dd

Meet Middlesbrough's championship cuber

12-year-old Alfie has competed in three Rubik's Cube championships.




dd

Campaign to move town's 'hidden' Christmas tree

A petition to relocate the town's Christmas tree to the town centre gets more than 750 signatures.




dd

Barnsley father's wedding day blunder

Neil Crossley from Barnsley forgot his daughter Amy when walking down the aisle




dd

MP calls for funding to replace 'shoddy' school

Lessons have been held in temporary classrooms since it partially closed due to faulty construction.




dd

Middleport Pottery looks to boost visitor numbers

Middleport Pottery has been given £250,000 by the National Lottery's heritage fund.




dd

Middlesex sign ex-Gloucestershire all-rounder Gohar

Spin bowling all-rounder Zafar Gohar signs a two-year deal with Middlesex following his departure from Gloucestershire.




dd

Aladdin arrives at Birmingham's Hippodrome

We chat to Gavin Adams and Desmonda Cathabel AKA Aladdin and Jasmine.




dd

Reddich MP "vital football remains affordable"

MP Chris Bloore wants increased fan representation on club boards to protect the game.




dd

Paddington came to Hemel and left his marmalade

Gadebridge Pharmacy was used as a location for a scene in the film, Paddington in Peru.




dd

BBC Sounds: 'Gig Buddies means I can see Iron Maiden again'

Gig Buddies partnered Lee up with Steve as they share similar musical tastes.




dd

The buddy scheme helping fans return to live gigs

A heavy metal fan says Gig Buddies Bedford has "given him back a huge amount of freedom".




dd

'Shock' at murder in Redditch

An investigation has been launched after a 44-year-old woman was killed.




dd

Paddington Bear comes to Salisbury

Salisbury is one of 23 locations across the UK to have a Paddington Bear statue.




dd

'Highly flammable' cladding behind £450k bill

The cladding is on a building which will house SEND students, Warwickshire County Council says.




dd

McLean given additional ban for abusive language

Norwich City captain Kenny McLean will miss an additional game following his recent sending off against Middlesbrough for bad language towards a match official.




dd

Toddler's sunglasses 'hid bruising', court told

Isabella Wheildon was made to wear dark glasses in the days before her death, a court hears.




dd

BYD revenues overtake Tesla’s, Reddit makes profit for first time

The Chinese electric vehicle giant BYD has seen its quarterly revenues soar, beating Tesla’s for the first time. It posted more than 200bn yuan ($28.2bn, £21.8bn) in revenues between July […]

The post BYD revenues overtake Tesla’s, Reddit makes profit for first time appeared first on ShinyShiny.




dd

Adding structured data support for Product Variants

In 2022, Google expanded support for Product structured data, enabling enhanced product experiences in Google Search. Then, in 2023 we added support for shipping and returns structured data. Today, we are adding structured data support for Product variants, allowing merchants to easily show more variations of the products they sell, and show shoppers more relevant, helpful results. Providing variant structured data will also complement and enhance merchant center feeds, including automated feeds.




dd

Adding markup support for organization-level return policies

We're adding support for return policies at the organization level, which means you'll be able to specify a general return policy for your business instead of having to define one for each individual product you sell.




dd

Using OSGi as the core of a middleware platform

Ross Mason of Mulesoft recently blogged: "OSGi - no thanks". Ross is a smart guy and he usually has something interesting to say. In this case, I think Ross has made a lot of good points:

1. Ross is right - OSGi is a great technology for middleware vendors.
2. Ross is right - Developers shouldn't be forced to mess with OSGi.
3. Ross is wrong - You can make both of these work together.

At WSO2 we went through exactly the same issues. We simply came to a different conclusion - that we can provide the benefits of OSGi (modularity, pluggability, dynamic loading) without giving pain to end-users. In WSO2 Carbon, customers can deploy their systems in exactly the same way that worked pre-OSGi.

Why did we choose OSGi? We also looked at building our own dynamic loading schemes. In fact, we've had dynamic classloading capabilities in our platform from day one. The reasons we went with OSGi are:

  • A structured and versioned approach to dynamic classloading
  • An industry standard approach - hence better understood, better skills, better resources
  • It solves more than just dynamic loading: as well as providing versions and dynamic loading, it also really gives proper modularity - which means hiding classes as much as exposing classes.
  • It provides (through Equinox p2) a proper provisioning model.
It wasn't easy. We struggled with OSGi to start with, but in the end we have a much stronger solution than if we had built our own. And we have done some great improvements. Our new Carbon Studio tooling gives a simple model to build complete end-to-end applications and hides OSGi completely from the end-user. The web admin consoles and deployment models allow complete deployment with zero OSGi. Drop a JAR in and we take care of the OSGi bundling for you.

The result - the best of both worlds - ease of use for developers and great middleware.




dd

En pleine crise du covid-19, l'Assemblᅵe change les rᅵgles des CDD et prᅵcarise un peu plus les salariᅵs

L'information est ᅵ lire sur le site de Mediapart : le 15 mai, alors que l'Assemblᅵe est en train de voter la poursuite de l'ᅵtat d'urgence sanitaire, les dᅵputᅵs de la Rᅵpublique en...




dd

E-bidding adoption among SMEs: evidence from an African emerging market

While digitalisation reforms aiming to enhance the quality of public services were put in place, most stakeholders in developing countries still use paper-based-tendering processes, which are associated with increased costs. To overcome these problems, calls to adopt e-bidding have recently emerged. This study aims to explore the readiness of Moroccan SMEs to adopt e-bidding. To achieve this goal, we proposed an integrated framework combining the TAM and UTAUT models to examine the predictors of SMEs' intention to adopt e-bidding. We empirically tested the conceptual model using a partial least squares (PLS) estimation based on data from 210 SMEs. Our results suggest that effort expectancy, facilitating conditions, and social influence as the key factors influencing SMEs intention to adopt e-bidding. We also suggest firm size as a significant moderator. This will help in improving SMEs' user experience and will also allow a better implementation of e-bidding in Morocco and similar contexts.




dd

Evaluation on stock market forecasting framework for AI and embedded real-time system

Since its birth, the stock market has received widespread attention from many scholars and investors. However, there are many factors that affect stock prices, including the company's own internal factors and the impact of external policies. The extent and manner of fundamental impacts also vary, making stock price predictions very difficult. Based on this, this article first introduces the research significance of the stock market prediction framework, and then conducts academic research and analysis on two key sentences of stock market prediction and artificial intelligence in stock market prediction. Then this article proposes a constructive algorithm theory, and finally conducts a simulation comparison experiment and summarises and discusses the experiment. Research results show that the neural network prediction method is more effective in stock market prediction; the minimum training rate is generally 0.9; the agency's expected dilution rate and the published stock market dilution rate are both around 6%.




dd

Straddling the Divide: Towards an Associate Degree in Information Technology




dd

Innovative Pedagogical Strategies of Streaming, Just-in-Time Teaching, and Scaffolding: A Case Study of Using Videos to Add Business Analytics Instruction Across a Curriculum

Aim/Purpose: Business analytics is a cross-functional field that is important to implement for a college and has emerged as a critically important core component of the business curriculum. It is a difficult task due to scheduling concerns and limits to faculty and student resources. This paper describes the process of creating a central video repository to serve as a platform for just in time teaching and the impact on student learning outcomes. Background: Industry demand for employees with analytical knowledge, skills, and abilities requires additional analytical content throughout the college of business curriculum. This demand needs other content to be added to ensure that students have the prerequisite skills to complete assignments. Two pedagogical approaches to address this issue are Just-in-Time Teaching (JiTT) and scaffolding, grounded in the Vygoskian concept of “Zone of Proximal Development. Methodology: This paper presents a case study that applies scaffolding and JiTT teaching to create a video repository to add business analytics instruction to a curriculum. The California Critical Thinking Skills Test (CCTST) and Major Field Test (MFT) scores were analyzed to assess learning outcomes. Student and faculty comments were considered to inform the results of the review. Contribution: This paper demonstrates a practical application of scaffolding and JiTT theory by outlining the process of using a video library to provide valuable instructional resources that support meaningful learning, promote student academic achievement, and improve program flexibility. Findings: A centrally created library is a simple and inexpensive way to provide business analytics course content, augmenting standard content delivery. Assessment of learning scores showed an improvement, and a summary of lessons learned is provided to guide implications. Recommendations for Practitioners: Pedagogical implications of this research include the observation that producing a central library of instructor created videos and assignments can help address knowledge and skills gaps, augment the learning of business analytics content, and provide a valuable educational resource throughout the college of business curriculum. Recommendation for Researchers: This paper examines the use of scaffolding and JiTT theories. Additional examination of these theories may improve the understanding and limits of these concepts as higher education evolves due to the combination of market forces changing the execution of course delivery. Impact on Society: Universities are tasked with providing new and increasing skills to students while controlling the costs. A centrally created library of instructional videos provides a means of delivering meaningful content while controlling costs. Future Research: Future research may examine student success, including the immediate impact of videos and longitudinally using video repositories throughout the curriculum. Studies examining the approach across multiple institutions may help to evaluate the success of video repositories. Faculty acceptance of centrally created video libraries and assignments should be considered for the value of faculty recruiting and use in the classroom. The economic impact on both the university and students should be evaluated.




dd

Synoptic crow search with recurrent transformer network for DDoS attack detection in IoT-based smart homes

Smart home devices are vulnerable to various attacks, including distributed-denial-of-service (DDoS) attacks. Current detection techniques face challenges due to nonlinear thought, unusual system traffic, and the fluctuating data flow caused by human activities and device interactions. Identifying the baseline for 'normal' traffic and suspicious activities like DDoS attacks from encrypted data is also challenging due to the encrypted protective layer. This work introduces a concept called synoptic crow search with recurrent transformer network-based DDoS attack detection, which uses the synoptic weighted crow search algorithm to capture varying traffic patterns and prioritise critical information handling. An adaptive recurrent transformer neural network is introduced to effectively regulate DDoS attacks within encrypted data, counting the historical context of the data flow. The proposed model shows effective performance in terms of low false alarm rate, higher detection rate, and accuracy.




dd

Assessing supply chain risk management capabilities and its impact on supply chain performance: moderation of AI-embedded technologies

This research investigates the correlation between risk management and supply chain performance (SCP) along with moderation of AI-embedded technologies such as big data analytics, Internet of Things (IoT), virtual reality, and blockchain technologies. To calculate the results, this study utilised 644 questionnaires through the structural equation modelling (SEM) method. It is revealed using SmartPls that financial risk management (FRM) is positively linked with SCP. Second, it was observed that AI significantly moderates the connection between FRM and SCP. In addition, the study presents certain insights into supply chain and AI-enabled technologies and how these capabilities can beneficially advance SCP. Besides, certain implications, both managerial and theoretical are described for the supply chain managers along with limitations for future scholars of the world.




dd

Student's classroom behaviour recognition method based on abstract hidden Markov model

In order to improve the standardisation of mutual information index, accuracy rate and recall rate of student classroom behaviour recognition method, this paper proposes a student's classroom behaviour recognition method based on abstract hidden Markov model (HMM). After cleaning the students' classroom behaviour data, improve the data quality through interpolation and standardisation, and then divide the types of students' classroom behaviour. Then, in support vector machine, abstract HMM is used to calculate the output probability density of support vector machine. Finally, according to the characteristic interval of classroom behaviour, we can judge the category of behaviour characteristics. The experiment shows that normalised mutual information (NMI) index of this method is closer to one, and the maximum AUC-PR index can reach 0.82, which shows that this method can identify students' classroom behaviour more effectively and reliably.




dd

A study on value chain of mushroom for value addition: challenges, opportunities and prospects of cultivation of mushroom

This research was carried out with an objective of studying the existing mushroom value chain, identifying demand-supply gap, carrying out SWOT analysis to explore challenges, proposing action plan and presenting finally standard operating procedure for enhancing value chain effectiveness. Data was collected from 71 actors identified in the oyster mushroom value chain in Tumakuru Taluk, Karnataka State, India and analysed. Analysis showed that there were five different models of value chain, and the shortest value chain was the most profitable one. Based on the respondents' perceptions, mushroom cultivation offers many opportunities such as creating employment, improving economic condition and diet. Meanwhile they face challenges like, pest attack, hike in input materials' prices, lack of technical guidance during farming, finance support, inefficient marketing system. There is a need to address demand-supply gap, invest more in facilities and related research, integrate all the actors in value chain to enhance productivity.




dd

REDDNET and Digital Preservation in the Open Cloud: Research at Texas Tech University Libraries on Long-Term Archival Storage

In the realm of digital data, vendor-supplied cloud systems will still leave the user with responsibility for curation of digital data. Some of the very tasks users thought they were delegating to the cloud vendor may be a requirement for users after all. For example, cloud vendors most often require that users maintain archival copies. Beyond the better known vendor cloud model, we examine curation in two other models: inhouse clouds, and what we call "open" clouds—which are neither inhouse nor vendor. In open clouds, users come aboard as participants or partners—for example, by invitation. In open cloud systems users can develop their own software and data management, control access, and purchase their own hardware while running securely in the cloud environment. To do so will still require working within the rules of the cloud system, but in some open cloud systems those restrictions and limitations can be walked around easily with surprisingly little loss of freedom. It is in this context that REDDnet (Research and Education Data Depot network) is presented as the place where the Texas Tech University (TTU)) Libraries have been conducting research on long-term digital archival storage. The REDDnet network by year's end will be at 1.2 petabytes (PB) with an additional 1.4 PB for a related project (Compact Muon Soleniod Heavy Ion [CMS-HI]); additionally there are over 200 TB of tape storage. These numbers exclude any disk space which TTU will be purchasing during the year. National Science Foundation (NSF) funding covering REDDnet and CMS-HI was in excess of $850,000 with $850,000 earmarked toward REDDnet. In the terminology we used above, REDDnet is an open cloud system that invited TTU Libraries to participate. This means that we run software which fits the REDDnet structure. We are beginning to complete the final design of our system, and starting to move into the first stages of construction. And we have made a decision to move forward and purchase one-half petabyte of disk storage in the initial phase. The concerns, deliberations and testing are presented here along with our initial approach.




dd

The SWIMS CD-ROM Pilot: Using Community Development Principles and Technologies of the Information Society to Address Identified Informational Needs




dd

The Performance of Web-based 2-tier Middleware Systems




dd

Matching:  Discrimination, Misinformation, and Sudden Death




dd

ICT Experiences in Two Different Middle Eastern Universities




dd

Middleware Components for E-commerce Infrastructure: An Analytical Review




dd

Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior




dd

Adding a new Language to VB .NET Globalization: Making the Case for the Kurdish Languages




dd

It is Time to Add Kurdish Culture to VS .NET Globalization




dd

A Research Study for the Development of a SOA Middleware Prototype that used Web Services to Bridge the LMS to LOR Data Movement Interoperability Gap for Education




dd

Addressing Knowledge Support Services as Part of a Living Lab Environment




dd

Exploring the Addition of Mobile Access to a Healthcare Services Website




dd

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




dd

An Initiative to Address the Gender Imbalance in Tertiary IT Studies




dd

Perceived Organizational ERP Benefits for SMEs: Middle Eastern Perspective

This study aims to examine the impact of organizational environment (top management support, company-wide support, business process reengineering, effective project management, and organizational culture) and enterprise resource planning (ERP) vendor environment (ERP vendor support) on ERP perceived benefits. In order to achieve the study’s aim, a questionnaire was developed based on the extant literature to collect relevant data from the research informants. The population for this research consisted of all users of Microsoft Dynamics Great Plains (a typical type of enterprise system), which is frequently used in Jordanian companies in Amman City. A random sample of 30% of the research population was selected. The results revealed that business process reengineering, effective project management, company-wide support, and organizational culture have a positive correlation with ERP perceived benefits, whereas top management support does not. In addition, there is a significant positive correlation between vendor support and ERP perceived benefits. Academic and practical recommendations are provided.




dd

Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries

Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries.




dd

The Longitudinal Empirical Study of Organizational Socialization and Knowledge Sharing – From the Perspective of Job Embeddedness

Aim/Purpose: Based on the social exchange theory, this study aimed to explore the underlying mechanisms and boundary conditions between organizational socialization and knowledge sharing. Background: With the advent of the era of the knowledge economy, knowledge has been replacing traditional resources such as capital, labor, and land to become the critical resources of enterprises. The competitiveness of an organization depends much on the effectiveness of its knowledge management; the success of its knowledge management largely relies upon employees’ motivation and willingness to engage in knowledge sharing. Methodology: This study is a longitudinal analysis of data collected from 281 newcomers in Chinese enterprises at two-time points with a one-month interval. Structural equation modeling (SEM) was conducted to test hypotheses by calculating standardized path coefficients and their significance levels. Contribution: The study examined models linking organizational socialization and knowledge sharing that included organizational links and sacrifice as mediators and trust as a moderator. Findings: Results show that the influences of organizational socialization on knowledge sharing change regularly over time. In the role management stage, coworker support and prospects for the future impact the practices of knowledge sharing through links and sacrifice. Moreover, the findings show that trust moderates the effect of links and sacrifice on employees’ knowledge sharing. Recommendations for Practitioners: This study can help enterprises develop targeted human resource management strategies, improve the degree of job embeddedness within the organization, and thus encourage more knowledge sharing among employees. Recommendation for Researchers: First, researchers could pay attention to more underlying mechanisms and boundary conditions in the relationship between organizational socialization and knowledge sharing. Second, focusing on specific cultural context and dimension of concepts may provide a new insight for the future study and help add greater theoretical precision to knowledge sharing. Impact on Society: First, this study suggests that coworker support and prospects for the future improve knowledge sharing within the organization. Second, understanding how job embeddedness (organizational links and organizational sacrifice) acts as a mediator enhancing knowledge sharing, managers should consider raising their attachment relationship to organizations from two aspects: links and sacrifice. Third, knowledge sharing takes place in a team-oriented context, where the success of the team requires high-quality relationships among individual team members within the team as a whole. Future Research: Researchers in the future should employ experimental research design or utilize longitudinal data to ensure that the findings reveal causation. In addition, future research can investigate how the initial level and later changes of organizational socialization are associated with knowledge sharing beyond the observational scope of traditional cross-sectional and lagged research designs.




dd

Investigating the Impact of Dual Network Embedding and Dual Entrepreneurial Bricolage on Knowledge-Creation Performance: An Empirical Study in Fujian, China

Aim/Purpose: This study investigates the relationship between dual network embedding, dual entrepreneurial bricolage, and knowledge-creation performance. Background: The importance of new ventures for innovation and economic growth has been fully endorsed. Establishing incubation organizations to help new startups overcome constraints and dilemmas has become the consensus of various countries. In particular, the number of Chinese makerspaces has rapidly increased. Startups in the makerspaces form a loosely coupled dual network to cooperate and share resources, especially knowledge. Methodology: By convenience sampling, 400 startups in the makerspaces in Fujian Province, China were selected for the questionnaire survey study. In total, 307 valid responses were collected, yielding a response rate of 76.8%. The survey data were analyzed for hypothesis testing, using the PL-SEM technique with the AMOS20.0 software. Contribution: At the theoretical level, this research supplements the exploration of the influencing factors of the entrepreneurial bricolage of startups at the network level. It deepens the research on the internal mechanism of the dual network embeddedness affecting the knowledge-creation performance. In practice, it provides a theoretical basis and management inspiration for startups in makerspaces to overcome the inherent disadvantage of being too small and weak to explore innovative paths. Findings: First, relational embedding of startups in makerspaces directly affects knowledge-creation performance. Second, dual entrepreneurial bricolage plays a mediating role in diversity. Selective entrepreneurial bricolage plays a partial mediating role between relationship embedding and knowledge-creation performance. Parallel entrepreneurial bricolage plays a complete intermediary role between structural embedding and knowledge-creation performance. Dual entrepreneurial bricolage plays a complete intermediary role between knowledge embedding and knowledge-creation performance. Recommendations for Practitioners: Enterprises in the makerspaces should make dynamic adjustments to the network embedded state and dual entrepreneurial bricolage to improve knowledge-creation performance. When startups conduct selective entrepreneurship bricolage, they should strengthen relational and knowledge embeddedness to improve their relationship strength and tacit knowledge acquisition. When startups conduct parallel entrepreneurship bricolage, structural and knowledge embedding should be strengthened to improve the position of enterprises in the network to acquire diversified knowledge to explore and discover new business opportunities and project resources. Recommendation for Researchers: The heterogeneity of industries and regions may impact the dual network embedding mechanism of startups. Researchers can choose a wider range of regions and industries for sampling. Impact on Society: This study provides a theoretical basis and management inspiration for startups to overcome the inherent disadvantage of being too small and weak to explore innovative paths. It provides a basis to support startups in unleashing innovation vitality and achieving healthy growth. Future Research: Previous studies have shown that network relationships and bricolage behavior have a certain relationship with the enterprise life cycle. Future research can adopt a longitudinal research design across time points, which will increase the explanatory power of research conclusions.




dd

The Influence of Augmented Reality Face Filter Addiction on Online Social Anxiety: A Stimulus-Organism-Response Perspective

Aim/Purpose: This study aims to analyze the factors that influence user addiction to AR face filters in social network applications and their impact on the online social anxiety of users in Indonesia. Background: To date, social media users have started to use augmented reality (AR) face filters. However, AR face filters have the potential to create positive and negative effects for social media users. The study combines the Big Five Model (BFM), Sense of Virtual Community (SVOC), and Stimuli, Organism, and Response (SOR) frameworks. We adopted the SOR theory by involving the personality factors and SOVC factors as stimuli, addiction as an organism, and social anxiety as a response. BFM is the most significant theory related to personality. Methodology: We used a quantitative approach for this study by using an online survey. We conducted research on 903 Indonesian respondents who have used an AR face filter feature at least once. The respondents were grouped into three categories: overall, new users, and old users. In this study, group classification was carried out based on the development timeline of the AR face filter in the social network application. This grouping was carried out to facilitate data analysis as well as to determine and compare the different effects of the factors in each group. The data were analyzed using the covariance-based structural equation model through the AMOS 26 program. Contribution: This research fills the gap in previous research which did not discuss much about the impact of addiction in using AR face filters on online social anxiety of users of social network applications. Findings: The results of this study indicated neuroticism, membership, and immersion influence AR face filter addiction in all test groups. In addition, ARA has a significant effect on online social anxiety. Recommendations for Practitioners: The findings are expected to be valuable to social network service providers and AR creators in improving their services and to ensure policies related to the list of AR face filters that are appropriate for use by their users as a form of preventing addictive behavior of that feature. Recommendation for Researchers: This study suggested other researchers consider other negative impacts of AR face filters on aspects such as depression, life satisfaction, and academic performance. Impact on Society: AR face filter users may experience changes in their self-awareness in using face filters and avoid the latter’s negative impacts. Future Research: Future research might explore other impacts from AR face filter addiction behavior, such as depression, life satisfaction, and so on. Apart from that, future research might investigate the positive impact of AR face filters to gain a better understanding of the impact of AR face filters.




dd

Addressing the eLearning Contradiction: A Collaborative Approach for Developing a Conceptual Framework Learning Object




dd

Enterprise E-Learning Success Factors: An Analysis of Practitioners’ Perspective (with a Downturn Addendum)