sea Evaluation criteria for information quality research By www.inderscience.com Published On :: 2017-03-21T23:20:50-05:00 Evaluation of research artefacts (such as models, frameworks and methodologies) is essential to determine their quality and demonstrate worth. However, in the information quality (IQ) research domain there is no existing standard set of criteria available for researchers to use to evaluate their IQ artefacts. This paper therefore describes our experience of selecting and synthesising a set of evaluation criteria used in three related research areas of information systems (IS), software products (SP) and conceptual models (CM), and analysing their relevance to different types of IQ research artefact. We selected and used a subset of these criteria in an actual evaluation of an IQ artefact to test whether they provide any benefit over a standard evaluation. The results show that at least a subset of the criteria from the other domains of IS, SP and CM are relevant for IQ artefact evaluations, and the resulting set of criteria, most importantly, enabled a more rigorous and systematic selection of what to evaluate. Full Article
sea Evolution of academic research in French business schools (2008-2018): isomorphism and heterogeneity By www.inderscience.com Published On :: 2024-06-24T23:20:50-05:00 In the perspective of institutional theory, business education is an institutional field, in which two major institutional forces are accreditations and rankings. In this context, French business schools (BS) have adopted an isomorphic response by starting to engage in research and publishing in academic journals. Studies have discussed their research as a new institutional trajectory. However, what remains unknown is how they differ from each other in such research dynamics. To bring new insights to the discussion, this quantitative study examines, over the period of 2008-2018, the evolution of research of French BS by systematically comparing the 'best' schools with other schools in all analyses. The results indicate a strong isomorphism in terms of publication quantity and productivity, scale of research collaboration and the internationalisation of research. However, these schools are heterogeneous in terms research quality and scale of international research collaboration, reflecting the diversity in their research strategy. Full Article
sea Intelligence assistant using deep learning: use case in crop disease prediction By www.inderscience.com Published On :: 2024-09-03T23:20:50-05:00 In India, 70% of the Indian population is dependent on agriculture, yet agriculture generates only 13% of the country's gross domestic product. Several factors contribute to high levels of stress among farmers in India, such as increased input costs, draughts, and reduced revenues. The problem lies in the absence of an integrated farm advisory system. A farmer needs help to bridge this information gap, and they need it early in the crop's lifecycle to prevent it from being destroyed by pests or diseases. This research involves developing deep learning algorithms such as <i>ResNet18</i> and <i>DenseNet121</i> to help farmers diagnose crop diseases earlier and take corrective actions. By using deep learning techniques to detect these crop diseases with images farmers can scan or click with their smartphones, we can fill in the knowledge gap. To facilitate the use of the models by farmers, they are deployed in Android-based smartphones. Full Article
sea Research on construction of police online teaching platform based on blockchain and IPFS technology By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 Under the current framework of police online teaching, in order to effectively solve the lack of high-quality resources of the traditional platform, backward sharing technology, poor performance of the digital platform and the privacy problems faced by each subject in sharing. This paper designs and implements the online teaching platform based on blockchain and interplanetary file system (IPFS). Based on the architecture of a 'decentralised' police online teaching platform, the platform uses blockchain to store hashes of encrypted private information and user-set access control policies, while the real private information is stored in IPFS after encryption. In the realisation of privacy information security storage at the same time to ensure the effective control of the user's own information. In order to achieve flexible rights management, the system classifies private information. In addition, the difficulties of police online teaching and training reform in the era of big data are solved one by one from the aspects of communication mode, storage facilities, incentive mechanism and confidentiality system, which effectively improves the stability and security of police online teaching. Full Article
sea Research on evaluation method of e-commerce platform customer relationship based on decision tree algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to overcome the problems of poor evaluation accuracy and long evaluation time in traditional customer relationship evaluation methods, this study proposes a new customer relationship evaluation method for e-commerce platform based on decision tree algorithm. Firstly, analyse the connotation and characteristics of customer relationship; secondly, the importance of customer relationship in e-commerce platform is determined by using decision tree algorithm by selecting and dividing attributes according to the information gain results. Finally, the decision tree algorithm is used to design the classifier, the weighted sampling method is used to obtain the training samples of the base classifier, and the multi-period excess income method is used to construct the customer relationship evaluation function to achieve customer relationship evaluation. The experimental results show that the accuracy of the customer relationship evaluation results of this method is 99.8%, and the evaluation time is only 51 minutes. Full Article
sea Online allocation of teaching resources for ideological and political courses in colleges and universities based on differential search algorithm By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the classification accuracy and online allocation accuracy of teaching resources and shorten the allocation time, this paper proposes a new online allocation method of college ideological and political curriculum teaching resources based on differential search algorithm. Firstly, the feedback parameter model of teaching resources cleaning is constructed to complete the cleaning of teaching resources. Secondly, according to the results of anti-interference consideration, the linear feature extraction of ideological and political curriculum teaching resources is carried out. Finally, the online allocation objective function of teaching resources for ideological and political courses is constructed, and the differential search algorithm is used to optimise the objective function to complete the online allocation of resources. The experimental results show that this method can accurately classify the teaching resources of ideological and political courses, and can shorten the allocation time, with the highest allocation accuracy of 97%. Full Article
sea Research on fast mining of enterprise marketing investment databased on improved association rules By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 Because of the problems of low mining precision and slow mining speed in traditional enterprise marketing investment data mining methods, a fast mining method for enterprise marketing investment databased on improved association rules is proposed. First, the enterprise marketing investment data is collected through the crawler framework, and then the collected data is cleaned. Then, the cleaned data features are extracted, and the correlation degree between features is calculated. Finally, according to the calculation results, all data items are used as constraints to reduce the number of frequent itemsets. A pruning strategy is designed in advance. Combined with the constraints, the Apriori algorithm of association rules is improved, and the improved algorithm is used to calculate all frequent itemsets, Obtain fast mining results of enterprise marketing investment data. The experimental results show that the proposed method is fast and accurate in data mining of enterprise marketing investment. Full Article
sea A prototype for intelligent diet recommendations by considering disease and medical condition of the patient By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The patient must follow a good diet to lessen the risk of health conditions. The body needs vitamins, minerals, and nutrients for illness prevention. When the human body does not receive the right amount of nutrients, nutritional disorders can develop, which can cause a number of different health issues. Chronic diseases like diabetes and hypertension can be brought on by dietary deficiencies. The human body receives the nutrients from a balanced diet to function properly. This research has a prototype that enables patients to find nutritious food according to their health preferences. It suggests meals based on their preferences for nutrients such as protein, fibre, high-fibre, low-fat, etc., and diseases such as pregnancy and diabetes. The process implements the recommendation based on the patient's profile (content-relied, K-NN), recommendation relied on patients with similar profiles, and recommendation based on the patient's past or recent activity. Full Article
sea International Journal of Business and Systems Research By www.inderscience.com Published On :: Full Article
sea Visualizing Research Data Records for their Better Management By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 As academia in general, and research funders in particular, place ever greater importance on data as an output of research, so the value of good research data management practices becomes ever more apparent. In response to this, the Innovative Design and Manufacturing Research Centre (IdMRC) at the University of Bath, UK, with funding from the JISC, ran a project to draw up a data management planning regime. In carrying out this task, the ERIM (Engineering Research Information Management) Project devised a visual method of mapping out the data records produced in the course of research, along with the associations between them. This method, called Research Activity Information Development (RAID) Modelling, is based on the Unified Modelling Language (UML) for portability. It is offered to the wider research community as an intuitive way for researchers both to keep track of their own data and to communicate this understanding to others who may wish to validate the findings or re-use the data. Full Article Articles digital information research data management visual forms of communication information presentation Information Management Information Visualization
sea Kindura: Repository services for researchers based on hybrid clouds By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 The paper describes the investigations and outcomes of the JISC-funded Kindura project, which is piloting the use of hybrid cloud infrastructure to provide repository-focused services to researchers. The hybrid cloud services integrate external commercial cloud services with internal IT infrastructure, which has been adapted to provide cloud-like interfaces. The system provides services to manage and process research outputs, primarily focusing on research data. These services include both repository services, based on use of the Fedora Commons repository, as well as common services such as preservation operations that are provided by cloud compute services. Kindura is piloting the use of the DuraCloud2, open source software developed by DuraSpace, to provide a common interface to interact with cloud storage and compute providers. A storage broker integrates with DuraCloud to optimise the usage of available resources, taking into account such factors as cost, reliability, security and performance. The development is focused on the requirements of target groups of researchers. Full Article Articles
sea REDDNET and Digital Preservation in the Open Cloud: Research at Texas Tech University Libraries on Long-Term Archival Storage By jodi-ojs-tdl.tdl.org Published On :: Thu, 08 Mar 2012 00:00:00 -0600 In the realm of digital data, vendor-supplied cloud systems will still leave the user with responsibility for curation of digital data. Some of the very tasks users thought they were delegating to the cloud vendor may be a requirement for users after all. For example, cloud vendors most often require that users maintain archival copies. Beyond the better known vendor cloud model, we examine curation in two other models: inhouse clouds, and what we call "open" clouds—which are neither inhouse nor vendor. In open clouds, users come aboard as participants or partners—for example, by invitation. In open cloud systems users can develop their own software and data management, control access, and purchase their own hardware while running securely in the cloud environment. To do so will still require working within the rules of the cloud system, but in some open cloud systems those restrictions and limitations can be walked around easily with surprisingly little loss of freedom. It is in this context that REDDnet (Research and Education Data Depot network) is presented as the place where the Texas Tech University (TTU)) Libraries have been conducting research on long-term digital archival storage. The REDDnet network by year's end will be at 1.2 petabytes (PB) with an additional 1.4 PB for a related project (Compact Muon Soleniod Heavy Ion [CMS-HI]); additionally there are over 200 TB of tape storage. These numbers exclude any disk space which TTU will be purchasing during the year. National Science Foundation (NSF) funding covering REDDnet and CMS-HI was in excess of $850,000 with $850,000 earmarked toward REDDnet. In the terminology we used above, REDDnet is an open cloud system that invited TTU Libraries to participate. This means that we run software which fits the REDDnet structure. We are beginning to complete the final design of our system, and starting to move into the first stages of construction. And we have made a decision to move forward and purchase one-half petabyte of disk storage in the initial phase. The concerns, deliberations and testing are presented here along with our initial approach. Full Article Articles digital preservation digitial collections digital libraries digital preservation digital libraries digital information academic libraries cloud computing collaboration
sea Action-Guidance: An Action Research Project for the Application of Informing Science in Educational and Vocational Guidance By Published On :: Full Article
sea Exploring the Research Ethics Domain for Postgraduate Students in Computing By Published On :: Full Article
sea Exploring the Key Informational, Ethical and Legal Concerns to the Development of Population Genomic Databases for Pharmacogenomic Research By Published On :: Full Article
sea Analyzing the Affect of Culture on Curricular Content: A Research Conception By Published On :: Full Article
sea The Discovery Camp: A Talent Fostering Initiative for Developing Research Capabilities among Undergraduate Students By Published On :: Full Article
sea Informing through User-Centered Exploratory Search and Human-Computer Interaction Strategies By Published On :: Full Article
sea In Search of New Identity for LIS Discipline, with Some References to Iran By Published On :: Full Article
sea Interweaving Rubrics in Information Systems Program Assessments- Experiences from Action Research at Two Universities By Published On :: Full Article
sea Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda By Published On :: Full Article
sea DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography By Published On :: Full Article
sea Influence on Student Academic Behaviour through Motivation, Self-Efficacy and Value-Expectation: An Action Research Project to Improve Learning By Published On :: Full Article
sea Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods By Published On :: Full Article
sea Focusing on SMTEs: Using Audience Response Technology to Refine a Research Project By Published On :: Full Article
sea WWW Image Searching Delivers High Precision and No Misinformation: Reality or Ideal? By Published On :: Full Article
sea Blended E-Learning in Higher Education: Research on Students’ Perspective By Published On :: Full Article
sea A Research Study for the Development of a SOA Middleware Prototype that used Web Services to Bridge the LMS to LOR Data Movement Interoperability Gap for Education By Published On :: Full Article
sea Project Management Principles Applied in Academic Research Projects By Published On :: Full Article
sea Ransomware: A Research and a Personal Case Study of Dealing with this Nasty Malware By Published On :: 2017-04-23 Aim/Purpose : Share research finding about ransomware, depict the ransomware work in a format that commonly used by researchers and practitioners and illustrate personal case experience in dealing with ransomware. Background: Author was hit with Ransomware, suffered a lot from it, and did a lot of research about this topic. Author wants to share findings in his research and his experience in dealing with the aftermath of being hit with ransomware. Methodology: Case study. Applying the literature review for a personal case study. Contribution: More knowledge and awareness about ransomware, how it attacks peoples’ computers, and how well informed users can be hit with this malware. Findings: Even advanced computer users can be hit and suffer from Ransomware attacks. Awareness is very helpful. In addition, this study drew in chart format what is termed “The Ransomware Process”, depicting in chart format the steps that ransomware hits users and collects ransom. Recommendations for Practitioners : Study reiterates other recommendations made for dealing with ransomware attacks but puts them in personal context for more effective awareness about this malware. Recommendation for Researchers: This study lays the foundation for additional research to find solutions to the ransomware problem. IT researchers are aware of chart representations to depict cycles (like SDLC). This paper puts the problem in similar representation to show the work of ransomware. Impact on Society: Society will be better informed about ransomware. Through combining research, illustrating personal experience, and graphically representing the work of ransomware, society at large will be better informed about the risk of this malware. Future Research: Research into solutions for this problem and how to apply them to personal cases. Full Article
sea Design of a Knowledge Management System for the Research-Teaching Nexus: Evidence from Institutional Audit Reports By Published On :: 2020-05-01 Aim/Purpose: The need for Higher Education Institutions (HEIs) to maximize the use of their intellectual property and strategic resources for research and teaching has become ever more evident in recent years. Furthermore, little attention is paid in developing an enabling system that will facilitate knowledge transfer in the Research-Teaching Nexus (RTN). Hence, this study assesses the current state of practice in knowledge management of the nexus in higher education in Oman. It also explores the context of how Knowledge Management System (KMS) for the nexus can be designed and utilized by HEIs and challenges them to rethink their traditional approaches in managing their knowledge as-sets to boost individual and organizational learning. Background: This study provides a Knowledge Management-based framework and design of a knowledge management system that support the academic community towards the improvement of the nexus. This study sets out ideas from various academic and professional experts on how academic stakeholders in the higher education can improve and promote knowledge transfer and make better use of its knowledge and research assets for teaching and learning. It stressed the importance of having the knowledge assets or resources that can easily be pooled, accessed, and made available to its intended stakeholders. Methodology: Data were gathered from 29 out of 49 institutional quality audit reports of all HEIs in Oman. The panel comments were coded and analysed to extract valuable insights regarding the management of knowledge assets in research. Additionally, data were gathered from the institutional accreditation outcomes page of the same website. Manifest and latent content analyses were used in reporting the findings of the panel. Contribution: The study will contribute to a greater understanding and acceptance of Knowledge Management (KM) in higher education and extended the body of knowledge concerning knowledge management for the RTN. Findings: The reports revealed a very limited practice of the nexus in terms of people and culture, structure ad processes, and computing and web technologies. A few staff are involved in RTN work, there is an uneven understanding of the RTN among staff, limited joint research between staff and students are some of the reasons for this. Significantly, there is no explicit research framework or policy for the RTN, and systems and/or mechanisms are limited. Further-more, the reports did not account any use of computing and web technologies for the nexus. These limitations can lead to students with less academic, research, and graduate skills. Hence, this study presents a feature design of a KMS that incorporates various RTN best practices, as informed by the reports and literature. The design will allow the staff to utilize the research assets in the classroom, at the same time, engages students in research and scholarly under-takings. Recommendations for Practitioners: All HEIs must have a innovative system that integrates a formal agenda and approach, and set initiatives, strategies, policies, and procedures for knowledge management in utilizing research assets for teaching and learning. It must be designed so that RTN practices remain up-to-date, relevant, and responsive to the needs of the stakeholders, as well as, address academic accreditation challenges. Recommendation for Researchers: Researchers can evaluate the knowledge management of RTN practices of other HEIs outside of Oman to effectively recommend the proper course of action for teaching and learning improvement. Impact on Society: This study will redefine the role and contribution of HEIs, which are key players in advancing a knowledge economy. HEIs are expected to be powerhouses where academic knowledge is discovered, created, disseminated, shared, and re-invented. They must be able to fully grasp the value of managing knowledge to be able to effect positive and purposeful change to the community. Future Research: Future work should include staff and student surveys that examine the knowledge management need of the learning organization to better inform the design of a KMS for the RTN. Thereafter, future research can test the stage to test the effectiveness of the conceptual design. Full Article
sea Over Mountain Tops and Through the Valleys of Postgraduate Study and Research: A Transformative Learning Experience from Two Supervisees’ Perspectives By Published On :: 2020-05-01 Aim/Purpose: The purpose of this paper is to illuminate the learning that happens in assuming a supervisee’s role during the postgraduate study. Background: The facilitators and barriers students encountered while pursuing postgraduate studies, strategies to achieve success in postgraduate studies, and how to decrease attrition rates of students, have been sufficiently explored in literature. However, there is little written about the personal and professional impact on students when they are being supervised to complete their postgraduate studies. Methodology: Autoethnographic method of deep reflection was used to examine the learning that transpired from the supervisee’s perspective. Two lecturers (a Senior Lecturer in Nursing and an Aboriginal Tutor) focused on their postgraduate journeys as supervisees, respectively, with over 30 years of study experience between them, in Australia and abroad. Contribution: Future postgraduate students, researchers, would-be supervisors and experienced supervisors could learn from the reflections of the authors’ postgraduate experiences. Findings: Four themes surfaced, and these were Eureka moments, Critical friend(s), Supervisory relationship, and Transformative learning. The authors highlighted the significance of a supervisory relationship which is key to negotiating the journey with the supervisor. Essential for these students also were insights on finding the path as well as the destination and the transformative aspects that happened as a necessary part of the journey. Conclusion. The postgraduate journey has taught them many lessons, the most profound of which was the change in perspective and attitude in the process of being and becoming. Personal and professional transformative learning did occur. At its deepest level, the authors’ reflections resulted in self-actualization and a rediscovery of their more authentic selves. Recommendations for Practitioners: This article highlights the importance of the supervisory relationship that must be negotiated to ensure the success of the candidate. Reflections of the transformation are recommended to support the students further. Recommendation for Researchers: Quality supervision can make a significant influence on the progress of students. Further research on the supervisory relationship is recommended. Impact on Society: The support in terms of supervision to ensure postgraduate students’ success is essential. Postgraduate students contribute to the human, social, professional, intellectual, and economic capital of universities and nations globally. Future Research: Further reflections of the transformative learning will advance the understanding of the personal and professional changes that occur with postgraduate supervision. Full Article
sea Online Teaching With M-Learning Tools in the Midst of Covid-19: A Reflection Through Action Research By Published On :: 2021-06-12 Aim/Purpose: In the midst of COVID-19, classes are transitioned online. Instructors and students scramble for ways to adapt to this change. This paper shares an experience of one instructor in how he has gone through the adaptation. Background: This section provides a contextual background of online teaching. The instructor made use of M-learning to support his online teaching and adopted the UTAUT model to guide his interpretation of the phenomenon. Methodology: The methodology used in this study is action research through participant-observation. The instructor was able to look at his own practice in teaching and reflect on it through the lens of the UTAUT conceptual frame-work. Contribution: The results helped the instructor improve his practice and better under-stand his educational situations. From the narrative, others can adapt and use various apps and platforms as well as follow the processes to teach online. Findings: This study shares an experience of how one instructor had figured out ways to use M-learning tools to make the online teaching and learning more feasible and engaging. It points out ways that the instructor could connect meaningfully with his students through the various apps and plat-forms. Recommendations for Practitioners: The social aspects of learning are indispensable whether it takes place in person or online. Students need opportunities to connect socially; there-fore, instructors should try to optimize technology use to create such opportunities for conducive learning. Recommendations for Researchers: Quantitative studies using surveys or quasi-experiment methods should be the next step. Validated inventories with measures can be adopted and used in these studies. Statistical analysis can be applied to derive more objective findings. Impact on Society: Online teaching emerges as a solution for the delivery of education in the midst of COVID-19, but more studies are needed to overcome obstacles and barriers to both instructors and students. Future Research: Future studies should look at the obstacles that instructors encounter and the barriers with technology access and inequalities that students face in online classes. Full Article
sea Machine Learning-based Flu Forecasting Study Using the Official Data from the Centers for Disease Control and Prevention and Twitter Data By Published On :: 2021-06-03 Aim/Purpose: In the United States, the Centers for Disease Control and Prevention (CDC) tracks the disease activity using data collected from medical practice's on a weekly basis. Collection of data by CDC from medical practices on a weekly basis leads to a lag time of approximately 2 weeks before any viable action can be planned. The 2-week delay problem was addressed in the study by creating machine learning models to predict flu outbreak. Background: The 2-week delay problem was addressed in the study by correlation of the flu trends identified from Twitter data and official flu data from the Centers for Disease Control and Prevention (CDC) in combination with creating a machine learning model using both data sources to predict flu outbreak. Methodology: A quantitative correlational study was performed using a quasi-experimental design. Flu trends from the CDC portal and tweets with mention of flu and influenza from the state of Georgia were used over a period of 22 weeks from December 29, 2019 to May 30, 2020 for this study. Contribution: This research contributed to the body of knowledge by using a simple bag-of-word method for sentiment analysis followed by the combination of CDC and Twitter data to generate a flu prediction model with higher accuracy than using CDC data only. Findings: The study found that (a) there is no correlation between official flu data from CDC and tweets with mention of flu and (b) there is an improvement in the performance of a flu forecasting model based on a machine learning algorithm using both official flu data from CDC and tweets with mention of flu. Recommendations for Practitioners: In this study, it was found that there was no correlation between the official flu data from the CDC and the count of tweets with mention of flu, which is why tweets alone should be used with caution to predict a flu out-break. Based on the findings of this study, social media data can be used as an additional variable to improve the accuracy of flu prediction models. It is also found that fourth order polynomial and support vector regression models offered the best accuracy of flu prediction models. Recommendations for Researchers: Open-source data, such as Twitter feed, can be mined for useful intelligence benefiting society. Machine learning-based prediction models can be improved by adding open-source data to the primary data set. Impact on Society: Key implication of this study for practitioners in the field were to use social media postings to identify neighborhoods and geographic locations affected by seasonal outbreak, such as influenza, which would help reduce the spread of the disease and ultimately lead to containment. Based on the findings of this study, social media data will help health authorities in detecting seasonal outbreaks earlier than just using official CDC channels of disease and illness reporting from physicians and labs thus, empowering health officials to plan their responses swiftly and allocate their resources optimally for the most affected areas. Future Research: A future researcher could use more complex deep learning algorithms, such as Artificial Neural Networks and Recurrent Neural Networks, to evaluate the accuracy of flu outbreak prediction models as compared to the regression models used in this study. A future researcher could apply other sentiment analysis techniques, such as natural language processing and deep learning techniques, to identify context-sensitive emotion, concept extraction, and sarcasm detection for the identification of self-reporting flu tweets. A future researcher could expand the scope by continuously collecting tweets on a public cloud and applying big data applications, such as Hadoop and MapReduce, to perform predictions using several months of historical data or even years for a larger geographical area. Full Article
sea Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress] By Published On :: 2024-06-23 Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together. Full Article
sea A Guided Approach for Personalized Information Search and Visualization By Published On :: Full Article
sea Using Research Techniques to Teach Management of IT Concepts to Postgraduate Business Students By Published On :: Full Article
sea A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research By Published On :: Full Article
sea Innovation Capability: A Systematic Review and Research Agenda By Published On :: 2016-09-27 Purpose: Innovation capability is a growing and significant area of academic research. However, there is little attempt to provide a cumulative overview of this phenomenon. The purpose of this systematic review is to synthesize peer reviewed articles published in the area to develop a conceptual framework and to aid future research. Design/Methodology/Approach: The paper adopted a systematic review of literature on innovation capability. The final screening generated 51 articles from 30 journals from 2000-2015. Findings: The examination and synthesis of the theoretical and the empirical articles show that (1) the authors applied narrow range of conceptual and theoretical foundations; (2) innovation capability is being investigated mostly at the firm level for about 90% of the articles, and marginally about 5% at network (supply) chain level; (3) the authors define innovation capability in different ways and use diverse set of dimensions to measure innovation capability; (4) there is potential for future research across firms in innovation management disciplines. Practical implications: The review contributes to theory development in organizational capability literature in general. Managers wishing to innovate need to examine critically and integrate some of the innovation capability dimensions proposed in this paper. Originality: The review is unique in the sense that it provides conceptualisation of innovation capability framework. Full Article
sea Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries By Published On :: 2017-09-06 Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries. Full Article
sea A Systematic Literature Review of Agile Maturity Model Research By Published On :: 2017-02-28 Background/Aim/Purpose: A commonly implemented software process improvement framework is the capability maturity model integrated (CMMI). Existing literature indicates higher levels of CMMI maturity could result in a loss of agility due to its organizational focus. To maintain agility, research has focussed attention on agile maturity models. The objective of this paper is to find the common research themes and conclusions in agile maturity model research. Methodology: This research adopts a systematic approach to agile maturity model research, using Google Scholar, Science Direct, and IEEE Xplore as sources. In total 531 articles were initially found matching the search criteria, which was filtered to 39 articles by applying specific exclusion criteria. Contribution:: The article highlights the trends in agile maturity model research, specifically bringing to light the lack of research providing validation of such models. Findings: Two major themes emerge, being the coexistence of agile and CMMI and the development of agile principle based maturity models. The research trend indicates an increase in agile maturity model articles, particularly in the latter half of the last decade, with concentrations of research coinciding with version updates of CMMI. While there is general consensus around higher CMMI maturity levels being incompatible with true agility, there is evidence of the two coexisting when agile is introduced into already highly matured environments. Future Research: Future research direction for this topic should include how to attain higher levels of CMMI maturity using only agile methods, how governance is addressed in agile environments, and whether existing agile maturity models relate to improved project success. Full Article
sea Epidemic Intelligence Models in Air Traffic Networks for Understanding the Dynamics in Disease Spread - A Case Study By Published On :: 2023-11-12 Aim/Purpose: The understanding of disease spread dynamics in the context of air travel is crucial for effective disease detection and epidemic intelligence. The Susceptible-Exposed-Infectious-Recovered-Hospitalized-Critical-Deaths (SEIR-HCD) model proposed in this research work is identified as a valuable tool for capturing the complex dynamics of disease transmission, healthcare demands, and mortality rates during epidemics. Background: The spread of viral diseases is a major problem for public health services all over the world. Understanding how diseases spread is important in order to take the right steps to stop them. In epidemiology, the SIS, SIR, and SEIR models have been used to mimic and study how diseases spread in groups of people. Methodology: This research focuses on the integration of air traffic network data into the SEIR-HCD model to enhance the understanding of disease spread in air travel settings. By incorporating air traffic data, the model considers the role of travel patterns and connectivity in disease dissemination, enabling the identification of high-risk routes, airports, and regions. Contribution: This research contributes to the field of epidemiology by enhancing our understanding of disease spread dynamics through the application of the SIS, SIR, and SEIR-HCD models. The findings provide insights into the factors influencing disease transmission, allowing for the development of effective strategies for disease control and prevention. Findings: The interplay between local outbreaks and global disease dissemination through air travel is empirically explored. The model can be further used for the evaluation of the effectiveness of surveillance and early detection measures at airports and transportation hubs. The proposed research contributes to proactive and evidence-based strategies for disease prevention and control, offering insights into the impact of air travel on disease transmission and supporting public health interventions in air traffic networks. Recommendations for Practitioners: Government intervention can be studied during difficult times which plays as a moderating variable that can enhance or hinder the efficacy of epidemic intelligence efforts within air traffic networks. Expert collaboration from various fields, including epidemiology, aviation, data science, and public health with an interdisciplinary approach can provide a more comprehensive understanding of the disease spread dynamics in air traffic networks. Recommendation for Researchers: Researchers can collaborate with international health organizations and authorities to share their research findings and contribute to a global understanding of disease spread in air traffic networks. Impact on Society: This research has significant implications for society. By providing a deeper understanding of disease spread dynamics, it enables policymakers, public health officials, and practitioners to make informed decisions to mitigate disease outbreaks. The recommendations derived from this research can aid in the development of effective strategies to control and prevent the spread of infectious diseases, ultimately leading to improved public health outcomes and reduced societal disruptions. Future Research: Practitioners of the research can contribute more effectively to disease outbreaks within the context of air traffic networks, ultimately helping to protect public health and global travel. By considering air traffic patterns, the SEIR-HCD model contributes to more accurate modeling and prediction of disease outbreaks, aiding in the development of proactive and evidence-based strategies to manage and mitigate the impact of infectious diseases in the context of air travel. Full Article
sea Alzheimer's disease classification using hybrid Alex-ResNet-50 model By www.inderscience.com Published On :: 2024-11-08T23:20:50-05:00 Alzheimer's disease (AD), a leading cause of dementia and mortality, presents a growing concern due to its irreversible progression and the rising costs of care. Early detection is crucial for managing AD, which begins with memory deterioration caused by the damage to neurons involved in cognitive functions. Although incurable, treatments can manage its symptoms. This study introduces a hybrid AlexNet+ResNet-50 model for AD diagnosis, utilising a pre-trained convolutional neural network (CNN) through transfer learning to analyse MRI scans. This method classifies MRI images into Alzheimer's disease (AD), moderate cognitive impairment (MCI), and normal control (NC), enhancing model efficiency without starting from scratch. Incorporating transfer learning allows for refining the CNN to categorise these conditions accurately. Our previous work also explored atlas-based segmentation combined with a U-Net model for segmentation, further supporting our findings. The hybrid model demonstrates superior performance, achieving 94.21% accuracy in identifying AD cases, indicating its potential as a highly effective tool for early AD diagnosis and contributing to efforts in managing the disease's impact. Full Article
sea International Journal of Bioinformatics Research and Applications By www.inderscience.com Published On :: Full Article
sea Social Bookmarking Tools as Facilitators of Learning and Research Collaborative Processes: The Diigo Case By Published On :: Full Article