two

Factors Determining the Balance between Online and Face-to-Face Teaching: An Analysis using Actor-Network Theory




two

Second Time Lucky? A Tale of Two Systems




two

(SNTL #2) Social Networking in Undergraduate Education




two

Social Networking, Teaching, and Learning: Introduction to Special Section on Social Networking, Teaching, and Learning (SNTL)




two

Determinants of Intent to Continue Using Online Learning: A Tale of Two Universities




two

KenVACS: Improving Vaccination of Children through Cellular Network Technology in Developing Countries

Health Data collection is one of the major components of public health systems. Decision makers, policy makers, and medical service providers need accurate and timely data in order to improve the quality of health services. The rapid growth and use of mobile technologies has exerted pressure on the demand for mobile-based data collection solutions to bridge the information gaps in the health sector. We propose a prototype using open source data collection frameworks to test its feasibility in improving the vaccination data collection in Kenya. KenVACS, the proposed prototype, offers ways of collecting vaccination data through mobile phones and visualizes the collected data in a web application; the system also sends reminder short messages service (SMS) to remind parents on the date of the next vaccination. Early evaluation demonstrates the benefits of such a system in supporting and improving vaccination of children. Finally, we conducted a qualitative study to assess challenges in remote health data collection and evaluated usability and functionality of KenVACS.




two

Influential Factors of Collaborative Networks in Manufacturing: Validation of a Conceptual Model

The purpose of the study is to identify influential factors in the use of collaborative networks within the context of manufacturing. The study aims to investigate factors that influence employees’ learning, and to bridge the gap between theory and praxis in collaborative networks in manufacturing. The study further extends the boundary of a collaborative network beyond enterprises to include suppliers, customers, and external stakeholders. It provides a holistic perspective of collaborative networks within the complexity of the manufacturing environment, based on empirical evidence from a questionnaire survey of 246 respondents from diverse manufacturing industries. Drawing upon the socio-technical systems (STS) theory, the study presents the theoretical context and interpretations through the lens of manufacturing. The results show significant influences of organizational support, promotive interactions, positive interdependence, internal-external learning, perceived effectiveness, and perceived usefulness on the use of collaborative networks among manufacturing employees. The study offers a basis of empirical validity for measuring collaborative networks in organizational learning and knowledge/information sharing in manufacturing.




two

The Role of Social Network in Family Business Diversification: Evidence from South Eastern Nigeria

Aim/Purpose: This study seeks to investigate if participation in business association’s programs through the traditional and new media platforms influences family businesses in South Eastern Nigeria to diversify into similar or different businesses. Background: Before the advances in information and communication technology, businesses were carried on via the traditional media. The application of these advances has changed the way business communications and transactions are conducted globally in both family and non-family businesses. Businesses are adapting to today’s turbulent environment by opening similar or different businesses in the same or different locations that are hinged on the traditional and new media platforms. Nigerians are largely involved in social network through the traditional (face-to-face contact) and new media (e.g., Facebook, WhatsApp, Twitter, YouTube and Instagram). Moreover, in spite of the commonplaceness of family businesses in Nigeria, these businesses still experience weak diversification, bankruptcy and loss of socio-emotional wealth. Consequent upon the foregoing, this paper specifically investigates if involvement in social network via the traditional media (i.e., participation in business association’s meetings, workshops, seminars) and the new media (i.e., participation in the business association’s interactive sessions on trending business issues through the association’s online social platform like WhatsApp, Twitter), influence family businesses in South Eastern Nigeria to diversify into similar or different businesses. Methodology: The study adopted a qualitative methodology. The qualitative data were generated via interview involving 30 purposively selected businesses from South Eastern Nigeria. This comprises 15 family businesses each that have respectively adopted related and unrelated diversification strategies. Two respondents (i.e., the business owner and a top level manager) each were drawn from the selected businesses. In all, 60 respondents were interviewed. Since the unit of analysis is the family business, the interview transcriptions from all the respondents were subjected to thematic content analysis on the basis of the family businesses. Contribution: Active involvement and participation in all the meetings, discussions, workshops and seminars of the social network via the traditional and new media platforms facilitates the adoption of related or unrelated diversification in family businesses. Moreover, the adoption of similar social network platforms like WhatsApp and Twitter in all the relationships among and between employees and managers, and the transactions of the businesses is one of the key factors for achieving successful related or unrelated diversification in family businesses. Findings: In spite of the risky nature of the business environment, the adoption of related diversification strategies is significantly influenced by resources such as business consultancy services garnered through the traditional and new media platforms of the social network. Also, family businesses that are actively involved in a social network where the actors interact through the traditional and new media are influenced by the resources acquired to consider adopting unrelated diversification. These resources include: better understanding of the nature of business challenges, environments and experiences; and different lines of businesses. Thus, the traditional and new media platforms are complementary in their roles. Recommendations for Practitioners: Family business owner-managers could use the findings to develop related or unrelated strategies for diversifying into existing or new markets. This can be through the localization of manufacturing plant, improvement of product packaging, sitting of sales outlet closer to the consumers, introduction of lower prices for products/services, introduction of new and better ways of service delivery, or development of more compelling promotion strategies. Recommendation for Researchers: As a veritable guide, this study could guide future researchers in the formulation of their objectives, selection of instrument for data collection and respondents, and adoption of method of data analysis. Impact on Society: Successful diversification suggests the establishment of new or more businesses. Consequently, these new or more family businesses are expected to translate to more employment opportunities and by extension reduction in unemployment and poverty rates in the society. Future Research: Further studies should be carried out to enhance the development of family businesses, contribute to the existing literature and ensure the generalization of the findings.




two

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.




two

Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study

Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.




two

Epidemic Intelligence Models in Air Traffic Networks for Understanding the Dynamics in Disease Spread - A Case Study

Aim/Purpose: The understanding of disease spread dynamics in the context of air travel is crucial for effective disease detection and epidemic intelligence. The Susceptible-Exposed-Infectious-Recovered-Hospitalized-Critical-Deaths (SEIR-HCD) model proposed in this research work is identified as a valuable tool for capturing the complex dynamics of disease transmission, healthcare demands, and mortality rates during epidemics. Background: The spread of viral diseases is a major problem for public health services all over the world. Understanding how diseases spread is important in order to take the right steps to stop them. In epidemiology, the SIS, SIR, and SEIR models have been used to mimic and study how diseases spread in groups of people. Methodology: This research focuses on the integration of air traffic network data into the SEIR-HCD model to enhance the understanding of disease spread in air travel settings. By incorporating air traffic data, the model considers the role of travel patterns and connectivity in disease dissemination, enabling the identification of high-risk routes, airports, and regions. Contribution: This research contributes to the field of epidemiology by enhancing our understanding of disease spread dynamics through the application of the SIS, SIR, and SEIR-HCD models. The findings provide insights into the factors influencing disease transmission, allowing for the development of effective strategies for disease control and prevention. Findings: The interplay between local outbreaks and global disease dissemination through air travel is empirically explored. The model can be further used for the evaluation of the effectiveness of surveillance and early detection measures at airports and transportation hubs. The proposed research contributes to proactive and evidence-based strategies for disease prevention and control, offering insights into the impact of air travel on disease transmission and supporting public health interventions in air traffic networks. Recommendations for Practitioners: Government intervention can be studied during difficult times which plays as a moderating variable that can enhance or hinder the efficacy of epidemic intelligence efforts within air traffic networks. Expert collaboration from various fields, including epidemiology, aviation, data science, and public health with an interdisciplinary approach can provide a more comprehensive understanding of the disease spread dynamics in air traffic networks. Recommendation for Researchers: Researchers can collaborate with international health organizations and authorities to share their research findings and contribute to a global understanding of disease spread in air traffic networks. Impact on Society: This research has significant implications for society. By providing a deeper understanding of disease spread dynamics, it enables policymakers, public health officials, and practitioners to make informed decisions to mitigate disease outbreaks. The recommendations derived from this research can aid in the development of effective strategies to control and prevent the spread of infectious diseases, ultimately leading to improved public health outcomes and reduced societal disruptions. Future Research: Practitioners of the research can contribute more effectively to disease outbreaks within the context of air traffic networks, ultimately helping to protect public health and global travel. By considering air traffic patterns, the SEIR-HCD model contributes to more accurate modeling and prediction of disease outbreaks, aiding in the development of proactive and evidence-based strategies to manage and mitigate the impact of infectious diseases in the context of air travel.




two

Investigating the Impact of Dual Network Embedding and Dual Entrepreneurial Bricolage on Knowledge-Creation Performance: An Empirical Study in Fujian, China

Aim/Purpose: This study investigates the relationship between dual network embedding, dual entrepreneurial bricolage, and knowledge-creation performance. Background: The importance of new ventures for innovation and economic growth has been fully endorsed. Establishing incubation organizations to help new startups overcome constraints and dilemmas has become the consensus of various countries. In particular, the number of Chinese makerspaces has rapidly increased. Startups in the makerspaces form a loosely coupled dual network to cooperate and share resources, especially knowledge. Methodology: By convenience sampling, 400 startups in the makerspaces in Fujian Province, China were selected for the questionnaire survey study. In total, 307 valid responses were collected, yielding a response rate of 76.8%. The survey data were analyzed for hypothesis testing, using the PL-SEM technique with the AMOS20.0 software. Contribution: At the theoretical level, this research supplements the exploration of the influencing factors of the entrepreneurial bricolage of startups at the network level. It deepens the research on the internal mechanism of the dual network embeddedness affecting the knowledge-creation performance. In practice, it provides a theoretical basis and management inspiration for startups in makerspaces to overcome the inherent disadvantage of being too small and weak to explore innovative paths. Findings: First, relational embedding of startups in makerspaces directly affects knowledge-creation performance. Second, dual entrepreneurial bricolage plays a mediating role in diversity. Selective entrepreneurial bricolage plays a partial mediating role between relationship embedding and knowledge-creation performance. Parallel entrepreneurial bricolage plays a complete intermediary role between structural embedding and knowledge-creation performance. Dual entrepreneurial bricolage plays a complete intermediary role between knowledge embedding and knowledge-creation performance. Recommendations for Practitioners: Enterprises in the makerspaces should make dynamic adjustments to the network embedded state and dual entrepreneurial bricolage to improve knowledge-creation performance. When startups conduct selective entrepreneurship bricolage, they should strengthen relational and knowledge embeddedness to improve their relationship strength and tacit knowledge acquisition. When startups conduct parallel entrepreneurship bricolage, structural and knowledge embedding should be strengthened to improve the position of enterprises in the network to acquire diversified knowledge to explore and discover new business opportunities and project resources. Recommendation for Researchers: The heterogeneity of industries and regions may impact the dual network embedding mechanism of startups. Researchers can choose a wider range of regions and industries for sampling. Impact on Society: This study provides a theoretical basis and management inspiration for startups to overcome the inherent disadvantage of being too small and weak to explore innovative paths. It provides a basis to support startups in unleashing innovation vitality and achieving healthy growth. Future Research: Previous studies have shown that network relationships and bricolage behavior have a certain relationship with the enterprise life cycle. Future research can adopt a longitudinal research design across time points, which will increase the explanatory power of research conclusions.




two

Employing Artificial Neural Networks and Multiple Discriminant Analysis to Evaluate the Impact of the COVID-19 Pandemic on the Financial Status of Jordanian Companies

Aim/Purpose: This paper aims to empirically quantify the financial distress caused by the COVID-19 pandemic on companies listed on Amman Stock Exchange (ASE). The paper also aims to identify the most important predictors of financial distress pre- and mid-pandemic. Background: The COVID-19 pandemic has had a huge toll, not only on human lives but also on many businesses. This provided the impetus to assess the impact of the pandemic on the financial status of Jordanian companies. Methodology: The initial sample comprised 165 companies, which was cleansed and reduced to 84 companies as per data availability. Financial data pertaining to the 84 companies were collected over a two-year period, 2019 and 2020, to empirically quantify the impact of the pandemic on companies in the dataset. Two approaches were employed. The first approach involved using Multiple Discriminant Analysis (MDA) based on Altman’s (1968) model to obtain the Z-score of each company over the investigation period. The second approach involved developing models using Artificial Neural Networks (ANNs) with 15 standard financial ratios to find out the most important variables in predicting financial distress and create an accurate Financial Distress Prediction (FDP) model. Contribution: This research contributes by providing a better understanding of how financial distress predictors perform during dynamic and risky times. The research confirmed that in spite of the negative impact of COVID-19 on the financial health of companies, the main predictors of financial distress remained relatively steadfast. This indicates that standard financial distress predictors can be regarded as being impervious to extraneous financial and/or health calamities. Findings: Results using MDA indicated that more than 63% of companies in the dataset have a lower Z-score in 2020 when compared to 2019. There was also an 8% increase in distressed companies in 2020, and around 6% of companies came to be no longer healthy. As for the models built using ANNs, results show that the most important variable in predicting financial distress is the Return on Capital. The predictive accuracy for the 2019 and 2020 models measured using the area under the Receiver Operating Characteristic (ROC) graph was 87.5% and 97.6%, respectively. Recommendations for Practitioners: Decision makers and top management are encouraged to focus on the identified highly liquid ratios to make thoughtful decisions and initiate preemptive actions to avoid organizational failure. Recommendation for Researchers: This research can be considered a stepping stone to investigating the impact of COVID-19 on the financial status of companies. Researchers are recommended to replicate the methods used in this research across various business sectors to understand the financial dynamics of companies during uncertain times. Impact on Society: Stakeholders in Jordanian-listed companies should concentrate on the list of most important predictors of financial distress as presented in this study. Future Research: Future research may focus on expanding the scope of this study by including other geographical locations to check for the generalisability of the results. Future research may also include post-COVID-19 data to check for changes in results.




two

Learning to (Co)Evolve: A Conceptual Review and Typology of Network Design in Global Health Virtual Communities of Practice

Aim/Purpose: This conceptual review analyzes the designs of global health virtual communities of practice (VCoPs) programming reported in the empirical literature and proposes a new typology of their functioning. The purpose of this review is to provide clarity on VCoP learning stages of (co)evolution and insight into VCoP (re)development efforts to best meet member, organization, and network needs against an ever-evolving landscape of complexity in global health. Background: Since the COVID-19 pandemic, the field of global health has seen an uptick in the use of VCoPs to support continuous learning and improve health outcomes. However, evidence of how different combinations of programmatic designs impact opportunities for learning and development is lacking, and how VCoPs evolve as learning networks has yet to be explored. Methodology: Following an extensive search for literature in six databases, thematic analysis was conducted on 13 articles meeting the inclusion criteria. This led to the development and discussion of a new typology of VCoP phases of learning (co)evolution. Contribution: Knowledge gained from this review and the new categorization of VCoPs can support the functioning and evaluation of global health training programs. It can also provide a foundation for future research on how VCoPs influence the culture of learning organizations and networks. Findings: Synthesis of findings resulted in the categorization of global health VCoPs into five stages (slightly evolving, somewhat revolving, moderately revolving, highly revolving, and coevolving) across four design domains (network development, general member engagement before/after sessions, general member engagement during sessions, and session leadership). All global health VCoPs reviewed showed signs of adaptation and recommended future evolution. Recommendations for Practitioners: VCoP practitioners should pay close attention to how the structured flexibility of partnerships, design, and relationship development/accountability may promote or hinder VcoP’s continued evolution. Practitioners should shift perspective from short to mid- and long-term VCoP planning. Recommendation for Researchers: The new typology can stimulate further research to strengthen the clarity of language and findings related to VCoP functioning. Impact on Society: VCoPs are utilized by academic institutions, the private sector, non-profit organizations, the government, and other entities to fill gaps in adult learning at scale. The contextual implementation of findings from this study may impact VCoP design and drive improvements in opportunities for learning, global health, and well-being. Future Research: Moving forward, future research could explore how VCoP evaluations relate to different stages of learning, consider evaluation stages across the totality of VCoP programming design, and explore how best to capture VCoP (long-term) impact attributed to health outcomes and the culture of learning organizations and networks.




two

Personalized Tourism Recommendations: Leveraging User Preferences and Trust Network

Aim/Purpose: This study aims to develop a solution for personalized tourism recommendations that addresses information overload, data sparsity, and the cold-start problem. It focuses on enabling tourists to choose the most suitable tourism-related facilities, such as restaurants and hotels, that match their individual needs and preferences. Background: The tourism industry is experiencing a significant shift towards digitalization due to the increasing use of online platforms and the abundance of user data. Travelers now heavily rely on online resources to explore destinations and associated options like hotels, restaurants, attractions, transportation, and events. In this dynamic landscape, personalized recommendation systems play a crucial role in enhancing user experience and ensuring customer satisfaction. However, existing recommendation systems encounter major challenges in precisely understanding the complexities of user preferences within the tourism domain. Traditional approaches often rely solely on user ratings, neglecting the complex nature of travel choices. Data sparsity further complicates the issue, as users might have limited interactions with the system or incomplete preference profiles. This sparsity can hinder the effectiveness of these systems, leading to inaccurate or irrelevant recommendations. The cold-start problem presents another challenge, particularly with new users who lack a substantial interaction history within the system, thereby complicating the task of recommending relevant options. These limitations can greatly hinder the performance of recommendation systems and ultimately reduce user satisfaction with the overall experience. Methodology: The proposed User-based Multi-Criteria Trust-aware Collaborative Filtering (UMCTCF) approach exploits two key aspects to enhance both the accuracy and coverage of recommendations within tourism recommender systems: multi-criteria user preferences and implicit trust networks. Multi-criteria ratings capture the various factors that influence user preferences for specific tourism items, such as restaurants or hotels. These factors surpass a simple one-star rating and take into account the complex nature of travel choices. Implicit trust relationships refer to connections between users that are established through shared interests and past interactions without the need for explicit trust declarations. By integrating these elements, UMCTCF aims to provide more accurate and reliable recommendations, especially when data sparsity limits the ability to accurately predict user preferences, particularly for new users. Furthermore, the approach employs a switch hybridization scheme, which combines predictions from different components within UMCTCF. This scheme leads to a more robust recommendation strategy by leveraging diverse sources of information. Extensive experiments were conducted using real-world tourism datasets encompassing restaurants and hotels to evaluate the effectiveness of UMCTCF. The performance of UMCTCF was then compared against baseline methods to assess its prediction accuracy and coverage. Contribution: This study introduces a novel and effective recommendation approach, UMCTCF, which addresses the limitations of existing methods in personalized tourism recommendations by offering several key contributions. First, it transcends simple item preferences by incorporating multi-criteria user preferences. This allows UMCTCF to consider the various factors that users prioritize when making tourism decisions, leading to a more comprehensive understanding of user choices and, ultimately, more accurate recommendations. Second, UMCTCF leverages the collective wisdom of users by incorporating an implicit trust network into the recommendation process. By incorporating these trust relationships into the recommendation process, UMCTCF enhances its effectiveness, particularly in scenarios with data sparsity or new users with limited interaction history. Finally, UMCTCF demonstrates robustness towards data sparsity and the cold-start problem. This resilience in situations with limited data or incomplete user profiles makes UMCTCF particularly suitable for real-world applications in the tourism domain. Findings: The results consistently demonstrated UMCTCF’s superiority in key metrics, effectively addressing the challenges of data sparsity and new users while enhancing both prediction accuracy and coverage. In terms of prediction accuracy, UMCTCF yielded significantly more accurate predictions of user preferences for tourism items compared to baseline methods. Furthermore, UMCTCF achieved superior coverage compared to baseline methods, signifying its ability to recommend a wider range of tourism items, particularly for new users who might have limited interaction history within the system. This increased coverage has the potential to enhance user satisfaction by offering a more diverse and enriching set of recommendations. These findings collectively highlight the effectiveness of UMCTCF in addressing the challenges of personalized tourism recommendations, paving the way for improved user satisfaction and decision-making within the tourism domain. Recommendations for Practitioners: The proposed UMCTCF approach offers a potential opportunity for tourism recommendation systems, enabling practitioners to create solutions that prioritize the needs and preferences of users. By incorporating UMCTCF into online tourism platforms, tourists can utilize its capabilities to make well-informed decisions when selecting tourism-related facilities. Furthermore, UMCTCF’s robust design allows it to function effectively even in scenarios with data sparsity or new users with limited interaction history. This characteristic makes UMCTCF particularly valuable for real-world applications, especially in scenarios where these limitations are common obstacles. Recommendation for Researchers: The success of UMCTCF can open up new avenues in personalized recommendation research. One promising direction lies in exploring the integration of additional contextual information, such as temporal (time-based) or location-based information. By incorporating these elements, the model could be further improved, allowing for even more personalized recommendations. Furthermore, exploring the potential of UMCTCF in domains other than tourism has considerable significance. By exploring its effectiveness in other e-commerce domains, researchers can broaden the impact of UMCTCF and contribute to the advancement of personalized recommendation systems across various industries. Impact on Society: UMCTCF has the potential to make a positive impact on society in various ways. By delivering accurate and diverse recommendations that are tailored to individual user preferences, UMCTCF fosters a more positive and rewarding user experience with tourism recommendation systems. This can lead to increased user engagement with tourism platforms, ultimately enhancing overall satisfaction with travel planning. Furthermore, UMCTCF enables users to make more informed decisions through broader and more accurate recommendations, potentially reducing planning stress and leading to more fulfilling travel experiences. Future Research: Expanding upon the success of UMCTCF, future research activities can explore several promising paths. Enriching UMCTCF with various contextual data, such as spatial or location-based data, to enhance recommendation accuracy and relevance. Leveraging user-generated content, like reviews and social media posts, could provide deeper insights into user preferences and sentiments, improving personalization. Additionally, applying UMCTCF in various e-commerce domains beyond tourism, such as online shopping, entertainment, and healthcare, could yield valuable insights and enhance recommendation systems. Finally, exploring the integration of optimization algorithms could improve both recommendation accuracy and efficiency.




two

Building a Framework to Support Project-Based Collaborative Learning Experiences in an Asynchronous Learning Network




two

"Islands of Innovation" or "Comprehensive Innovation." Assimilating Educational Technology in Teaching, Learning, and Management: A Case Study of School Networks in Israel




two

Adoption of Online Network Tools by Minority Students: The Case of Students of Ethiopian Origin in Israel

Students of Ethiopian origin belong to one of the weakest sectors in the Jewish population of Israel. During their studies they have to deal with social alienation, cultural gaps, economic hardships, and racial stereotypes which reduce their chances to successfully complete their academic degree. In this respect, the present research asks whether online social media could provide those youngsters with tools and resources for their better social integration and adaptation to the academic life. For this purpose, the study was conducted in one of Israel’s largest academic colleges while adopting a design-based research approach, which advanced gradually on a continuum between ‘ambient’ and ‘designed’ technology-enhanced learning communities. The interventions applied for this study aimed at examining how they may encourage students of Ethiopian origin to expand their activities in the online social learning groups. The findings indicate that the main pattern of students of Ethiopian origin online participation was peripheral and limited to viewing only. Nevertheless, the level of their online activity has been improved after a series of two interventions, which also led to a slight improvement in indicators of their social integration and in a change in their usage of online learning groups from social to academic uses.




two

Going Behind the Scenes at Teacher Colleges: Online Student Knowledge Sharing through Social Network Technologies

Aim/Purpose: The present study aims to describe existing peer-to-peer, social network-based sharing practices among adult students in teacher colleges. Background: Ubiquitous social network sites open up a wide array of possibilities for peer-to-peer information and knowledge sharing. College instructors are often unaware of such practices that happen behind the scenes. Methodology: An interpretative, qualitative research methodology was used. Thirty-seven Israeli students at a teacher college in Israel participated in either focus group discussions of (N = 29) or in-depth interviews (N = 8). Contribution: Whereas knowledge sharing has been a main focus of research in organizational and information sciences, its relevance to educational settings has thus far been underscored. Recent research shows that peer–to-peer knowledge sharing is wide-spread among teenage students. The current study extends that work to an adult student population. Findings: The findings show that knowledge sharing of this type is a common and even central feature of students’ college life and study behavior. It takes place through a variety of small and larger social network-based peer groups of different formations, including mostly college students but at time also practicing, experienced teachers. Sharing groups are formed on the spot for short term purposes or are stable, continuous over longer time periods. The contents shared are predominantly lesson summaries, material for exams, reading summaries, and lesson plans. They are used immediately or stored for future use, as students have access to vast data bases of stored materials that have been compiled throughout the years by students of previous cohorts. Teacher students mentioned a range of reasons for sharing, and overall regard it very positive. However, some downsides were also acknowledged (i.e., superficial learning, exclusion, attentional overload, and interruptions). Recommendations for Practitioners: College faculty and teaching staff should be cognizant and informed about these widespread peer-based knowledge sharing practices and consider whether perhaps changes in teaching formats and task assignments are required as a result. Future Research: Future research should extend this work to other higher education settings, cultures and countries, and should map the perceptions of higher education teaching staff about peer-to-peer, online knowledge sharing.




two

E-Safety in the Use of Social Networking Apps by Children, Adolescents, and Young Adults

Aim/Purpose: Following the widespread use of social networking applications (SNAs) by children, adolescents, and young adults, this paper sought to examine the usage habits, sharing, and dangers involved from the perspective of the children, adolescents, and young adults. The research question was: What are the usage habits, sharing, drawbacks, and dangers of using SNAs from the perspective of children, adolescents, and young adults? Background: Safety has become a major issue and relates to a range of activities including online privacy, cyberbullying, exposure to violent content, exposure to content that foments exclusion and hatred, contact with strangers online, and coarse language. The present study examined the use of social networking applications (SNAs) by children, adolescents, and young adults, from their point of view. Methodology: This is a mixed-method study; 551participants from Israel completed questionnaires, and 110 respondents were also interviewed. Contribution: The study sought to examine from their point of view (a) characteristics of SNA usage; (b) the e-safety of SNA; (c) gender differences between age groups; (d) habits of use; (e) hazards and solutions; and (f) sharing with parents and parental control. Findings: Most respondents stated that cyberbullying (such as shaming) happens mainly between members of the group and it is not carried out by strangers. The study found that children’s awareness of the connection between failures of communication in the SNAs and quarrels and disputes was lower than that of adolescents and young adults. It was found that more children than adolescents and young adults believe that monitoring and external control can prevent the dangers inherent in SNAs, and that the awareness of personal responsibility increases with age. The SNAs have intensified the phenomenon of shaming, but the phenomenon is accurately documented in SNAs, unlike in face-to-face communication. Therefore, today more than ever, it is possible and necessary to deal with shaming, both in face-to-face and in SNA communication. Recommendations for Practitioners: Efforts should be made to resolve the issue of shaming among members of the group and to explain the importance of preserving human dignity and privacy. The Internet in general and SNAs in particular are an integral part of children’s and adolescents’ life environment, so it can be said that the SNAs are part of the problem because they augment shaming. But they can also be part of the solution, because interactions are accurately documented, unlike in face-to-face communication, where it is more difficult to examine events, to remember exactly what has been said, to point out cause and effect, etc. Therefore, more than ever before, today it is possible and necessary to deal with shaming both in face-to-face and in the SNA communication, because from the point of view of youngsters, this is their natural environment, which includes smart phones, SNAs, etc. Recommendations for Researchers: The study recommends incorporating in future studies individual case studies and allowing participants to express how they perceive complex e-Safety situa-tions in the use of social networking apps. Impact on Society: Today more than ever, it is possible and necessary to deal with shaming, both in face-to-face and in SNA communication. Future Research: The study was unable to find significant differences between age groups. Fur-ther research may shed light on the subject.




two

Work-Based Learning and Research for Mid-Career Professionals: Two Project Examples from Australia

Aim/Purpose: Most research on work-based learning and research relates to theory, including perspectives, principles and curricula, but few studies provide contemporary examples of work-based projects, particularly in the Australian context; this paper aims to address that limitation. Background: The Professional Studies Program at University of Southern Queensland is dedicated to offering advanced practice professionals the opportunity to self-direct organizational and work-based research projects to solve real-world workplace problems; two such examples in the Australian context are provided by this paper. Methodology: The paper employs a descriptive approach to analyzing these two work-based research projects and describes the mixed methods used by each researcher. Contribution: The paper provides examples of work-based research in (a) health, safety, and wellness leadership and its relation to corporate performance; and (b) investigator identity in the Australian Public Service; neither topic has been examined before in Australia and little, if anything, is empirically known about these topics internationally. Findings: The paper presents the expected outcomes for each project, including discussion of the ‘triple dividend’ of personal, organizational, and practice domain benefits; as importantly, the paper presents statements of workplace problems, needs and opportunities, status of the practice domain, background and prior learning of the researchers, learning objectives, work-based research in the practice domain, and lessons learned from research which can be integrated into a structured framework of advanced practice. Recommendations for Practitioners: This is a preliminary study of two work-based research projects in Australia; as these and other real-world projects are completed, further systematic and rigorous reports to the international educational community will reveal the granulated value of conducting projects designed to change organisations and concordant practice domains. Recommendation for Researchers: While introducing the basic elements of research methods and expected out-comes of work-based projects, examples in this paper give only a glimpse into the possible longer-term contributions such research can make to workplaces in Australia. Researchers, as a consequence, need to better understand the relationship between practice domains, research as a valuable investigative tool in workplaces, and organizational and social outcomes. Impact on Society: Work-based learning and research have been developed to not only meet the complex and changing demands of the global workforce but have been implemented to address real-world organizational problems for the benefit of society; this paper provides two examples where such benefit may occur. Future Research: Future research should focus on the investigation of triple-dividend outcomes and whether they are sustainable over the longer term.




two

Accelerated Professional Identity Development Through Social Network Sites

Aim/Purpose: This study aims to uncover how Social Network Sites (SNSs) active users who are eager to be knowledgeable about a specific domain develop a professional identity, what practices they use, and how do SNSs afford professional identity development. Background: Some researchers have shown that SNSs play a central role in personal development, but there is a lack of studies tracing the actual role of SNSs affordances in professional identity development. Methodology: Seven participants were followed during a whole year; we examined their professional identity development based on data collected from interviews, cued retrospective reports, and online activities. Contribution: The study shows that SNSs create a new context for professional identity development, a context whose new characteristics bring specific actors to a spectacular development in their professional identity. Based on the findings we suggest a new framework of professional identity development with SNSs. Findings: We identified a wide range of activities and changes in the perceived professional identity. We found that there are four phases of SNS’s professional identity development. The study also uncovers the three aspects of identity development: self-presentation, around-the-clock sociality, and interaction with information. The model of professional development through intensive use of SNSs is validated by our reports on the actual behaviors afforded by SNSs. Recommendations for Practitioners: The conceptual framework displayed in the article can help educational institutions to implement SNSs in order to enhance professional identity development. Guidance will allow students to handle self-presentation, sociality, and information management. By doing so, the guides will help achieving meaningful SNS activities and encouraging students to be involved in their fields of interest, thereby enhancing their professional identity. Future Research: Future studies may examine the implementation of SNSs for the exploration process leading to identity development in various educational institutions. A few years longitudinal study may examine the lifelong professional identity development in varied SNSs. Moreover, in the COVID-19 world crisis when life is in digital spaces more than ever, it will be interesting to study the role of SNSs of professional identity development in the population that lost their jobs.




two

From an Artificial Neural Network to Teaching

Aim/Purpose: Using Artificial Intelligence with Deep Learning (DL) techniques, which mimic the action of the brain, to improve a student’s grammar learning process. Finding the subject of a sentence using DL, and learning, by way of this computer field, to analyze human learning processes and mistakes. In addition, showing Artificial Intelligence learning processes, with and without a general overview of the problem that it is under examination. Applying the idea of the general perspective that the network gets on the sentences and deriving recommendations from this for teaching processes. Background: We looked for common patterns of computer errors and human grammar mistakes. Also deducing the neural network’s learning process, deriving conclusions, and applying concepts from this process to the process of human learning. Methodology: We used DL technologies and research methods. After analysis, we built models from three types of complex neuronal networks – LSTM, Bi-LSTM, and GRU – with sequence-to-sequence architecture. After this, we combined the sequence-to- sequence architecture model with the attention mechanism that gives a general overview of the input that the network receives. Contribution: The cost of computer applications is cheaper than that of manual human effort, and the availability of a computer program is much greater than that of humans to perform the same task. Thus, using computer applications, we can get many desired examples of mistakes without having to pay humans to perform the same task. Understanding the mistakes of the machine can help us to under-stand the human mistakes, because the human brain is the model of the artificial neural network. This way, we can facilitate the student learning process by teaching students not to make mistakes that we have seen made by the artificial neural network. We hope that with the method we have developed, it will be easier for teachers to discover common mistakes in students’ work before starting to teach them. In addition, we show that a “general explanation” of the issue under study can help the teaching and learning process. Findings: We performed the test case on the Hebrew language. From the mistakes we received from the computerized neuronal networks model we built, we were able to classify common human errors. That is, we were able to find a correspondence between machine mistakes and student mistakes. Recommendations for Practitioners: Use an artificial neural network to discover mistakes, and teach students not to make those mistakes. We recommend that before the teacher begins teaching a new topic, he or she gives a general explanation of the problems this topic deals with, and how to solve them. Recommendations for Researchers: To use machines that simulate the learning processes of the human brain, and study if we can thus learn about human learning processes. Impact on Society: When the computer makes the same mistakes as a human would, it is very easy to learn from those mistakes and improve the study process. The fact that ma-chine and humans make similar mistakes is a valuable insight, especially in the field of education, Since we can generate and analyze computer system errors instead of doing a survey of humans (who make mistakes similar to those of the machine); the teaching process becomes cheaper and more efficient. Future Research: We plan to create an automatic grammar-mistakes maker (for instance, by giving the artificial neural network only a tiny data-set to learn from) and ask the students to correct the errors made. In this way, the students will practice on the material in a focused manner. We plan to apply these techniques to other education subfields and, also, to non-educational fields. As far as we know, this is the first study to go in this direction ‒ instead of looking at organisms and building machines, to look at machines and learn about organisms.




two

Informing Clientele through Networked Multimedia Information Systems: Introduction to the Special Issues




two

Development of a Video Network for Efficient Dissemination of the Graphical Images in a Collaborative Environment




two

Collaboration: the Key to Establishing Community Networks in Regional Australia




two

Regional IS Knowledge Networks: Elaborating the Theme of Relevance of IS Research




two

Perceptions of E-commerce Web Sites across Two Generations




two

Social Network Position and Its Relationship to Performance of IT Professionals




two

The Dual Micro/Macro Informing Role of Social Network Sites: Can Twitter Macro Messages Help Predict Stock Prices?




two

Social Networking Site Continuance: The Paradox of Negative Consequences and Positive Growth




two

The Social Network Application Post-Adoptive Use Model (SNAPUM): A Model Examining Social Capital and Other Critical Factors Affecting the Post-Adoptive Use of Facebook




two

Social Networks in which Users are not Small Circles

Understanding of social network structure and user behavior has important implications for site design, applications (e.g., ad placement policies), accurate modeling for social studies, and design of next-generation infrastructure and content distribution systems. Currently, characterizations of social networks have been dominated by topological studies in which graph representations are analyzed in terms of connectivity using techniques such as degree distribution, diameter, average degree, clustering coefficient, average path length, and cycles. The problem is that these parameters are not completely satisfactory in the sense that they cannot account for individual events and have only limited use, since one can produce a set of synthetic graphs that have the exact same metrics or statistics but exhibit fundamentally different connectivity structures. In such an approach, a node drawn as a small circle represents an individual. A small circle reflects a black box model in which the interior of the node is blocked from view. This paper focuses on the node level by considering the structural interiority of a node to provide a more fine-grained understanding of social networks. Node interiors are modeled by use of six generic stages: creation, release, transfer, arrival, acceptance, and processing of the artifacts that flow among and within nodes. The resulting description portrays nodes as comprising mostly creators (e.g., of data), receivers/senders (e.g., bus boys), and processors (re-formatters). Two sample online social networks are analyzed according to these features of nodes. This examination points to the viability of the representational method for characterization of social networks.




two

Information Re-Sharing on Social Network Sites in the Age of Fake News

Aim/Purpose: In the light of the recent attention to the role of social media in the dissemination of fake news, it is important to understand the relationship between the characteristics of the social media content and re-sharing behavior. This study seeks to examine individual level antecedents of information re-sharing behavior including individual beliefs about the quality of information available on social network sites (SNSs), attitude towards SNS use and risk perceptions and attitudes. Methodology: Testing the research model by data collected through surveys that were adminis-tered to test the research model. Data was collected from undergraduate students in a public university in the US. Contribution: This study contributes to theory in Information Systems by addressing the issue of information quality in the context of information re-sharing on social media. This study has important practical implications for SNS users and providers alike. Ensuring that information available on SNS is of high quality is critical to maintaining a healthy user base. Findings: Results indicate that attitude toward using SNSs and intention to re-share infor-mation on SNSs is influenced by perceived information quality (enjoyment, rele-vance, and reliability). Also, risk-taking propensity and enjoyment influence the intention to re-share information on SNSs in a positive direction. Future Research: In the dynamic context of SNSs, the role played by quality of information is changing. Understanding changes in quality of information by conducting longitudinal studies and experiments and including the role of habits is necessary.




two

Technology Addiction: How Social Network Sites Impact our Lives

Aim/Purpose: The media and research have made significant noise about young people’s addictions to technology, however the American Psychological Association (APA) has reserved judgment on the clinical diagnosis of technology addiction. Research to understand technology addiction is important to the future of information systems development and behavioral usage understanding. Background: Addiction implies that there is a problem from which an IS client needs to try to recover, further implying a negative impact on life. Multiple defini-tions and outcomes of addictions have been studied in the information systems discipline, with virtually no focus on quality of life of the IS client. Methodology: This research employs a survey of students at a large southwestern United States university. Measures were adopted from previously validated sources. The final sample includes 413 usable responses analyzed using PLS. Contribution: This research broadens theoretical and practical understanding of SNS IS client perceptions by relating technology addiction to a broader impact on an individual’s life. By doing so, it provides guidance on society’s understanding of frequent technology use, as well as the development of new systems that are highly used. Findings: This research indicates diminished impulse control, distraction, social influence and satisfaction are all highly correlated with technology addiction; specifically, 55% of the variance in addiction is explained by these four indicators. However, the model further shows addiction has no significant relationship with overall satisfaction of life, indicating that IS clients do not correlate the two ideas. Recommendations for Practitioners: Heavy technology use may indicate a paradigm shift in how people inter-act, instead of a concern to be addressed by the APA. Recommendation for Researchers: Research needs to clearly define technology dependence, addiction, and overuse so that there is a strong understanding of what is meant. These findings help guide assumptions about the dark side of Information Technology. Impact on Society: While technology use is increasing, younger generations may find the use to be acceptable and less of a problem then older generations. Future Research: Future research should replicate these findings on other technology artifacts and other technology addiction definitions. In the future, there is also opportunity to delve deeper into the outcome variable of satisfaction with life.




two

Fast fuzzy C-means clustering and deep Q network for personalised web directories recommendation

This paper proposes an efficient solution for personalised web directories recommendation using fast FCM+DQN. At first, web directory usage file obtained from given dataset is fed into the accretion matrix computation module, where visitor chain matrix, visitor chain binary matrix, directory chain matrix and directory chain binary matrix are formulated. In this, directory grouping is accomplished based on fast FCM and matching among query and group is conducted based on Kumar Hassebrook and Kulczynski similarity. The user preferred directory is restored at this stage and at last, personalised web directories are recommended to the visitors by means of DQN. The proposed approach has received superior results with respect to maximum accuracy of 0.910, minimum mean squared error (MSE) of 0.0206 and root mean squared error (RMSE) of 0.144. Although the system offered magnificent outcomes, it failed to order web directories in the form of highly, medium and low interested directories.




two

BiConvNet: Integrating Spatial Details and Deep Semantic Features in a Bilateral-Branch Image Segmentation Network

Zhigang WU,Yaohui ZHU, Vol.E107-D, No.11, pp.1385-1395
This article focuses on improving the BiSeNet v2 bilateral branch image segmentation network structure, enhancing its learning ability for spatial details and overall image segmentation accuracy. A modified network called “BiconvNet” is proposed. Firstly, to extract shallow spatial details more effectively, a parallel concatenated strip and dilated (PCSD) convolution module is proposed and used to extract local features and surrounding contextual features in the detail branch. Continuing on, the semantic branch is reconstructed using the lightweight capability of depth separable convolution and high performance of ConvNet, in order to enable more efficient learning of deep advanced semantic features. Finally, fine-tuning is performed on the bilateral guidance aggregation layer of BiSeNet v2, enabling better fusion of the feature maps output by the detail branch and semantic branch. The experimental part discusses the contribution of stripe convolution and different sizes of empty convolution to image segmentation accuracy, and compares them with common convolutions such as Conv2d convolution, CG convolution and CCA convolution. The experiment proves that the PCSD convolution module proposed in this paper has the highest segmentation accuracy in all categories of the Cityscapes dataset compared with common convolutions. BiConvNet achieved a 9.39% accuracy improvement over the BiSeNet v2 network, with only a slight increase of 1.18M in model parameters. A mIoU accuracy of 68.75% was achieved on the validation set. Furthermore, through comparative experiments with commonly used autonomous driving image segmentation algorithms in recent years, BiConvNet demonstrates strong competitive advantages in segmentation accuracy on the Cityscapes and BDD100K datasets.
Publication Date: 2024/11/01




two

Parenting through the ‘terrible twos’

Q: As soon as our daughter hit the “terrible twos”, she became difficult to deal with. I have heard this is fairly common. We know it is “just a stage” and we will get through it. However, for now, it is exhausting and discouraging. What advice can you give for keeping the right perspective during this challenging time?

Focus on the Family Malaysia: We will share an example that is in a book, The Best Advice I Ever Got On Parenting. The author heard it from singer Phil Joel and his wife, Heather. When their first son arrived, he slept through the night, loved to be held and routinely wore a big smile. Then he became a toddler, and his pleasant disposition vanished.

That is when the Joels realised parenting is a lot like gardening. The analogy illustrates that we plant seeds of love in our children so their lives will grow and flourish. But as anyone who tends the soil can tell you, positive results do not happen overnight.

Success requires consistent attention and labour, rain or shine. And it is not just the seeds you plant that sprout – there are weeds to be dealt with as well.

As they discovered, weeds can take many forms in our children’s lives, from negative cultural influences to selfishness that screams “it’s all about me!” These things often choke out the positive seeds of love and encouragement we are trying to spur towards growth.

That is why we need to dig beneath the surface of an issue to see lasting change. If we ignore the weeds, they will only grow deeper and become harder to uproot.

Raising children is not always easy, but with your loving care and your willingness to confront the negative influences that threaten their well-being, your child can develop into an adult of maturity and character.


Q: My wife and I have enjoyed being part of a close-knit circle of friends for a few years, but lately, we feel like something is missing as if life has become a bit stagnant. We would like to branch out somehow and build new friendships, but we are not sure where to start. What would you suggest?

Focus on the Family Malaysia: We have heard that if couples are married long enough, they start to look like one another. We are not sure if that is true but couples do often look like the other couples they hang out with. It may feel more comfortable to be friends with someone who is just like you, but you are depriving your marriage of a great chance to grow.

Relating to someone in the same place in life as you or who has common interests is easy. You can empathise with each other about career challenges, share the highs and lows of parenting or compare favourite music, movies and hobbies.

But we would suggest another perspective. There is tremendous value in spending time with one or more couples who are different from you.

An older couple can share their years of wisdom with a younger couple and help them develop some long-term stability in their marriage. Younger couples have a lot to offer too. They can bring a sense of energy to the friendship or help an older couple feel younger and more revived in their relationship.

To add a deeper layer of richness to your marriage, try to build a friendship with another couple who does not see life the same way as you. Their different perspective can challenge you to grow. It just may create the spark you need to strengthen your marriage for years to come. And hopefully, you will do the same for them.

This article is contributed by Focus on the Family Malaysia, a non-profit organisation dedicated to supporting and strengthening the family unit.
It provides a myriad of programmes and resources, including professional counselling services, to the community.
For more information, visit family.org.my. Comments: letters@thesundaily.com



  • Focus on the Family Malaysia

two

MMEA officer fined RM25,000 for accepting bribes two years ago

ALOR SETAR: An officer of the Malaysian Maritime Enforcement Agency (MMEA) was fined RM25,000 after pleading guilty at the Sessions Court here today to five charges of accepting bribes amounting to RM2,300 two years ago.

Judge N. Priscilla Hemamalini imposed a fine of RM5,000 for each charge faced by Muhamad Abdul Hadi Abdullah, 35 and the court ordered the accused to be jailed for five months for each charge if he failed to pay the fine.

According to all the charges, the accused, who holds the rank of Senior Maritime Officer at the MMEA Kedah and Perlis Headquarters, received money amounting to RM2,300 with no reply from the owner of LGH Maju Trading Company, Lim Kian Chong, who knew that he had an official working relationship with the individual.

The money was received by the accused through five money transfers from the Maybank account of a middleman, a woman, which was then deposited into the accused’s RHB Bank account and all the offences were committed at RHB Bank Bhd Langkawi Island Branch on Jan 2, April 10, May 11, July 7 and Oct 8, 2022.

The charge was filed under Section 165 of the Penal Code (Act 574) which carries a jail term of up to two years or a fine or both.

The Malaysian Anti-Corruption Commission (MACC) officers Abd Muntaqim Abdul Aziz and Mohd Syahzada Azad Sanusi led the prosecution while the accused was not represented.




two

Two races

I looked up the definitions of “spectator, participant and admirer.” In the upshot of two races I had witnessed here in New York, I’m trying to make sense of how I stand and feel about these recent events.







two

Bodies of mother and two daughters recovered from water tank in Karachi

Mother reportedly pushed her daughters into a water tank before jumping in herself.




two

Two suspected fighters killed by Indian army amid local election campaigning in IIOJK

IIOJK sees first local assembly elections in a decade with voting in the three-phased poll beginning on September 18




two

Countrywide poliovirus tally soars to 45 after two new cases detected

Health worker giving polio drops to a child in a city of Khyber Pakhtunkhwa. — UNICEF/ FileNIH says two new cases of wild poliovirus are of type 1.Poliovirus crippled a girl, boy in Lakki Marwat, DI Khan.Balochistan reports highest number of cases this year.



two

FDA’s OPDP Issues Two New Untitled Letters

While enforcement has been at a low ebb for quite some time with FDA’s Office of Prescription Drug Promotion (OPDP), this week took a different turn with the posting of two new untitled letters sent October 31. That brings the … Continue reading




two

Teenager arrested in connection with cyberattack on London transport network

Transport for London said it was contacting around 5,000 customers whose bank account data may have been accessed




two

Muslim, European FMs to meet in Madrid on Israel-Palestine two-state solution today

Spanish FM Jose Manuel Albares will host the meeting with EU officials and Arab-Islamic Contact Group for Gaza




two

Fact-check: Aitzaz Ahsan did not accuse two SC judges of facilitating political party

Posts circulating on social media claim that politician and lawyer Aitzaz Ahsan has accused two senior Supreme Court judges, Justice Mansoor Ali Shah and Justice Munib Akhtar, of facilitating a political party.

The claim is false.

Claim

On October 23, a user on X posted a...