Papers by ramesh kumar ayyasamy
Education and Information Technologies, May 2, 2023
Bookmarks Related papers MentionsView impact
CRC Press eBooks, Aug 4, 2023
Bookmarks Related papers MentionsView impact
IEEE Access, 2022
Bookmarks Related papers MentionsView impact
Computer systems science and engineering, 2023
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
IEEE Access, 2022
Bookmarks Related papers MentionsView impact
Work
BACKGROUND: Fear of losing psychological resources can lead to stress, impacting psychological he... more BACKGROUND: Fear of losing psychological resources can lead to stress, impacting psychological health and behavioral outcomes like burnout, absenteeism, service sabotage, and turnover. OBJECTIVE: The study examined the impact of job stressors (time pressure, role ambiguity, role conflict) on employee well-being and turnover intentions. The study also investigated the mediating role of employee well-being between job stressors and turnover intention based on the conservation of resources (COR) theory. METHODS: Data from 396 IT executives in Malaysian IT firms were analyzed using the Partial Least Squares - Structural Equation Modeling (PLS-SEM) technique. RESULTS: Results confirmed a significant negative correlation between time pressure (–0.296), role ambiguity (–0.423), role conflict (–0.104), and employee well-being. Similarly, employee well-being showed a significant negative relationship with turnover intentions (–0.410). The mediation analysis revealed that employee well-being ...
Bookmarks Related papers MentionsView impact
Business Ethics and Leadership
Small and medium-sized enterprises (SMEs) are considered to be the world’s largest. They play a v... more Small and medium-sized enterprises (SMEs) are considered to be the world’s largest. They play a vital role as they create jobs and improve the living conditions of their local communities as they contribute to the country’s GDP growth. Due to their contributions to the nation’s economy, they have been given much attention in entrepreneurship. This paper aims to study the impact of entrepreneurial education and entrepreneurial competencies on small and medium enterprises’ performance. Entrepreneurship is a vital component of any successful business strategy. It can be used to overcome the uncertainties of today’s business environment. The roles of these two independent factors in the business environment are also more relevant to small businesses. The goal of this paper is to develop a framework that explores the performance of firms from the perspective of their entrepreneurial education and entrepreneurial competencies. The proposed framework aims to provide a comprehensive view of...
Bookmarks Related papers MentionsView impact
Education and Information Technologies
Bookmarks Related papers MentionsView impact
2023 International Conference on Computer Communication and Informatics (ICCCI)
Bookmarks Related papers MentionsView impact
2023 International Conference on Computer Communication and Informatics (ICCCI)
Bookmarks Related papers MentionsView impact
2023 International Conference on Computer Communication and Informatics (ICCCI)
Bookmarks Related papers MentionsView impact
2022 3rd International Conference on Artificial Intelligence and Data Sciences (AiDAS)
One of the benefits of recognizing a slang, an idiom or an abbreviation in a tweet is the ability... more One of the benefits of recognizing a slang, an idiom or an abbreviation in a tweet is the ability to help in finding certain sentiment in a concise and understandable manner. However, a lack of adequate annotated "idiomatic tweets" makes classification challenging. We propose a pliable augmentation technique to improve the classification of idiomatic tweets with tiny training samples. For classification, we evaluate the performance of fine-tuning version of the pre-trained embedding model at different flavors. During the augmentation process, we deduce the intrinsic propositional meaning of the idiomatic expression from IBM's SliDE (Sentiment Lexicon of IDiomatic Expressions) and another lexicon we built. The empirical results show that the proposed method is beneficial in concealing the actual intent of the tweet and advantageous to tackle the problem of overfitting caused by smaller training sets.
Bookmarks Related papers MentionsView impact
2023 International Conference on Computer Communication and Informatics (ICCCI)
Bookmarks Related papers MentionsView impact
IEEE Access
Bookmarks Related papers MentionsView impact
2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)
Bookmarks Related papers MentionsView impact
IEEE Access
Bookmarks Related papers MentionsView impact
2022 3rd International Conference on Artificial Intelligence and Data Sciences (AiDAS)
Bookmarks Related papers MentionsView impact
2022 IEEE 5th International Symposium in Robotics and Manufacturing Automation (ROMA)
Malware is the most critical threat among other cybersecurity threats because it could be a disas... more Malware is the most critical threat among other cybersecurity threats because it could be a disaster for any organization, its resources, and operations. Due to noncompliance with adequate cybersecurity, SMEs are more vulnerable to malware attacks. Malware attacks can be known or unknown. SMEs must comply with adequate cybersecurity infrastructure to detect and mitigate these malware attacks. To the best of our knowledge, there is a limited study in the literature on finding the limitations of adopting cybersecurity infrastructure for malware detection and mitigation in Malaysian SMEs. In this paper, the factors have reviewed that influence the implementation of the cybersecurity infrastructure. These factors are further categorized into organizational, technical, and environmental challenges. A conceptual model for malware mitigation is designed based on the literature review findings. Furthermore, to design the proposed model, the most relevant theories, TOE (Technology, Organization, and Environment) and TAM (Technology Acceptance Model), are incorporated based on the literature review finding. This paper aims to propose a preliminary model for adopting technical cybersecurity infrastructure and mitigating malware threats in SMEs.
Bookmarks Related papers MentionsView impact
Journal of ICT Research and Applications
The large source of information space produced by the plethora of social media platforms in gener... more The large source of information space produced by the plethora of social media platforms in general and microblogging in particular has spawned a slew of new applications and prompted the rise and expansion of sentiment analysis research. We propose a sentiment analysis technique that identifies the main parts to describe tweet intent and also enriches them with relevant words, phrases, or even inferred variables. We followed a state-of-the-art hybrid deep learning model to combine Convolutional Neural Network (CNN) and the Long Short-Term Memory network (LSTM) to classify tweet data based on their polarity. To preserve the latent relationships between tweet terms and their expanded representation, sentence encoding and contextualized word embeddings are utilized. To investigate the performance of tweet embeddings on the sentiment analysis task, we tested several context-free models (Word2Vec, Sentence2Vec, Glove, and FastText), a dynamic embedding model (BERT), deep contextualized ...
Bookmarks Related papers MentionsView impact
Uploads
Papers by ramesh kumar ayyasamy