<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.7//EN" "https://dtd.nlm.nih.gov/ncbi/pubmed/in/PubMed.dtd">
<ArticleSet>
<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Developing the Change Management Model in Outsourcing of IT Services: Using Interpretive -Structural Modeling (ISM)</ArticleTitle>
<VernacularTitle>ارائۀ مدل مدیریت تغییر در برون‎سپاری خدمات فناوری اطلاعات: رویکرد ساختاری ـ تفسیر</VernacularTitle>
			<FirstPage>405</FirstPage>
			<LastPage>425</LastPage>
			<ELocationID EIdType="pii">61800</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61800</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mona</FirstName>
					<LastName>Jami Poor</LastName>
<Affiliation>Assistance Prof. of System Management, Hazrate Masoumeh University, Qom, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammadhossein</FirstName>
					<LastName>Sherkat</LastName>
<Affiliation>PhD of System Management, Faculty of Management, Tehran University, Tehran Iran</Affiliation>

</Author>
<Author>
					<FirstName>Hamid Reza</FirstName>
					<LastName>Yazdani</LastName>
<Affiliation>Assistant Prof. of Human Resource Management, Farabi Campus, Qom, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2018</Year>
					<Month>03</Month>
					<Day>21</Day>
				</PubDate>
			</History>
		<Abstract>Outsourcing, a key strategy for Information Technology sourcing due to cost reduction, concentration on core competencies and acquisition of the latest and the most up to date technologies, has been seriously taken into consideration by organizations in the last two decades. Information Technology outsourcing is a key decision in that field which can lead to successful investment management in this area. Despite the popularity and attention to this outsourcing strategy, statistics indicate an increasing failure rate in Information Technology outsourcing projects rooted in the changes occurred due to adapting with this strategy. Moreover, mismanagement of these changes can be considered as a cause for many of these failures which not only led to the failure of outsourcing process but also bring about additional risks and costs. The aim of this paper is to identify and prioritize change management requirements in supplying resources based on Information Technology services outsourcing process. Therefore, following a systematic literature review in preview of Information Technology outsource and change management researches, 12 semi-structured interviews were conducted by experts in the field of outsource and organizational change management. Finally, factors affecting change management success in Information Technology outsourcing were prioritized using Interpretive-Structural Modeling. The present study has contributions both to the developed model and the research methodology in outsource researches domain.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Interpretive Structural Modeling (ISM)</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">IT outsourcing</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">IT sourcing</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Organizational change management</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Outsourcing</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61800_b0b205647caa6bf3f886f454a6f24454.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Infrastructure Analysis of Sazeh Gostar Saipa Outsourcing Company to Select Knowledge Management Strategy: Qualitative Approach</ArticleTitle>
<VernacularTitle>تحلیل زیرساخت‎های شرکت برون‎سپار سازه‎گستر سایپا برای انتخاب استراتژی مدیریت دانش: رویکردی کیفی</VernacularTitle>
			<FirstPage>425</FirstPage>
			<LastPage>450</LastPage>
			<ELocationID EIdType="pii">61852</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61852</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Hossein</FirstName>
					<LastName>Khanifar</LastName>
<Affiliation>Prof., Faculty of Management &amp; Accounting, Farabi Campus University of Tehran, Qom, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Rohollah</FirstName>
					<LastName>Nnikkhah Keyarmash</LastName>
<Affiliation>MSc., Human Resource Management, Farabi Campus University of Tehran, Qom, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Karimian Ravandi</LastName>
<Affiliation>MSc, Marketing Management, Farabi Campus University of Tehran, Qom, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2017</Year>
					<Month>05</Month>
					<Day>17</Day>
				</PubDate>
			</History>
		<Abstract>In today&#039;s turbulent business environment, organizations have to make changes in their structure such as outsourcing. This change that is a requirement to provide for the needs of that organization and for competitive advantage can be considered as a new trouble for that organization as well. Because of such changes, an organization may lose the workers&#039; (employee) knowledge that is the most important element of the competitive advantage. Thus, the organizations are required to use the most effective knowledge management strategy that is proposed according to the analysis of the key aspects of those organizations. This study examines Sazeh Gostar, the most important suppliers of spare parts for Saipa Automobile Company. At first, the two coding and personalization strategies were applied provided that they were reviewed in the literature. The influential factors were then classified according to McKenzie 7S model. Then, the data were obtained using snowball and targeted sampling from interviews with 9 experts, and through reviewing the company documents. Current status of the company was identified using Theme Analysis. Finally, comparing the influential factors on the company&#039;s knowledge management strategy, the appropriate coding strategy was selected.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Knowledge management strategy</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Knowledge workers</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Outsourcing</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Restructuring</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Saze Gostar Saipa</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61852_f87c4c2b870989c0abb99dcb48e0012f.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Prioritizing Intangible Assets in developing Competitive Advantage through the Process of Network Analysis: The Case of Information Technology Private Corporations</ArticleTitle>
<VernacularTitle>اولویت‌بندی گزینه‌های سرمایۀ نامشهود در تدوین مزیت رقابتی از طریق فرایند تحلیل شبکه‌ای (مطالعۀ موردی: شرکت‌های خصوصی در حوزۀ فناوری اطلاعات)</VernacularTitle>
			<FirstPage>449</FirstPage>
			<LastPage>476</LastPage>
			<ELocationID EIdType="pii">62018</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.62018</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Hamza</FirstName>
					<LastName>Khastar</LastName>
<Affiliation>Assistant Prof., Faculty of Management, Kharazmi University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad Reza</FirstName>
					<LastName>Sheikhattar</LastName>
<Affiliation>MSc. In Information Technology Management, Kharazmi University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Ghorbanifar</LastName>
<Affiliation>Ph.D. Candidate in Corporate Entrepreneurship, Islamic Azad University, Qazvin Branch, Qazvin, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2017</Year>
					<Month>04</Month>
					<Day>29</Day>
				</PubDate>
			</History>
		<Abstract>The aim of this study is to identify and rank the most effective elements to create sustainable competitive advantage in information technology companies. In this study, with the help of a couple of experts from three information technology organizations, the most important intangible assets (intellectual capital, social capital and spiritual capital) were identified as alternatives to the ranking of competitive advantage. Having reviewed the related literature and developed a panel of expertise, 16 sub-options extracted for the intellectual, social and spiritual capital. Five criteria of price, support, design, image and quality were taken into account for competitive advantage and the ranking of alternatives based on these criteria was carried out through the process of network analysis. The results of the network analysis showed that compared to social and spiritual capital, intellectual capital can have a more important role in creating competitive advantage in IT companies. Besides, regarding rating of sub-options, human capital ranked the highest in gaining the competitive advantage. Interface element, vision-orientation/value- orientation ​​and relational/client capital were respectively the next ranks in making sustainable competitive advantage</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Competitiveness advantage</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Intellectual Capital</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">network analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Social capital</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Spiritual Capital</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_62018_46f9e17b4c713188a97f2932ecb8c332.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Designing a Predictive Analytics for the Formulation of Intelligent Decision Making 
Policies for VIP Customers Investing in the Bank</ArticleTitle>
<VernacularTitle>طراحی تحلیل‎های آینده‎نگر به‎منظور تدوین سیاست تصمیم‎گیری هوشمند برای مشتریان ویژۀ سرمایه‎گذار در بانک</VernacularTitle>
			<FirstPage>477</FirstPage>
			<LastPage>511</LastPage>
			<ELocationID EIdType="pii">62895</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.216587.2144</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Iman</FirstName>
					<LastName>Raeesi Vanani</LastName>
<Affiliation>Assistant Prof. of Industrial Management, Faculty of Management and Accounting, Allameh Tabataba’i University, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2017</Year>
					<Month>08</Month>
					<Day>28</Day>
				</PubDate>
			</History>
		<Abstract>Special, privileged or VIP customers are of great significance to the banks since they continuously and broadly invest in deposits and remain loyal to the banks. This loyalty is dependent on the broad and specific services they receive, deposit interests, and the tuned regulatory actions that banks take for according to the grade of special customers and their propensity to risk. In the current research, a dataset of two thousand ordinary and special privileged customers were collected according to their demographics, accounts information, and level of investment in the bank. The grade of special customer and their propensity to taking risks are also determined by the experts of the bank. Afterwards, a range of learning algorithms are applied for designing and validating classification and prediction methods on special customers’ grades and their propensity to risk. Final results are then analyzed and prepared as a set of intelligent and improvable rules that assist the bank managers in formulating interactive and predictive decision making policies from the initiation of the customer relationship with the bank.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Predictive Analytics</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Privileged Customer</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Intelligent Decision Making</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Bank Investment</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_62895_ea11dbe0ea09c2bde7ef74c33bc925de.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Estimation of total Effort and Effort Elapsed in Each Step of Software Development Using 
Optimal Bayesian Belief Network</ArticleTitle>
<VernacularTitle>تخمین تلاش کلی نرم‌افزار و تلاش صرف‎شده در هر مرحلۀ تولید با استفاده از شبکۀ بیزی بهینه</VernacularTitle>
			<FirstPage>507</FirstPage>
			<LastPage>530</LastPage>
			<ELocationID EIdType="pii">61641</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61641</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Fatemeh</FirstName>
					<LastName>Zare Baghiabad</LastName>
<Affiliation>Ph.D. Candidate Industrial Engineering, Yazd University, Yazd, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Hasan</FirstName>
					<LastName>Khademi Zare</LastName>
<Affiliation>Associate Prof., Dep. of Industrial Engineering, Yazd University, Yazd, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammadsaber</FirstName>
					<LastName>Fallahnezhad</LastName>
<Affiliation>Associate Prof., Dep. of Industrial Engineering, Yazd University, Yazd, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Fazlollah</FirstName>
					<LastName>Adibnia</LastName>
<Affiliation>Assistant Prof., Dep. of Computer Engineering, Yazd University, Yazd, Iran</Affiliation>
<Identifier Source="ORCID">0000-0003-3366-7939</Identifier>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2016</Year>
					<Month>11</Month>
					<Day>17</Day>
				</PubDate>
			</History>
		<Abstract>Accuracy in estimating the needed effort for software development caused software effort estimation to be a challenging issue. Beside estimation of total effort, determining the effort elapsed in each software development step is very important because any mistakes in enterprise resource planning can lead to project failure. In this paper, a Bayesian belief network was proposed based on effective components and software development process. In this model, the feedback loops are considered between development steps provided that the return rates are different for each project. Different return rates help us determine the percentages of the elapsed effort in each software development step, distinctively. Moreover, the error measurement resulted from optimized effort estimation and the optimal coefficients to modify the model are sought. The results of the comparison between the proposed model and other models showed that the model has the capability to highly accurately estimate the total effort (with the marginal error of about 0.114) and to estimate the effort elapsed in each software development step.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Bayesian belief network</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Enterprise resource planning</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Machine learning methods</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Software effort estimation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Optimization</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61641_9921af0a2e2da982d1b0ee9fa7bb3dc9.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Proposing Innovative Genetic Algorithms Model to Solve the Problem of the Professors' Educational Planning Considering Students' Opinions</ArticleTitle>
<VernacularTitle>ارائۀ مدل ابتکاری الگوریتم ژنتیک برای حل مسئلۀ برنامۀ آموزشی استادان با تأمین نظر دانشجویان</VernacularTitle>
			<FirstPage>531</FirstPage>
			<LastPage>548</LastPage>
			<ELocationID EIdType="pii">62191</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.62191</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Laleh</FirstName>
					<LastName>Asgari</LastName>
<Affiliation>Msc, Social and Economic System Engineer, Specialized Data Mining Laboratory, Alzahra University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad Reza</FirstName>
					<LastName>Keyvanpour</LastName>
<Affiliation>Associate Prof. of Software Engineer, Faculty of Engineering, Alzahra University, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2016</Year>
					<Month>12</Month>
					<Day>21</Day>
				</PubDate>
			</History>
		<Abstract>Timing of curriculum planning for students and faculty could be done using diverse methods. The present research concerns with curriculum planning for professors considering the students&#039; opinions. In doing so, the courses and the timing are determined based on the professors&#039; common timetable, the professors&#039; intensive courses timing and the class limitations. To achieve this goal, the genetic algorithm methodology was used in two steps. In the first stage, single-point cutting operator was used and in the second stage of the algorithm, a new intelligent operator called cyclic reverse list (RIL) was used provided that gold, silver and bronze time types were used for different courses. The advantages of this algorithm are using a new appropriate function (hot rolled), as well as new criteria and a new operator (RIL). Unlike conventional methods, in this method the appropriateness is considered in proportion with the whole population and we try to remove the impossible solutions. The optimal solution is chosen from among a multitude of provided responses. Therefore, it was found that we can reach the optimal solutions with regard to a better appropriateness.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Fitness function</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Genetic Algorithm</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Mimetic Algorithm</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Rotatory Inverse List (RIL)</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Timing</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_62191_19b66474d494af8f36e96d70e479ce0c.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Extracting Customer Behavior Pattern in a Telecom Company Using Temporal Fuzzy Clustering and Data Mining</ArticleTitle>
<VernacularTitle>استخراج الگوی رفتار مشتریان یک شرکت مخابراتی با استفاده از خوشه‌بندی پویای فازی و تحلیل مسیر</VernacularTitle>
			<FirstPage>549</FirstPage>
			<LastPage>570</LastPage>
			<ELocationID EIdType="pii">61437</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61437</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Fathian</LastName>
<Affiliation>Prof. of System Engineering, Iran University of Science and Technology, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Ehsan</FirstName>
					<LastName>Azhdari</LastName>
<Affiliation>MSc. Student in Industrial Engineering, Iran University of Science and Technology, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2016</Year>
					<Month>10</Month>
					<Day>05</Day>
				</PubDate>
			</History>
		<Abstract>One of the most important issues in Customer Relationship Management is customer segmentation and product offer based on their needs. In practice, Customer’s behavior will change over the time by changes in technology, increase in the number of new customers and new competitors, and product variety. Traditional segmentation models that are static over time cannot predict these changes in customer’s behavior and ignore them. This challenge is especially critical in Telecommunication with high churn rates. In this research, we have used temporal fuzzy clustering to detect significant changes in customers&#039; behavior for a telecom company during a 10-month period. The aim of this study is to find factors that affect structural and gradual changes in clustering model. In addition, we have suggested a method based on Frechet distance to extract similar patterns in customer’s usage behavior. Provided that combining the temporal clustering with trajectory analysis is an effective way to recognize customers’ behavior among the clusters, the results showed that there are seven distinct customer behavior patterns two of which lead to the customer drop or churn. These patterns can be used to reduce the risk and costs of customers churn and to design optimum services.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">customer behavior</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Data Mining</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Dynamic Clustering</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Fuzzy clustering</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Trajectory Analysis</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61437_b4f32939f20e361592d9d16f9fd58e32.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Segmenting Costumers Based on Their Reactions to Social Networks Marketing on Instagram</ArticleTitle>
<VernacularTitle>بخش‌بندی مشتریان بر اساس واکنش آنها به بازاریابی شبکه‎های اجتماعی (مطالعۀ موردی: اینستاگرام)</VernacularTitle>
			<FirstPage>571</FirstPage>
			<LastPage>586</LastPage>
			<ELocationID EIdType="pii">62217</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.62217</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Rashin</FirstName>
					<LastName>Ghahreman</LastName>
<Affiliation>MSc. Student, EMBA- Marketing, Faculty of Management, Tehran University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Masoud</FirstName>
					<LastName>Keimasi</LastName>
<Affiliation>Assistant Prof., Faculty of Management, Tehran University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Ali</FirstName>
					<LastName>Heidari</LastName>
<Affiliation>Assistant Prof., Faculty of Management, Tehran University, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2016</Year>
					<Month>09</Month>
					<Day>19</Day>
				</PubDate>
			</History>
		<Abstract>Since customers react differently to business and marketing on social networks, the researcher is looking for segmenting customers into different categories according to their reaction to marketing in social networks. The present study is a descriptive-exploratory research and the data were collected through a questionnaire. The population of 14,000 follower of the researcher’s personal page on Instagram were analyzed and a sample 224 members were randomly selected. To analyze the data, a two-step clustering method was applied. As a result, five distinct clusters (the active, the talker, the hesitant, the passive and the averse) were identified. Two segments were reported to be highly influenced by social networks marketing in terms of brand engagement, purchase intention and word of mouth advertisement (WOM). The &quot;Active&quot; are the most influenced group including 18.3% of the population most of whom are single girls or women. The next group that are influenced the most by social networks marketing is the &quot;Talker&quot;. This group represents 24.1% of the population, the most populated group. The &quot;Talker&quot; are different from the &quot;Active&quot; in term of their intention to purchase. Totally, 42.2% of the population are reported to be influenced by social networks marketing.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Costumer Reaction</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Marketing</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Clustering</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Segmenting Costumers</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">social networks</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_62217_14759f51f87ac9aa288736639c75a983.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Determining Influential Users in Social Networks (The Case of: Word of Mouth on Digikala Company Instagram Page)</ArticleTitle>
<VernacularTitle>شناسایی افراد مؤثر در تبلیغات توصیه‌ای در بستر شبکه‌های اجتماعی آنلاین (مطالعۀ موردی: شبکۀ اینستاگرام شرکت دیجی‎کالا)</VernacularTitle>
			<FirstPage>587</FirstPage>
			<LastPage>612</LastPage>
			<ELocationID EIdType="pii">61727</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61727</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Mohammad Reza</FirstName>
					<LastName>Karimi Alavijeh</LastName>
<Affiliation>Assistant Prof. in Business Management, Allameh Tabataba’i University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Bakhshi</LastName>
<Affiliation>MSc. in Business Management, Allameh Tabataba’i University, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2017</Year>
					<Month>01</Month>
					<Day>18</Day>
				</PubDate>
			</History>
		<Abstract>The emergence of social networks is one of the most influential phenomena of the 21st century. Social networking cyberspace creates a broad area of information and a variety of semantic representations. Social networks connect different people with different interests and ideas together. Due to the huge amount of intellectual potential and human thought in social networks, a great number of businessmen or retailors and commerce managers are attracted to such networks. The main objective of this study is to identify the most effective members in the cycle of content propagation on social networks and to propose solutions to improve the propagation of advertising and marketing on social networks to help business owners and managers. The case study of this research is &quot;DigiKala&quot; Instagram social network. At first, using the NodeXL software, the general content of DigiKala Instagram pages were collected. In the next step, applying clustering methods we found effective people using AlSuwaidan framework. Then, the collected data were processed using Matlab software. Finally, the obtained results were evaluated and based on the tests, 9 of the most influential people in accordance with the highest coefficient in publishing content on the social network were introduced.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">cyberspace</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Identification forum</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">social networking</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Viral marketing</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Word of mouth</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61727_d7a5d816f0eecdb7126992c808c9291e.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Multiplicity and Exchange in the World Trade and Applied Diplomacy Structure Regarding
Social Network Analysis</ArticleTitle>
<VernacularTitle>چندگانکی و تبادل در ساختار روابط تجاری و دیپلماتیک: کاربردی از تحلیل شبکۀ اجتماعی</VernacularTitle>
			<FirstPage>613</FirstPage>
			<LastPage>636</LastPage>
			<ELocationID EIdType="pii">61725</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61725</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Saeed</FirstName>
					<LastName>NasehiMoghaddam</LastName>
<Affiliation>MSc., Industrial Engineering, Iran University of Science and Technology, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mehdi</FirstName>
					<LastName>Ghazanfari</LastName>
<Affiliation>Prof. Industrial Engineering, Iran University of Science and Technology, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2016</Year>
					<Month>07</Month>
					<Day>22</Day>
				</PubDate>
			</History>
		<Abstract>In the Multi-relational networks, the study of concurrent choices or multiplicity, and exchanging the choices is important. In this paper, we reviewed multiplicity and exchange in the literature and tried to study these effects in the world network of trade and diplomacy. In addition to reporting the results of exploiting other researchers’ contributions in the case of trade and diplomacy relations on our data, we proposed our own solution to study and evaluate social structure in the situation that multiplicity and exchange effects are significant. Due to the significant number of concurrent choices and choice exchange, we used appropriate probable block model of multiplicity and exchange. Specifically, we found that there are four clear patterns in the world trade and diplomacy network: Trade affected by diplomatic hosting, Trade affected by diplomatic activity, Diplomacy affected by export and Diplomacy affected by import.
 </Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Block modeling</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Exponential random graph model</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Multiplicity and exchange pattern</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Positional analysis</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">World system</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61725_04acaef2b886feb12e2e34562f807096.pdf</ArchiveCopySource>
</Article>

<Article>
<Journal>
				<PublisherName>Univrsity Of Tehran Press</PublisherName>
				<JournalTitle>Journal of Information Technology Management</JournalTitle>
				<Issn>2980-7972</Issn>
				<Volume>9</Volume>
				<Issue>3</Issue>
				<PubDate PubStatus="epublish">
					<Year>2017</Year>
					<Month>09</Month>
					<Day>01</Day>
				</PubDate>
			</Journal>
<ArticleTitle>Designing Knowledge Map for Knowledge Management projects Using Network Analysis</ArticleTitle>
<VernacularTitle>تدوین نقشۀ دانش برای پژوهش‎های مدیریت دانش با استفاده از روش تحلیل شبکه‎ای</VernacularTitle>
			<FirstPage>637</FirstPage>
			<LastPage>657</LastPage>
			<ELocationID EIdType="pii">61464</ELocationID>
			
<ELocationID EIdType="doi">10.22059/jitm.2017.61464</ELocationID>
			
			<Language>EN</Language>
<AuthorList>
<Author>
					<FirstName>Heidar</FirstName>
					<LastName>Najafi</LastName>
<Affiliation>MSc. Student in Information Technology Systems, Tarbiat Modares University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Mohammad</FirstName>
					<LastName>Aghdasi</LastName>
<Affiliation>Associate Prof. of Industrial Engineering, Tarbiat Modares University, Tehran, Iran</Affiliation>

</Author>
<Author>
					<FirstName>Babak</FirstName>
					<LastName>Teimurpoor</LastName>
<Affiliation>Assistant Prof. of Industrial Engineering, Tarbiat Modares University, Tehran, Iran</Affiliation>

</Author>
</AuthorList>
				<PublicationType>Journal Article</PublicationType>
			<History>
				<PubDate PubStatus="received">
					<Year>2014</Year>
					<Month>11</Month>
					<Day>23</Day>
				</PubDate>
			</History>
		<Abstract>In this research knowledge management has been studied as an interdisciplinary area. We aim to find an answer for this question that &quot;what are the scientific structure and knowledge map of knowledge management projects regarding these two aspect of subject areas and keywords. For this purpose, nearly 40000 scientific documents including knowledge management as one of their keywords were selected from Scopus database and were studied in various subject areas. In this research,bar charts have been drawn for each index of subject areas and keywords. Besides, using Co-occurrence matrix, adjacency graphs were drawn and then clustered using Average-Link algorithm. Bar charts and graphs were drawn using R and Excel software. The results of this research showed that among the researches on knowledge management in the world, the most relevant scientific fields to knowledge management are Computer Sciences with 32.5%, Business, Management and Accounting with 14.5%, Engineering with 13.7%, Decisive Sciences with 12.6%, Mathematics with 7.07%, and Social Sciences with 6.63%, respectively. The most keywords collocate with knowledge management in the world are Human-Computer Interaction, Information Management, Systems Management, Information Technology, Manufacturing, Acquisition of Knowledge, Semantics, Knowledge Transfer, Ontology and Information Retrieval.</Abstract>
		<ObjectList>
			<Object Type="keyword">
			<Param Name="value">Clustering</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Evaluation</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Knowledge Management</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">Knowledge Map</Param>
			</Object>
			<Object Type="keyword">
			<Param Name="value">network analysis</Param>
			</Object>
		</ObjectList>
<ArchiveCopySource DocType="pdf">https://jitm.ut.ac.ir/article_61464_7e87140ef8c7d107c4c79a7060be8dc4.pdf</ArchiveCopySource>
</Article>
</ArticleSet>
