining interpersonal connectivity,
social enhancement, and entertainment
Lakhani & Wolf (2005)
Yee (2007)
Joinson (2008)
IMJ
31
Manoj Das
Volume 6 Issue 2
2.1. Loneliness
2.
Feature
Caplan, 2005
IMJ
32
Manoj Das
Volume 6 Issue 2
33
Manoj Das
Volume 6 Issue 2
IMJ
34
Manoj Das
Volume 6 Issue 2
Bennett, S., Maton, K., & Kervin, L. (2008). The 'digital natives'
debate: A critical review of the evidence. British Journal
of Educational Technology, 39(5), 775-786.
Berger, C. R., & Calabrese, R. J. (1975). Some explorations
in initial interaction and beyond: Toward a
developmental theory of interpersonal communication.
Human communication research, 1(2), 99-112.
Bernard, S., & Perry, H. (2013). Loneliness and Social Isolation
Among Older People in North Yorkshire. Social Policy
Research Unit, University of York: York. Loneliness
Survey Team A, 3.
References
Algesheimer, R., Borle, S., Dholakia, U. M., & Singh, S. S.
(2010). The impact of customer community participation
on customer behaviors: An empirical investigation.
Marketing Science, 29(4), 756-769.
IMJ
35
Manoj Das
Volume 6 Issue 2
36
Manoj Das
Volume 6 Issue 2
Liu, C. Y., & Yu, C. P. (2013). Can facebook use induce wellbeing?.Cyber psychology, Behavior, and Social
Networking, 16(9), 674-678.
MacDonald, G., & Leary, M. R. (2005). Why does social
exclusion hurt? The relationship be-tween social and
physical pain. Psychological Bulletin, 131(2), 202-223.
Morrow, E., Ross, F., Grocott, P., & Bennett, J. (2010). A model
and measure for quality service user involvement in
health research. International Journal of Consumer
Studies, 34(5), 532-539.
Shen, C. X., Liu, R. D., & Wang, D. (2013). Why are children
attracted to the Internet? The role of need satisfaction
perceived online and perceived in daily real life.
Computers in Human Behavior, 29(1), 185-192.
37
Manoj Das
Volume 6 Issue 2
Walther, J. B., & Boyd, S. (2002). Attraction to computermediated social support. In C. A. Lin & D. Atkin (Eds.),
Communication technology and society: Audience
adoption and uses (pp. 153-188). Cresskill, NJ: Hampton
Press.
IMJ
38
Manoj Das
with limited resources, it is vital to judiciously set egovernment strategies and direct investment, giving
due consideration to the risks involved (Abdallah &
to assess the maturity level of the Jordanian egovernment program from citizens' perspective (Anas,
Hussein and Saheer, 2014). Alomari, Sandhu & Woods
1.
IMJ
Introduction
39
Volume 6 Issue 2
2.
3.
IMJ
Problem Statement
40
Volume 6 Issue 2
Citizen approaches dealer for registration, remits payments and signs papers
Dealer visits RTO for tax token and for generation of number for fee
Dealer takes vehicle to ground for physical verification of chassis and engine number, along with the
originals of submitted documents
4.
Research Methodology
41
Volume 6 Issue 2
6.
5.
Results
Data Collection
Table 1: Descriptive Statistics of the Samples for Transport and Non-Transport Vehicles
Average Time elapsed between
the following in days
Transport Vehicle
(N=20)
Non-Transport Vehicle
(N=20)
Mean
SD
Mean
SD
4.30
0.35
0.75
0.80
14.3
4.68
0.67
1.12
1.36
11.93
12.25
1.20
2.30
0.90
31.65
15.06
2.14
2.25
0.85
19.41
Table 2: Summary of the 't' Test Results Carried Out on Sub Processes Time Limit and the Whole Process
H.
No.
Transport Vehicle
(N=20)
tcalc
Test
Result
H1
3.15
H2
H3
Non-Transport
Vehicle (N=20)
tcalc
Test
Result
Reject
3.34
Reject
4.33
Reject
1.58
Accept
1.00
Accept
2.58
Reject
H4
0.66
Accept
0.53
Accept
H5
6.14
Reject
4.99
Reject
IMJ
42
Volume 6 Issue 2
Table 3 : Group Statistics on Time taken for Registration of Transport and Non-transport Vehicles
Time taken for registration
in days
Vehicle Type
Mean
Std. Deviation
Transport
29
7.21
4.894
.909
Non-transport
30
15.37
12.861
2.348
Table 4 : Independent Samples Test on Time Taken for Registration of Transport and Non-transport Vehicles
Levene's Test for
Equality of
Variances
F
Sig.
df
Sig. (2tailed)
Mean
Difference
Std.
95%
Error
Confidence
Difference Interval of the
Difference
Lower
4.406
.040
Equal
variances
not
assumed
-3.199
57
.002
-8.160
2.551
-13.267
-3.241
37.47
.003
-8.160
2.518
-13.259
Table 5 : Group Statistics on Time taken for Registration of Vehicles from Two Dealers
Time taken for registration
in days
Dealer
Mean
Std. Deviation
Dealer1
Dealer2
20
20
33.35
28.00
14.240
12.657
3.184
2.830
Table 6 : Independent Samples Test on Time taken for Registration of Vehicles from Two Dealers
Levene's Test for
Equality of
Variances
F
Sig.
1.579
.217
1.256
df
38
1.256 37.485
43
Sig. (2tailed)
Mean
Difference
Std.
Error
Difference
95% Confidence
Interval of the
Difference
Lower
Upper
.217
5.350
4.260
-3.274
13.974
.217
5.350
4.260
-3.278
13.978
Volume 6 Issue 2
Dealer remits details and payment through website and gets verification slot
Dealer takes vehicle to ground for physical verification of chassis and engine number, along with originals
of the submitted documents
Retrieves details from the system and verifies with submitted documents
44
Volume 6 Issue 2
7.
References
Abdallah, S., & Fan, I. (2012). Framework for e-government
assessment in developing countries: case study from
Sudan. Electronic Government, An International Journal,
9(2), 158-177.
Alawneh, A., Al-Refai, H., & Batiha, K. (2013). Measuring
user satisfaction from e-Government services: Lessons
from Jordan. Government Information Quarterly, 30(3),
277-288.
45
Volume 6 Issue 2
Axelsson, K., Melin, U., & Lindgren, I. (2013). Public eservices for agency efficiency and citizen benefitFindings from a stakeholder centered analysis.
Government Information Quarterly, 30(1), 10-22.
Taylor, N., Jaeger, P., Gorham, U., Bertot, J., Lincoln, R., &
Larson, E. (2014). The circular continuum of agencies,
public libraries, and users: A model of e-government
in practice. Government Information Quarterly, 31, S18S25.
Weerakkody, V., Irani, Z., Lee, H., Hindi, N., & Osman, I.
(2014). A review of the factors affecting user satisfaction
in electronic government services. International Journal
Of Electronic Government Research, 10(4), 21-56.
IMJ
46
1. Introduction
This paper proposes a framework to mine probable and
feasible business solutions from the enormous data
generated from Internet of Things (IoT) devices. Smart
meters are one such device which may be categorised
as initial examples of IoT's that may soon become an
integral part of households (Depuru, Wang,
Devabhaktuni, & Gudi, 2011; Greveler, Glosekotter,
Justus, & Loehr, 2012). Smart meters are capable of
transferring electrical consumption metering details of
a household on real time basis to electricity provider.
Furthermore, this meter can also transfer equipment
wise recording of the consumption pattern, in case the
house is equipped with smart devices. Due to this
capability of the smart meter, adoption time of various
smart electrical devices installed in a residence can be
IMJ
47
Volume 6 Issue 2
2. Literature Review
48
Volume 6 Issue 2
3.
49
Volume 6 Issue 2
4.
5.
Nature of Data
50
Volume 6 Issue 2
6.
Problem Definition
IMJ
51
Volume 6 Issue 2
52
Volume 6 Issue 2
7.
References
53
Volume 6 Issue 2
index.php/WS/AAAIW11/paper/viewPDFInterstitial/
3889/4212
Kadam, R., Mahamuni, P., & Parikh, Y. (2015). Smart home
system. International Journal of Innovative Research in
Advanced Engineering, 2(1), 81-86.
Kitamoto, A. (2002). Spatio-temporal data mining for Typhoon.
Journal of Intelligent Information Systems, 19(1), 25-41.
Eriksson, R., Werge, T., Jensen, L., & Brunak, S. (2014). Erratum
to?: Dose-specific adverse drug reaction identification
in electronic patient records?: Temporal data mining in
an inpatient psychiatric population. Goodreads - User
Review Google Book Preview Scimago Rank of this
journal. Drug Safety, 37(5), 379.
Fan, Z., Chen, Q., Kalogridis, G., Tan, S., & Kaleshi, D. (2012).
The power of data: Data analytics for M2M and smart
grid. IEEE PES Innovative Smart Grid Technologies
Conference Europe, 4-5. Retrieved from http://
www.scopus.com/inward/record.url?eid=2-s2.084874709434&partnerID=40&md5=e76c46b5d4
866e2bd17240510eb7e24d
IMJ
54
Volume 6 Issue 2
Wehlitz, R., Werner, A., & Franczyk, B. (2014). SMIM-A cloudbased approach for the digitisation of smart meter
installation processes. Journal of Industrial and Intelligent
Information, 2(3), 169-174. doi:10.12720/jiii.2.3.169174
Weranga, K., Kumarawadu, S., & Chandima, D. P. (2015).
Smart grid and smart metering. In Smart Metering Design
and Application (pp. 1-15). Springer Berlin Heidelberg.
IMJ
55
Volume 6 Issue 2
BOOK REVIEW
56
Shweta Grover
Volume 6 Issue 2
57
Shweta Grover
Volume 6 Issue 2
IMJ
58
Shweta Grover
Kakul Modani
[George T. Geis (2015). Semi-Organic Growth - Tactics and Strategies behind Google's success, Wiley,
Pages 240, ISBN: 978-1118933220.]
We live in a world where traditionally a company can
grow in two ways - either organically i.e. by growing
internally through increase in production or customer
base, etc. or inorganically by way of mergers and
acquisitions. Now, the Author explains to us in the book
an alternate growth path - the Semi-Organic Growth
way.
59
Kakul Modani
Volume 6 Issue 2
The book introduces the reader to new terms like Acquihire, which has been practiced by Google while making
smaller acquisitions. Acqui-hire means acquiring a
company for its talent, where technology, product, etc.
may or may not be the reason for the acquisition. The
perfect example of acqui-hire for Google is the acquisition
of Applied Semantics (ASI) which was a pre-IPO
acquisition done in April 2003. This acquisition also
imprinted Google and charted a way for its future
acquisitions.
The Author states the fact about an acquisition for
which Google paid USD 41.5 million in cash plus stock
and USD 60.9 million worth of stock options in a cash
plus stock deal for ASI. This acquisition proved to be
extremely fruitful for Google as it resulted in a massive
contribution to its advertising revenues for the years
to come. AdSense (an ASI product) contributed around
25% to Google's advertising revenues in the next decade.
This acquisition provided Google with an inclination
towards M&A activities as well as performing the M&A
activity in a certain way i.e. the semi-organic way.
Hence, the book contains an entire chapter on this
acquisition and its details in which even the problems
that Google had to go through for the semi-organic
integration of the ASI to Google are mentioned.
60
Kakul Modani
Volume 6 Issue 2
IMJ
61
Kakul Modani
Volume 6 Issue 2
IMJ
62
Kakul Modani
Suganya Balakumar
[Malcolm Frank, Paul Roehrig and Ben Pring (2014). Code Halos: How the Digital Lives of People, Things, and
Organizations are Changing the Rules of Business, Wiley, Pages 256, ISBN: 978-8126548606.]
In the evolution of the human species if Industrial
revolution were to be described as a major step; the
technology revolution can be considered as a giant leap.
This revolution has been made possible by the generation
of innumerable amount of data around us. Imagine the
vast oceans of data around every being - text messages,
every website visited, songs listened to, every click
made, Facebook likes etc.- Humongous. The arduous
task for the Code Halo (inclusive of big data) companies
is to make meaning from the colossal amounts of data,
and to apply the understanding for business strategies
and practices.
"As the authors define it: A Code Halo is the field of digital
information that surrounds any noun-any person, place, or
thing. More often than not, that virtual self can provide more
insight into-and thus generate more value from-the physical
entity alone"
63
Suganya Balakumar
Volume 6 Issue 2
64
Suganya Balakumar
Volume 6 Issue 2
IMJ
65
Suganya Balakumar
Volume 6 Issue 2
66
Suganya Balakumar
Volume 6 Issue 2
IMJ
67
Suganya Balakumar