• Home
  • اطلاعات
  • OpenAccess
    • List of Articles اطلاعات

      • Open Access Article

        1 - An Information Architecture Framework for Utilizing Social Networks in Iranian Higher Education System
        mehrab ali golshani rosta مهرابعلی  گلشنی‌روستا
        Management of social networks, has become a strategic challenge for different applications including education due to its growing importance. Enterprise Architecture (EA), uses a holistic specification of information technology functions in organizations to decrease the More
        Management of social networks, has become a strategic challenge for different applications including education due to its growing importance. Enterprise Architecture (EA), uses a holistic specification of information technology functions in organizations to decrease the complexity of using information technology and to increase its efficiency. As regards, using social networks in education in most countries of the world has not yet finished its preliminary stages, so for this reason there is no standard framework and model. The aim of this paper is to design an appropriate architecture framework for utilizing social networks in higher education system in Iran. To do this,first the concept of social networks and its applications at educational environment have been investigated.Then the concept of enterprise architecture and information architecture framework are studied, Zachman framework has been selected as the main tool and then using questionnaire the vital aspects of implementing social networks in higher education have been identified from the views of experts. The findings of study indicate the main reasons for the use of social networks in higher education (strategy), the most important actors in this field (people), the infrastructure needed (infrastructure), the data and information required in this environment (data) and also the processes required to fulfill the social network of learning (process). The main characteristic of the final framework is a presentation of a comprehensive framework for using social network in education system with attention to local considerations. Manuscript profile
      • Open Access Article

        2 - COBIT A Suitable Framework for Measuring IT Governance in Organizations
        mojtaba safari mehdi ghazanfari Mohammad Fathian
        Abstract Nowadays IT is regarded as one of the most important and strategic section in development of business that has important role in increasing competition power of banks, on the other hand IT governance is an important section in governance of banks. Key role of I More
        Abstract Nowadays IT is regarded as one of the most important and strategic section in development of business that has important role in increasing competition power of banks, on the other hand IT governance is an important section in governance of banks. Key role of IT in growth and development of banks is very clear for senior managers and the important point is strategic integrity of IT and business in banks that is first goal of IT Governance. Results of researches show that average maturity of IT Governance in governmental banks is (1, 60). Level of maturity in effective usage of IT and adaptation of strategies of business with strategies of IT in governmental banks does not have good conditions. Kind of governance in governmental banks because bank industry is not competitive issue in Iran and applying mandatory rules and regulations on bank system of Iran has caused that governmental banks will not care to using electronic commerce in their business as an strategic tool. Manuscript profile
      • Open Access Article

        3 - Designing a Fuzzy Expert System for Selecting an Appropriate Contractor in Information Technology Outsourcing
        shaban elahi nadia kalantari alireza hassanzade sara shamsollahi
        Increment of complexity and costs of information technology systems have made many problems about infrastructure and manpower for organizations which have been decreased by the use of outsourcing. All organizations try to increase the success of outsourcing projects by More
        Increment of complexity and costs of information technology systems have made many problems about infrastructure and manpower for organizations which have been decreased by the use of outsourcing. All organizations try to increase the success of outsourcing projects by using different ways. One of the important reasons for failure of these projects especially in IT area- because of its major role in acquisition of competitive advantage- is selecting inappropriate contractor. In order to existence of different and contradictive criteria, this selection is complex. The purpose of this research is to determine important criteria and specify the weights of each criterion and finally design a fuzzy expert system for selecting the best contractor in IT outsourcing. The method of knowledge acquisition from experts-which are managers and experts of IT- is a questionnaire. Also in order to evaluate the validity of system, it was used in an IT company. The results show the favorable performance of contractor selection expert system. Manuscript profile
      • Open Access Article

        4 - Analysis of the current situation ICT in rural areas of the country (using the Delphi Method)
        mohsen heidary
        Nowadays, information and communication technology as a central management tool and has been running world. The development of information and communication technology in a rural community needs accurate planning can facilitate rural development. In our country size of More
        Nowadays, information and communication technology as a central management tool and has been running world. The development of information and communication technology in a rural community needs accurate planning can facilitate rural development. In our country size of the country,s population and 40 percent of the rural population, especially in rural economic development role in national development and village lack access to facilities and urban services, which are necessary for the effective and appropriate strategies for the development and use of rural conditions of our ICT services. The main purpose of this study was to investigate the difficulties and challenges of the current status of ICTin rural area of the country. The Delphi technique has been used for this purpose. The study group consisted of 30 members expert in agricultural development, rural planning, information technology and is well aware of rural ICT. Based on results, the general problems of rural ICT development in the country are five categories, there are problems of infrastructure, education, support, social and cultural policies and planning. With regard ti the most difficult problems in the development of ICT infrastructure and rural education in the country , Therefore, policymakers and rural development is expected to overcome the problems of rural ICT infrastructure in the country to tale the necessary steps. The villagers are familiar with computers and internet courses will be held in the villages.  Manuscript profile
      • Open Access Article

        5 - An Investigation into the Provider Factors of Knowledge Management in the Kermanshah province Communication Company
        hussein moomivand
        Abstract The required factors have been investigated to apply knowledge management by carrying out the field study using staff opinions of Kermanshah Telecommunication Company in this research. After indicating the required factors of applying knowledge management, rela More
        Abstract The required factors have been investigated to apply knowledge management by carrying out the field study using staff opinions of Kermanshah Telecommunication Company in this research. After indicating the required factors of applying knowledge management, relationship between each factor of knowledge process system, organizational culture and information technology system with the knowledge management have been analyzed statistically by the obtained results using SPSS program. Kermanshah Telecommunication Company has a population of 370 staff that a sample of 77 staff has been used. It has been found that there are acceptable correlation between knowledge process system, organizational culture and information technology system with the knowledge management which correlation coefficient (R) of each relationship is 0.854, 0.915 and 0.812 respectively. There are some different between the effects of knowledge process system, organizational culture and information technology system on the applying knowledge management as the effects knowledge process system, information technology system and organizational culture are in the fist, second and third step respectively. Manuscript profile
      • Open Access Article

        6 - A new algorithm based on ensemble learning for learning to rank in information retrieval
        Azadeh Shakery elham ghanbari
        Learning to rank refers to machine learning techniques for training a model in a ranking task. Learning to rank has been shown to be useful in many applications of information retrieval, natural language processing, and data mining. Learning to rank can be described by More
        Learning to rank refers to machine learning techniques for training a model in a ranking task. Learning to rank has been shown to be useful in many applications of information retrieval, natural language processing, and data mining. Learning to rank can be described by two systems: a learning system and a ranking system. The learning system takes training data as input and constructs a ranking model. The ranking system then makes use of the learned ranking model for ranking prediction. In this paper, a new learning algorithm based on ensemble learning for learning ranking models in information retrieval is proposed. This algorithm iteratively constructs weak learners using a fraction of the training data whose weight distribution is determined based on previous weak learners. The proposed algorithm combines the weak rankers to achieve the final ranking model. This algorithm constructs a ranking model on a fraction of the training data to increase the accuracy and reduce the learning time. Experimental results based on Letor.3 benchmark dataset shows that the proposed algorithm significantly outperforms other ensemble learning algorithms. Manuscript profile
      • Open Access Article

        7 - Extracting the Information Technology architecture of hospitals with approach of Implementing in Iran
        Atefehsadat Haghighathoseini atefe haghighathosseini hossein bobarshad hadi zare
        Nowadays, smart and fast services to patients and move on to the next generation hospital are the essential parts of the health field. The production of information technology architecture for hospital organizations is the foundation of accessible smart services and pro More
        Nowadays, smart and fast services to patients and move on to the next generation hospital are the essential parts of the health field. The production of information technology architecture for hospital organizations is the foundation of accessible smart services and providing services with more speed and higher quality than the traditional systems. In this paper, the target is to present an indigenous IT architecture based on important criteria and metrics in Iranian hospitals. The TOGAf architecture is used and then it is adopted and localized for Shariati hospital based on Iran’s indigenous conditions. For this aim, expert’s views and 134 questionnaire tools are applied and the results are analyzed through suitable statistical tests. So IT architecture is designed by consisting up a conceptual model of four input and four infrastructure layer. The results show that 111 items are verified to apply to the hospital among 145 possible items. The customization framework is called the Hospital IT Architecture. The components provide the framework approved in 8 layers and 11 components can be used in hospitals to implement enterprise architecture. The proposed architecture in 8 layers and 11 components are designed and it could be applied as an indigenous reference architecture for implementation of enterprise architecture in Iranian Hospital organizations. . Manuscript profile
      • Open Access Article

        8 - A Model for impacts of Investment in IT on customer satisfaction, using Structural Equation Modeling and Path Analysis
        jafar bagherinejad behtaj rasouli
        In a research, that this paper reflects its results, a model for stating the relationship between investment in IT and customer satisfaction was developed. This study starts with extensive literature review on investment in IT and customer satisfaction. Then, a conceptu More
        In a research, that this paper reflects its results, a model for stating the relationship between investment in IT and customer satisfaction was developed. This study starts with extensive literature review on investment in IT and customer satisfaction. Then, a conceptual model with four criteria (including Economic, educational, diffusion of ICT and telecommunication) and one latent variable (indicator of customer satisfaction) were designed. This model’s primary validity was approved through expert opinion. Then, in a field study in the organization under study, the required data have been gathered for testing functional approval of the model. In the next stage of research, by using SEM techniques and interactive regression equation in the form of path analysis and using the software like SPSS and LISREL , we concentrated the factors of relationship between latent variable and observed variables. The finding of the research shows direct relationship between economic and educational factors of IT investment on customer satisfaction. Manuscript profile
      • Open Access Article

        9 - Design a Model Of System Dynamics (SD) On The Policy Of Upgrading Indices Of Iran ICT Network
        hamid honarparvaran
        In the recent years, developments in the field of information and telecommunications are pursued by major changes in different areas of human life. Human has constantly employed the technology and track record of human life is abundant with innovation in information and More
        In the recent years, developments in the field of information and telecommunications are pursued by major changes in different areas of human life. Human has constantly employed the technology and track record of human life is abundant with innovation in information and communication technologies (ICT) which are called as new or high- technology. Therefore, ICT Development Indices (IDI) are remarkably important. This research purports to design a model of system dynamics (SD) on the policy of upgrading indices of Iran ICT network. Accordingly, after investigating the IDI and mining the indices, the causal loops and flowchart are depicted through using the SD (system dynamics). The results of simulation show that the behavior of studied key variables, after performing enhancing economic growth policies, improved the quality and quantity of ICT infrastructure, social indices, the culture of employing ICT, and the technical knowledge of ICT operators and the enhancing process has accelerated. Manuscript profile
      • Open Access Article

        10 - Proposing a model for IT services based assessment approach, based on IT Governance Model
        seyyed ahmad tabatabaei skch skch
        Nowadays one of the biggest problems of IT organizations in less developed countries is paying too much attention to infrastructure and technology of organizations. This is due to the point that many managers in organizations believe that existence of IT infrastructure More
        Nowadays one of the biggest problems of IT organizations in less developed countries is paying too much attention to infrastructure and technology of organizations. This is due to the point that many managers in organizations believe that existence of IT infrastructure and technology by itself is a sign of maturity of an organization. Although technical facilities and infrastructure such as networks, hardware, software etc., is essential for providing appropriate services and optimal performance, but these features cannot provide a competitive advantage and increase the maturity of the organization. The missing link in these organizations, which have been less considered, is how to use these features to achieve organizational goals. In different areas, there are several standards and optimal methods for defining and optimizing processes. Some of the most complex models which should be considered in different units of information technology are, models and frameworks related to IT governance. IT governance focuses on implementation and management of quality of IT services so as to meet business needs. IT governance is done by service providers through an appropriate combination of people, process and information technology. The purpose of this paper is to examine different models and frameworks of IT governance models, in order to propose a framework for assessing IT services Manuscript profile
      • Open Access Article

        11 - Identification and Prioritization of Parameters Affecting Information Security Management System (Case Study: Social Security Branches of Guilan Province)
        Asadollah Shahbahrami ramin rafizadeh kasani hossein pour yousefi dargah
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation More
        Information and its protection is one of the most important pillars of survival of today's organizations. Defines and considers many ISMS implementation failures to be rooted in organizational issues and disregard for the organization's readiness prior to implementation. Therefore, assessing the situation and prioritizing information security risks and creating an overview and hierarchy of it, is important in the successful establishment of the information security system. However, in terms of dimensions, effects and various causes of security risks and considering the multiplicity of indicators and effective parameters of ISMS implementation, it is necessary to use multi-criteria decision-making models in their evaluation and ranking. . In this study, an attempt has been made to classify the factors affecting the information security management system into two groups of soft and hard factors and in order to accurately rank and focus more, especially in conditions of uncertainty that is inherent in human decision making, Fuzzy hierarchical analysis (FAHP) was performed. Based on this and with the help of a questionnaire to quantify the results, the opinions of technical experts including academic experts, managers and employees of the information technology department of social security branches in Guilan province have been used as a case study of this research. The results show that soft factors including managerial and cultural / social factors are more important than hard factors including financial and technical / technological factors in information security management system and management factors are more important than other soft factors as well as technical / technological factors. They are more important than other difficult factors. Manuscript profile
      • Open Access Article

        12 - A Framework for Identifying and Ranking Criteria for Evaluating the Quality of Electronic Services (Case studies: Golestan website of Payame-noor university)
        Hossein Babaee mahmood salehesfahani fateme noorani
        Service quality is a concept that, due to difficulties in defining and measuring the considerable debate in the literature, no general consensus, aroused. Often, customer satisfaction and service quality as a function of perceptions and customer expectations, and resear More
        Service quality is a concept that, due to difficulties in defining and measuring the considerable debate in the literature, no general consensus, aroused. Often, customer satisfaction and service quality as a function of perceptions and customer expectations, and research has shown that the quality of the services plays an important role in its profitability. The purpose of this study is to provide a framework for identifying and ranking criteria for evaluating the quality of services. The results showed that, all parameters of quality of service are important. Response Time is an important indicator of the rest. The trustiness, informativeness, ease of use, empathy and visual appeal are next important factors. The users are satisfied with the trustiness and informativeness, but not with empathy. User satisfaction is medium with response time, ease of use and visual appeal. Manuscript profile
      • Open Access Article

        13 - A Combinational Model for Evaluating Organizational Readiness for Data Warehouse Implementation by Using Analytical Hierarchical Process
        jafar bagherinejad zhinoos adibi
        Enterprise Data Warehouse initiative is a high investment project. The adoption of Data Warehouse will be significantly different depending upon the level of readiness of an organization. Before implementation of Data Warehouse system in a firm, it is necessary to evalu More
        Enterprise Data Warehouse initiative is a high investment project. The adoption of Data Warehouse will be significantly different depending upon the level of readiness of an organization. Before implementation of Data Warehouse system in a firm, it is necessary to evaluate the level of the readiness of firm. A successful Data Warehouse assessment model requires a deep understanding of opportunities, challenges and influential factors that a typical firm’s Data Warehouse (DW) may include. Actually, data warehouse system is one of Knowledge Management and Decision Support System tools. By this system, the distributed data throughout organizations could be collected, extracted and integrated and with knowledge discovery and data mining the latent data can be extracted and analyzed In this paper, after reviewing the relevant literature and a comparative analysis of assessment models for organizational readiness for implementation of Data warehouse system, a conceptual framework was designed and its validity was approved by test of hypothesis. Then, by using analytical hierarchical process technique and its expert choice software, criteria and sub-criteria of influential factors were assessed and weighted. The validity and effectiveness of the model including, six criteria and 23 sub-criteria with main influential factors named Information needs, Data structure , Organizational processes , Organizational factors ,Technical structure and Project management were approved by a field study and the relevant statistical analysis. Manuscript profile
      • Open Access Article

        14 - Provide methodology for selecting IT project management strategy
        mona jamipour Seyed Mohammadbagher Jafari marziye nasrollahi
        The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy More
        The strategic approach to project management is a new approach that has received more and more attention from business thinkers in the last decade. Having a strategic approach in the field of information technology projects requires managers to choose the right strategy in the first step of project management, taking into account several factors influencing the choice of strategy. Logical and adaptive approaches are the two dominant strategies in project management, each of which requires different tools, resources, and procedures. Despite the increase in investment in IT projects and the dependence of organizations on such technologies, still No study has been conducted to assist IT managers in choosing the appropriate strategy for such projects. Therefore, the main purpose of this study is to identify the approach of selecting the appropriate strategy in the management of information technology projects. In order to achieve this goal, in the first stage, in order to identify the factors influencing the choice of IT project management strategy, after a comprehensive review of the literature in the relevant field, the opinions of experts in the focus group have been used. In the second stage, in order to validate the extracted factors, and in the third stage, in order to weight each of the factors in selecting the two dominant logical and comparative approaches, experts are surveyed using the survey method. In the developed methodology, the factors that influence the choice of strategy are: process factors, human factors, system related factors and contextual factors. The final strategy of IT project management is obtained as a range of logical strategy and adaptive strategy Manuscript profile
      • Open Access Article

        15 - Designing a system dynamics model for upgrading policy Iran Information and Communication Technology Network Indicators
        alinaghi moslehshirazi ali mohammadi habibollah ranaei hamid honarparvaran
        In recent years, the emergence of extensive changes in the field of information and communication, has led to major changes in various fields. Humans have always used technology and the record of human life is full of the invention of information and communication techn More
        In recent years, the emergence of extensive changes in the field of information and communication, has led to major changes in various fields. Humans have always used technology and the record of human life is full of the invention of information and communication technologies, which are referred to as new or excellent technologies. Therefore, the development of information and communication technology indicators has become of considerable importance. The purpose of this study is to design a system dynamics model for policy-making to improve the characteristics of Iran's information and communication technology network. For this purpose, after examining different models of ICT indicators and extracting the mentioned indicators, cause and effect loops and flow diagrams using the system dynamics method are presented. The simulation results show that the behavior of the studied basic variables after the implementation of policies to increase economic growth, quantitative and qualitative improvement of ICT infrastructure, growth of social indicators, culture of ICT utilization and knowledge promotion The technology of ICT users has improved and their growth process has accelerated. Manuscript profile
      • Open Access Article

        16 - Extracting hospital information technology architecture with the approach of implementation capability in Iran
        hossein bobarshad Atefehsadat Haghighathoseini Hadi Zare
        Today, providing smart and fast services to patients and moving towards next generation hospitals is one of the necessities of the health field. Preparing information architecture for hospitals is a prelude to obtaining intelligent services and, as a result, providing s More
        Today, providing smart and fast services to patients and moving towards next generation hospitals is one of the necessities of the health field. Preparing information architecture for hospitals is a prelude to obtaining intelligent services and, as a result, providing services with much higher speed and quality than traditional systems. In this article, the aim was to provide a native information architecture based on important criteria and indicators in Iranian hospitals. In this article, TOGAF information technology architecture is used and then this architecture is localized according to the local conditions of Iran for Shariati Hospital. For this purpose, a 134-question questionnaire was used from the experts' point of view and it was analyzed based on appropriate statistical tests. In this article, information technology architecture was designed in the form of a conceptual model with four inputs and four infrastructure layers. The results showed that among the 134 components of TOGF information technology architecture, 104 components were approved by experts for use in the hospital. This customized framework was called Hospital Information Technology Architecture. The proposed architecture was drawn in eight layers and eleven components and can be used as a local reference architecture for the implementation of information architecture in Iranian hospitals. Manuscript profile
      • Open Access Article

        17 - Providing a model for evaluating information technology services based on an approach based on information technology governance models
        seyyed ahmad tabatabaei سید کمال  چهارسوق
        oday, one of the biggest problems of information technology organizations in less developed countries is the excessive attention of these organizations to the field of infrastructure and technology. This attention has been up to the point that many managers and organiza More
        oday, one of the biggest problems of information technology organizations in less developed countries is the excessive attention of these organizations to the field of infrastructure and technology. This attention has been up to the point that many managers and organizations consider the existence of up-to-date infrastructure and technologies as a sign of the maturity of the organization's information technology. Although the existence of appropriate technical and infrastructural facilities such as network, hardware, software, etc. is necessary to provide proper services and optimal performance, but these features cannot create a competitive advantage and increase the maturity of the organization. The missing link in these organizations, which has unfortunately received less attention, is how to use these facilities to achieve organizational goals. In different fields, there are many standards and methods for defining and optimizing processes. One of the most important sets of models that should be considered in information technology units are the models and frameworks related to information technology governance. IT governance focuses on implementing and managing the quality of IT services to meet business needs. IT governance is achieved by service providers through the right combination of people, process and IT. The purpose of this article is to examine the different models and frameworks of information technology governance in order to derive a model for the evaluation of information technology services by modeling these frameworks. Manuscript profile
      • Open Access Article

        18 - Designing a fuzzy expert system for choosing the right contractor in information technology outsourcing
        nadia kalantari nadia kalantari alireza Hasanzadeh shaban elahi
        The increase in the complexity and cost of information technology systems has created many problems for companies in the field of infrastructure and manpower, which have been reduced by using outsourcing. All organizations try to increase the probability of success of t More
        The increase in the complexity and cost of information technology systems has created many problems for companies in the field of infrastructure and manpower, which have been reduced by using outsourcing. All organizations try to increase the probability of success of their outsourcing projects in different ways. One of the reasons for the failure of these projects, especially in the field of information technology, due to its important role in gaining a competitive advantage, is the selection of an inappropriate contractor, which is complicated due to the existence of multiple and contradictory criteria. The purpose of this research is to find the important criteria for selecting the contractor and provide its framework and specify the importance of the criteria and finally to design a fuzzy expert system for choosing the right contractor in intra-border outsourcing of information technology. The method of obtaining knowledge from experts, which includes information technology specialists and managers, is a questionnaire, and it has been used in an information technology company to validate the system, and the results indicate the optimal performance of the system. Manuscript profile
      • Open Access Article

        19 - A model information technology adoption in academic research projects in the filed ICT based on Information Technology Adoption Integrated Modeling (ITAIM)
        Shahram Aliyari masoud movahedi sirous kazemian
        Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and More
        Today, the emergence and expansion of technologies that provide the widest possible connection have brought about significant changes in the private life and professional life of individuals. Correct implementation of information technology is the source of economic and cultural development and the promotion of quality of life through the exchange of information and the provision of public and private services. The purpose of this research is to present the model of information technology acceptance in Iranian ICT research centers. Employed experts worked on ICT projects in this research Statistical population. It was provided in one of the university searching centers. And so a convenience and purposeful Nonprobability sampling does (30 person). This paper examines the factors and parameters affecting the acceptance of information technology in ICT projects of the university research centers in the field of information technology. To collect the required data and information, a questionnaire was used & to analyze the data and information obtained from the questionnaires using the Spss 22 and Smart pls3 software. According to the calculations, the factors affecting the acceptance of information technology in university research centers can be divided into four categories: IT related factors, organizational factors, factors related to executive director and individual factors that are related to management (0.497), IT (0.460) and Individual factors (0.457) have an impact on the individual acceptance of information technology respectively and organizational factors (0.469) on the adoption of an IT organization Manuscript profile
      • Open Access Article

        20 - Proposing an Information Retrieval Model Using Interval Numbers
        Hooman Tahayori farzad ghahremani
        Recent expansions of web demands for more capable information retrieval systems that more accurately address the users' information needs. Weighting the words and terms in documents plays an important role in any information retrieval system. Various methods for weighti More
        Recent expansions of web demands for more capable information retrieval systems that more accurately address the users' information needs. Weighting the words and terms in documents plays an important role in any information retrieval system. Various methods for weighting the words are proposed, however, it is not straightforward to assert which one is more effective than the others. In this paper, we have proposed a method that calculates the weights of the terms in documents and queries as interval numbers. The interval numbers are derived by aggregating the crisp weights that are calculated by exploiting the existing weighting methods. The proposed method, calculates an interval number as the overall relevancy of each document with the given query. We have discussed three approaches for ranking the interval relevancy numbers. In the experiments we have conducted on Cranfield and Medline datasets, we have studied the effects of weight normalization, use of variations of term and document frequency and have shown that appropriate selection of basic term weighting methods in conjunction with their aggregation into an interval number would considerably improve the information retrieval performance. Through appropriate selection of basic weighting methods we have reached the MAP of 0.43323 and 0.54580 on the datasets, respectively. Obtained results show that he proposed method, outperforms the use of any single basic weighting method and other existing complicated weighting methods. Manuscript profile
      • Open Access Article

        21 - Investigating the Relationship between Electronic Human Resource Management, Agility and Organizational Effectiveness in Organizations Under the Ministry of Communications and Information Technology
        Reza Bahadorifard reza rasouli
        Today, information technology has penetrated into all parts of the organization and has affected even the most important assets of the organization, namely human resources and the management of these valuable organizational assets. With the increasing development of har More
        Today, information technology has penetrated into all parts of the organization and has affected even the most important assets of the organization, namely human resources and the management of these valuable organizational assets. With the increasing development of hardware and software infrastructure in today's organizations, new approaches to human resource management in combination with information technology and under the title of electronic human resource management (EHRM) has been able to gradually occupy a worthy place in the management processes of the organization. This issue is doubly important among public organizations, which are considered as an intermediary between government and society, and is able to improve the speed and power of organizational responsiveness and performance of the organization through its desired outputs. With this explanation, the purpose of this study is to design of an EHRM model to increase organizational effectiveness through organizational agility in subsidiary organizations of Ministry of Communication & Information Technology Iran. In terms of purpose, this study is an applied-developmental study based on a mixed exploratory approach and qualitative and quantitative analysis approaches seeking to identify the components that form the electronic human resource management system and significance of the relationship between this system and organizational agility and also the significance of the relationship between organizational agility and organizational effectiveness. In this regard, the study gathered the data in the qualitative part based on semi-structured interview tools and the opinions of 9 expert managers in the subsidiary organizations and in the quantitative part based on a sample of human resource managers in subordinate organizations of the mentioned Ministry. Qualitative data analyzed based on theme analysis method and quantitative data analyzed based on structural equation modeling. The results of the qualitative phase of the research showed that electronic human resource management includes seven dimensions or general task, fifteen components and a total of seventy six indicators. The results of the quantitative phase of the research also showed that there is a positive and significant relationship between electronic human resource management with organizational agility and also between organizational agility and organizational effectiveness in the. Based on the results, implementation and development of electronic human resource management system in an appropriate manner in the mentioned organizations is well able to strengthen and develop organizational agility to promote and improve organizational effectiveness. At the end of the study, solutions and suggestions were presented to develop the effectiveness of electronic human resource management system in the mentioned organizations. Manuscript profile
      • Open Access Article

        22 - A value Co-creation model for Information and Communication Technology Entrepreneurial Ecosystem
        Mohsen Pazari Manijeh Haghighinasab Jamshid Edalatian Shariairi
        The entrepreneurial process has always been associated with uncertainty and risk-taking, so it can be said that the risk-taking of this process is considered an accepted part of it.Applying information and communication technology (ICT) is very effective in reducing thi More
        The entrepreneurial process has always been associated with uncertainty and risk-taking, so it can be said that the risk-taking of this process is considered an accepted part of it.Applying information and communication technology (ICT) is very effective in reducing this uncertainty. The purpose of this study is to present a value co-creation model in the field of ICT so that the basic value creation activities in the ICT ecosystem and the actors associated are determined with each activity. For this purpose, using the subject literature and meta-synthesis were identified activities and actors of the entrepreneurial ecosystem and then the main activities were selected using a survey of ICT experts. Based on the results of this analysis, a conceptual model was designed to explain ICT-based entrepreneurial activities consisting of 12 hypotheses. This model was tested using structural equation modeling in the ICT Park (Sajjad Park), which led to the identification of 10 paths with the highest factor load factor.Then, the final structures of the model were extracted by confirmatory factor analysis method including 11 stages and 48 activities. finally, the relationship between the actors and the activities was drawn in the form of a pie chart according to the meta-analysis. Manuscript profile
      • Open Access Article

        23 - A framework for establishing a national data vault for Data Governance institution
        Nader naghshineh fatima fahimnia hamidreza Ahmadian chashmi
        the goal of this research is mainly presenting a framework for national data with the concentration on parameters respecting data governance in order to design an effective and comprehensive pattern for all spots interacting with national data. The author has adopted de More
        the goal of this research is mainly presenting a framework for national data with the concentration on parameters respecting data governance in order to design an effective and comprehensive pattern for all spots interacting with national data. The author has adopted descriptive approach and mixed method for this research. In the first step, the articles regarding national data organization are extracted and subsequently accorded with the articles based on technology ecosystem design patterns, 10 key components are formed as main modules. Thereafter, for each module, indexes and sub-indexes are taken into account by considering articles and also taking advantages of interviews and Delphi method. by designing two questionnaires, strategy-management and technical-lawful oriented, total number of 22 indexes and 154 sub-indexes are collected. the research has the capacity of being a scientific reference for the national data vault. it is recommended that development of technical infrastructure and data governance patterns in national level accorded with indexes and sub-indexes counted in this research Manuscript profile
      • Open Access Article

        24 - Investigating the Information and Communication Technology Deployment Impact on Energy Expenditures of Iranian households (A Provincial Approach)
        Elham Hosseinzadeh َAmir Hossein Mozayani
        Nowadays, investing in information and communication technology (ICT) is inevitable, because it affects various aspects of human life, including the economy. Due to the rapid growth of population, increasing energy demand, and limited energy resources, one of the bas More
        Nowadays, investing in information and communication technology (ICT) is inevitable, because it affects various aspects of human life, including the economy. Due to the rapid growth of population, increasing energy demand, and limited energy resources, one of the basic measures to achieve sustainable development in countries, is optimization and reform of energy consumption structures. Given that the home sector is one of the main sectors of energy consumption, one of the effective approaches in reducing and managing household energy expenditures is to use ICT capabilities. In this regard, in this study, the effect of ICT expansion on energy consumption of urban households in Iran using the Panel Data method and GLS model during the period 2008-2015 and in the form of provincial data has been analyzed. The results indicate that in some models, a significant reducing effect of ICT on energy expenditure was observed. However, in most of the estimated models, there is no significant reducing effect of ICT on household energy expenditure. It seems that the main reasons for this are the subsidy structure governing energy prices, the low share of energy in total household consumption expenditures, the lack of proper consumption culture. Manuscript profile
      • Open Access Article

        25 - Employing a meta-synthesis to present a framework for commercial banks’ preparedness indicators in use of blockchain technology
        Zahra Khalili Masoud Keimasi Javad Abbasi Mohammadali Shahhosseini
        Present study aimed at presenting a framework for commercial banks’ preparedness indicators in use of blockchain technology. To this end, the meta-synthesis research method was employed. Among from 306 resources found over meta-synthesis steps, a number of 38 papers inc More
        Present study aimed at presenting a framework for commercial banks’ preparedness indicators in use of blockchain technology. To this end, the meta-synthesis research method was employed. Among from 306 resources found over meta-synthesis steps, a number of 38 papers included our acceptance criteria. The four organizational, technical, individual and environmental factors were identified as indicators of commercial banks’ preparedness to use Blockchain technology. Organizational indicators included infrastructures development, managerial skills, human resources development, company or organization size, financial resources, receptive organizational culture, organizational policies, and senior management support. The technical indicators included complexity, technological security, access to technology, use of technology and specialized manpower. In addition, individual indicators included attitudes toward use, ease of use, perceived usefulness, and understanding of Blockchain technology. Finally, environmental indicators included rules and regulations, technology maturity, information exchange, compatibility, market dynamics, and governmental supports. Manuscript profile
      • Open Access Article

        26 - Presenting a novel solution to choose a proper database for storing big data in national network services
        Mohammad Reza Ahmadi davood maleki ehsan arianyan
        The increasing development of tools producing data in different services and the need to store the results of large-scale processing results produced from various activities in the national information network services and also the data produced by the private sector an More
        The increasing development of tools producing data in different services and the need to store the results of large-scale processing results produced from various activities in the national information network services and also the data produced by the private sector and social networks, has made the migration to new databases solutions with appropriate features inevitable. With the expansion and change in the size and composition of data and the formation of big data, traditional practices and patterns do not meet new requirements. Therefore, the necessity of using information storage systems in new and scalable formats and models has become necessary. In this paper, the basic structural dimensions and different functions of both traditional databases and modern storage systems are reviewed and a new technical solution for migrating from traditional databases to modern databases is presented. Also, the basic features regarding the connection of traditional and modern databases for storing and processing data obtained from the comprehensive services of the national information network are presented and the parameters and capabilities of databases in the standard and Hadoop context are examined. In addition, as a practical example, a solution for combining traditional and modern databases has been presented, evaluated and compared using the BSC method. Moreover, it is shown that in different data sets with different data volumes, a combined use of both traditional and modern databases can be the most efficient solution. Manuscript profile
      • Open Access Article

        27 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in More
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives include the view of secure models, the view of security models, and the view of the framework and system to security models. The first and third perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research is presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. In this idea, it is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, in addition, include agile patterns as well. . Manuscript profile
      • Open Access Article

        28 - Identifying the Key Drivers of Digital Signature Implementation in Iran (using fuzzy Delphi method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
        iThe purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The More
        iThe purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The statistical community consists of all experts and specialists in the field of information technology and digital signature and articles in this field. The sample size of the statistical community of experts is 13 people who were selected by the purposeful sampling method. 30 articles were selected based on their availability and downloadable, non-technical nature, and relevance to the topic. The method of data analysis was done according to the fuzzy Delphi approach. Validity and reliability were calculated and confirmed using the CVR index and Cohen's kappa test with coefficients of 0.83 and 0.93, respectively. The results prove that the key drivers of digital signature implementation in Iran include 5 main dimensions and 30 concepts, which are 1) security (information confidentiality, information security, sender authentication, document authentication, privacy protection, trust between parties), 2) business (digital business models, communication needs, staff management, organization size, organizational structure, organization resources, organizational culture, top managers, competition ecosystem, e-governance), 3) user (perceived convenience, perceived benefit, consumer behavior, consumer literacy, consumer lifestyle), 4) technical (development of technical infrastructure, systems integration, system complexity, system tanks, design quality, technical speed of certificate production and verification, impermeability of hackers) and 5) Legal (legal licenses, penal laws, legislative body, e-commerce laws). Manuscript profile
      • Open Access Article

        29 - The Effect of ICT Development on Economic and Political Risk: A Cross Country Study
        َAmir Hossein Mozayani Sajjad  Faraji Dizaji Hossein Karimi
        Today, information and communication technology has influenced all areas of human life, including economics and politics. In research on the effects of information and communication technology, its effects on economic risk and political risk have not been considered so More
        Today, information and communication technology has influenced all areas of human life, including economics and politics. In research on the effects of information and communication technology, its effects on economic risk and political risk have not been considered so far. Therefore, this study has examined the effect of ICT development on economic and political risk for three selected groups of developed, developing, and OPEC countries in the period 2007- 2019. The panel data method was used to estimate the model. Based on the model estimation results for all sample countries, the deployment of information and communication technology reduces economic and political risk; But the results are different for each group. As the development of information and communication technology in selected OPEC members and developing countries increases economic risk; But in developed countries, it reduces economic risk. Also, in OPEC member countries, no significant relationship was found between ICT and political risk, and in selected developed and developing countries, ICT increases political risk. Manuscript profile
      • Open Access Article

        30 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza   Memarzadeh Tehran Sedigheh Tootian Isfahani
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the eff More
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the effective factors on the implementation of Iran's ICT policies with the help of the neural network technique and based on Giddens' constructive theory. From the point of view of conducting it, this research is of a survey type and based on the purpose, it is of an applied type because it is trying to use the results of the research in the Ministry of Communication and Information Technology and the Iranian Telecommunications Company. Data collection is based on library and field method. The tool for collecting information is research researcher-made questionnaire. The statistical population of the research is information and communication technology experts at the headquarters of Iran Telecommunication Company (810 people), of which 260 people were randomly selected as a sample based on Cochran's formula. MATLAB software was used for data analysis. According to the findings, the best combination for development is when all input variables are considered at the same time, and the worst case is when the infrastructure development variable is ignored, and the most important based on network sensitivity analysis is related to infrastructure development and the least important is related to content supply. Manuscript profile
      • Open Access Article

        31 - Survey on the Applications of the Graph Theory in the Information Retrieval
        Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini
        Due to its power in modeling complex relations between entities, graph theory has been widely used in dealing with real-world problems. On the other hand, information retrieval has emerged as one of the major problems in the area of algorithms and computation. As graph- More
        Due to its power in modeling complex relations between entities, graph theory has been widely used in dealing with real-world problems. On the other hand, information retrieval has emerged as one of the major problems in the area of algorithms and computation. As graph-based information retrieval algorithms have shown to be efficient and effective, this paper aims to provide an analytical review of these algorithms and propose a categorization of them. Briefly speaking, graph-based information retrieval algorithms might be divided into three major classes: the first category includes those algorithms which use a graph representation of the corresponding dataset within the information retrieval process. The second category contains semantic retrieval algorithms which utilize the graph theory. The third category is associated with the application of the graph theory in the learning to rank problem. The set of reviewed research works is analyzed based on both the frequency as well as the publication time. As an interesting finding of this review is that the third category is a relatively hot research topic in which a limited number of recent research works are conducted. Manuscript profile
      • Open Access Article

        32 - Information Technology, Strategy Implementation, Information Systems, Strategic Planning, Input-Process-Outcome Framework
        Mona Jami Pour Shahnaz Akbari Emami Safora Firozeh
        IT strategy is a key factor in improving the process and performance of companies in using IT. Hence, many companies have a strategic planning process, but only a few succeed in implementing strategies efficiently. Therefore, the purpose of this study is to design a pro More
        IT strategy is a key factor in improving the process and performance of companies in using IT. Hence, many companies have a strategic planning process, but only a few succeed in implementing strategies efficiently. Therefore, the purpose of this study is to design a process framework for implementing IT strategy; To identify the drivers, processes and consequences of implementing IT strategy in organizations. The present study is a qualitative research with a phenomenological approach and in order to collect data, open and in-depth interviews were conducted with 10 experts in the field of IT using theoretical sampling. The results of the analysis show that the inputs under the headings of IT strategy implementation include environmental requirements of business continuity, structural-system cohesion, technology-oriented human resources, IT strategic leadership, skill requirements and common values. The second aspect of the IT strategy implementation model includes the dimensions of IT program monitoring and communication, structural appropriateness, development of support policies, budgeting and resource allocation, appropriate training, and the development of supportive culture. Finally, the implications of implementing an IT strategy, including those related to finance, internal process, customer, and growth and learning, were categorized. Manuscript profile
      • Open Access Article

        33 - The main components of evaluating the credibility of users according to organizational goals in the life cycle of big data
        Sogand Dehghan shahriyar mohammadi rojiar pirmohamadiani
        Social networks have become one of the most important decision-making factors in organizations due to the speed of publishing events and the large amount of information. For this reason, they are one of the most important factors in the decision-making process of inform More
        Social networks have become one of the most important decision-making factors in organizations due to the speed of publishing events and the large amount of information. For this reason, they are one of the most important factors in the decision-making process of information validity. The accuracy, reliability and value of the information are clarified by these networks. For this purpose, it is possible to check the validity of information with the features of these networks at the three levels of user, content and event. Checking the user level is the most reliable level in this field, because a valid user usually publishes valid content. Despite the importance of this topic and the various researches conducted in this field, important components in the process of evaluating the validity of social network information have received less attention. Hence, this research identifies, collects and examines the related components with the narrative method that it does on 30 important and original articles in this field. Usually, the articles in this field are comparable from three dimensions to the description of credit analysis approaches, content topic detection, feature selection methods. Therefore, these dimensions have been investigated and divided. In the end, an initial framework was presented focusing on evaluating the credibility of users as information sources. This article is a suitable guide for calculating the amount of credit of users in the decision-making process. Manuscript profile
      • Open Access Article

        34 - The framework of the national macro plan for transparency and information release based on the grounded theory method
        Mahdi Azizi MehmanDoost Mohammad Reza Hosseini reza taghipour Mojtaba Mazoochi
        The purpose of this research is to present the framework of the national plan for transparency and information release. The research employs an integrated approach (qualitative and quantitative) and grounded theory as its research methodology. In the qualitative part، w More
        The purpose of this research is to present the framework of the national plan for transparency and information release. The research employs an integrated approach (qualitative and quantitative) and grounded theory as its research methodology. In the qualitative part، with an in-depth and exploratory review of upstream laws and documents، models، theories، plans، and white papers of different countries related to transparency and information release، data analysis was done until theoretical saturation through three stages of open، axial، and selective coding. To acquire the dimensions، components، and subcomponents of this framework، 129 concepts were extracted from 620 primary codes، which were reduced to 593 secondary codes by removing the duplicated elements. Finally، 24 subcategories were placed under the five main components based on the paradigm model. In the quantitative section، the results of the analysis of the questionnaire indicated that، from a validity standpoint، the total value of the questionnaire، in different dimensions، was between 0.87 and 0.92، and the reliability coefficient was between 0.73 and 0.78. Based on data analysis، the establishment of a supranational management institution for transparency and information release، the precise determination of exceptions، network governance، demanding transparency، adherence to frameworks، maximum disclosure and support for legitimate disclosure، and the establishment of a data governance center are among the subcategories emphasized in this framework. Manuscript profile
      • Open Access Article

        35 - Estimating the Value of Digital Economy Core Spillover in Iran
        Niloufar Moradhassel Bita Mohebikhah
        Background and Purpose: In most of the studies, the direct effects of the ICT sector have been discussed, but the indirect effects (spillover) and how to measure them have not been addressed. This issue is on the agenda of this article. For this purpose, while determini More
        Background and Purpose: In most of the studies, the direct effects of the ICT sector have been discussed, but the indirect effects (spillover) and how to measure them have not been addressed. This issue is on the agenda of this article. For this purpose, while determining the territory of the digital economy, the gross value of the core of the country's digital economy has been estimated. Methodology: In this article, using the Solow growth model, the spillover effects of the core of the digital economy (ICT) have been estimated for the period of 2002-2019. Findings: The results imply that in the period under review, according to the elasticity of labor productivity relative to the share of net capital formation of the ICT sector in the national economy (about 0.3), the spillover effects of the digital economy core have increased from 210 thousand billion Rials in 2015 to 279 thousand billion of Rials in 2019. Manuscript profile
      • Open Access Article

        36 - The effect of emotional intelligence of project managers on the effectiveness of team communication in Iranian research institutes (Case study: Research Institute of Communication and Information Technology)
        Mansoureh  Mohammadnezhad Fadard Ehram Safari
        Generally, in performing technical projects, especially in the field of information and communication technology, the most important criterion for handing over the project is having technical capabilities, and less attention is paid to the communication skills of projec More
        Generally, in performing technical projects, especially in the field of information and communication technology, the most important criterion for handing over the project is having technical capabilities, and less attention is paid to the communication skills of project managers, such as having emotional intelligence. Lack of attention to this issue seems to reduce the effectiveness of team communication and thus lead to project failure. The aim of this study was to measure the effect of emotional intelligence of project managers on the effectiveness of team communication in the projects of the Institute of Communication and Information Technology. The method of the present research is descriptive-analytical of correlation type, the statistical population of which consists of project managers and members of the project teams of the Research Institute of Communication and Information Technology. The statistical population includes 19 project teams that have been selected by census method. Data collection tools are Bar-On Emotional Intelligence Questionnaire and Senior Questionnaire to evaluate the effectiveness of project team communication. Pearson correlation coefficient, multivariate regression and imaginary variable regression and dependent t-test were used to analyze the data. The results show that the emotional intelligence of project managers affects effective communication in the project team. However, only interpersonal skills, interpersonal skills, and adaptability can predict effective communication within the project team, and the dimensions of general mood and stress management do not affect these relationships Manuscript profile
      • Open Access Article

        37 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this fie More
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives are secure models, security models, and the framework and system to security models. The first and last perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research are presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. It is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, include agile patterns as well. Based on this idea and related analyzes, the atmosphere of future research activities will be revealed to the audience. Manuscript profile
      • Open Access Article

        38 - Identifying the Key Drivers of Digital Signature Implementation in Iran (Using Fuzzy Delphi Method)
        Ghorbanali Mehrabani Fatemeh Zargaran khouzani
        Despite the emphasis of researchers and experts on the need to implement digital signatures and the progress of technology towards the digitization of all affairs and electronic governance, Iran is still facing the challenge of implementing digital signatures. The purpo More
        Despite the emphasis of researchers and experts on the need to implement digital signatures and the progress of technology towards the digitization of all affairs and electronic governance, Iran is still facing the challenge of implementing digital signatures. The purpose of this article is to identify and analyze the key drivers of digital signature implementation in Iran with a fuzzy Delphi approach. In terms of practical purpose and in terms of information gathering, the research has benefited from a hybrid approach. The statistical community consists of all experts and specialists in the field of information technology and digital signature and articles in this field. The sample size of the statistical community of experts is 13 people who were selected by the purposeful sampling method. 31 articles were selected based on their availability and downloadable, non-technical nature, and relevance to the topic. The method of data analysis was done according to the fuzzy Delphi approach. Validity and reliability were calculated and confirmed using the CVR index and Cohen's kappa test with coefficients of 0.83 and 0.93, respectively. The results prove that the key drivers of digital signature implementation in Iran include 5 main dimensions and 30 concepts, which are 1) security (information confidentiality, information security, sender authentication, document authentication, privacy protection, trust between parties), 2) business (digital business models, communication needs, staff management, organization size, organizational structure, organization resources, organizational culture, top managers, competition ecosystem, e-governance), 3) user (perceived convenience, perceived benefit, consumer behavior, consumer literacy, consumer lifestyle), 4) technical (development of technical infrastructure, systems integration, system complexity, system tanks, design quality, technical speed of certificate production and verification, impermeability of hackers) and 5) Legal (legal licenses, penal laws, legislative body, e-commerce laws). It is suggested that in the field of digital signature implementation, special attention should be paid to rewriting rules, training users, creating a security culture, and digital signature policymakers should invite knowledge-based companies to cooperate in developing infrastructure and making relevant software competitive. Manuscript profile
      • Open Access Article

        39 - Presenting the ICT Policies Implementation Model of the 6th Development Using the Neural Network Method
        Nazila Mohammadi Gholamreza  Memarzadeh sedigheh tootian
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the eff More
        It is inevitable to properly manage the implementation of information and communication technology policies in a planned way in order to improve the country's position in the fields of science and technology. The purpose of this research is to provide a model of the effective factors on the implementation of Iran's ICT policies by the neural network technique and based on Giddens' constructive theory. From the point of view of conducting it, this research is of a survey type and based on the purpose, it is of an applied type because it is trying to use the results of the research in the Ministry of Communication and Information Technology and the Iranian Telecommunications Company. Data collection is based on library and field method. The tool for collecting information is researcher-made questionnaire. The statistical population of the research is ICT experts at the headquarters of Iran Telecommunication Company (810 people), of which 260 people were randomly selected as a sample based on Cochran's formula. MATLAB software was used for data analysis. According to the findings, the best combination for development is when all input variables are considered at the same time, and the worst case is when the infrastructure development variable is ignored, and the most important based on network sensitivity analysis is related to infrastructure development and the least important is related to content supply. Manuscript profile
      • Open Access Article

        40 - Survey on the Applications of the Graph Theory in the Information Retrieval
        Maryam Piroozmand Amir Hosein Keyhanipour Ali Moeini
        Due to its power in modeling complex relations between entities, graph theory has been widely used in dealing with real-world problems. On the other hand, information retrieval has emerged as one of the major problems in the area of algorithms and computation. As graph- More
        Due to its power in modeling complex relations between entities, graph theory has been widely used in dealing with real-world problems. On the other hand, information retrieval has emerged as one of the major problems in the area of algorithms and computation. As graph-based information retrieval algorithms have shown to be efficient and effective, this paper aims to provide an analytical review of these algorithms and propose a categorization of them. Briefly speaking, graph-based information retrieval algorithms might be divided into three major classes: the first category includes those algorithms which use a graph representation of the corresponding dataset within the information retrieval process. The second category contains semantic retrieval algorithms which utilize the graph theory. The third category is associated with the application of the graph theory in the learning to rank problem. The set of reviewed research works is analyzed based on both the frequency as well as the publication time. As an interesting finding of this review is that the third category is a relatively hot research topic in which a limited number of recent research works are conducted. Manuscript profile