été

What we know and do not know about video games as marketers: a review and synthesis of the literature

The video game industry (VGI) has evolved considerably, transitioning from a niche market to a substantial sector. The VGI's magnitude and the societal implications tied to video game consumption have naturally piqued the interest of scholars in marketing and consumer behaviour. This research serves a dual purpose: firstly, it consolidates existing VG literature by evaluating articles, concepts, and methodologies, systematically tracing their evolution; secondly, it outlines potential directions and implications for forthcoming research. Within this literature, a predominant focus lies on articles investigating purchase decisions concerning VGs, followed by those exploring the integration of video game consumption into broader social contexts. Notably, a limited number of articles delve into player-game interactions and experiences within gaming worlds. This imbalance can be attributed to the fact that such inquiries are often suited to psychology and multidisciplinary journals, while the marketing discipline has predominantly addressed the VGI from a marketing management standpoint.




été

Navigating the digital frontier: a systematic review of digital governance's determinants in public administration

The aim of the study is to examine the determinants of digitalisation in public sector. This research is particularly relevant as digital transformation has become a crucial factor in modernising public sector and enhancing service delivery to citizens. The method of the systematic literature review (SLR) was implemented by searching documents on the Scopus database. The initial research reached the 7902 documents and after specifying the keywords the authors found 207 relevant documents. Finally; after the careful read of their abstracts and the use of inclusion and exclusion criteria; the most cited and relevant 32 papers constituted the final sample. Findings highlighted the focus of the literature on technological factors such as the sense of trust and safety as well as the ease of use in the adoption of digital governance; emphasising the need for effective; trustworthy and user-friendly digital services. The most discussed internal factors were leadership and organisational culture. The study offers a deeper understanding of the factors that shape the successful implementation of digital governance initiatives.




été

First Year Engagement & Retention: A Goal-Setting Approach




été

ICT Teachers’ Professional Growth Viewed in terms of Perceptions about Teaching and Competencies




été

Presenting an Alternative Source Code Plagiarism Detection Framework for Improving the Teaching and Learning of Programming




été

A Real-time Plagiarism Detection Tool for Computer-based Assessments

Aim/Purpose: The aim of this article is to develop a tool to detect plagiarism in real time amongst students being evaluated for learning in a computer-based assessment setting. Background: Cheating or copying all or part of source code of a program is a serious concern to academic institutions. Many academic institutions apply a combination of policy driven and plagiarism detection approaches. These mechanisms are either proactive or reactive and focus on identifying, catching, and punishing those found to have cheated or plagiarized. To be more effective against plagiarism, mechanisms that detect cheating or colluding in real-time are desirable. Methodology: In the development of a tool for real-time plagiarism prevention, literature review and prototyping was used. The prototype was implemented in Delphi programming language using Indy components. Contribution: A real-time plagiarism detection tool suitable for use in a computer-based assessment setting is developed. This tool can be used to complement other existing mechanisms. Findings: The developed tool was tested in an environment with 55 personal computers and found to be effective in detecting unauthorized access to internet, intranet, and USB ports on the personal computers. Recommendations for Practitioners: The developed tool is suitable for use in any environment where computer-based evaluation may be conducted. Recommendation for Researchers: This work provides a set of criteria for developing a real-time plagiarism prevention tool for use in a computer-based assessment. Impact on Society: The developed tool prevents academic dishonesty during an assessment process, consequently, inculcating confidence in the assessment processes and respectability of the education system in the society. Future Research: As future work, we propose a comparison between our tool and other such tools for its performance and its features. In addition, we want to extend our work to include testing for scalability of the tool to larger settings.




été

Unveiling the Digital Equation Through Innovative Approaches for Teaching Discrete Mathematics to Future Computer Science Educators

Aim/Purpose: This study seeks to present a learning model of discrete mathematics elements, elucidate the content of teaching, and validate the effectiveness of this learning in a digital education context. Background: Teaching discrete mathematics in the realm of digital education poses challenges, particularly in crafting the optimal model, content, tools, and methods tailored for aspiring computer science teachers. The study draws from both a comprehensive review of relevant literature and the synthesis of the authors’ pedagogical experiences. Methodology: The research utilized a system-activity approach and aligned with the State Educational Standard. It further integrated the theory of continuous education as its psychological and pedagogical foundation. Contribution: A unique model for instructing discrete mathematics elements to future computer science educators has been proposed. This model is underpinned by informative, technological, and personal competencies, intertwined with the mathematical bedrock of computer science. Findings: The study revealed the importance of holistic teaching of discrete mathematics elements for computer science teacher aspirants in line with the Informatics educational programs. An elective course, “Elements of Discrete Mathematics in Computer Science”, comprising three modules, was outlined. Practical examples spotlighting elements of mathematical logic and graph theory of discrete mathematics in programming and computer science were showcased. Recommendations for Practitioners: Future computer science educators should deeply integrate discrete mathematics elements in their teaching methodologies, especially when aligning with professional disciplines of the Informatics educational program. Recommendation for Researchers: Further exploration is recommended on the seamless integration of discrete mathematics elements in diverse computer science curricula, optimizing for varied learning outcomes and student profiles. Impact on Society: Enhancing the quality of teaching discrete mathematics to future computer science teachers can lead to better-educated professionals, driving advancements in the tech industry and contributing to societal progress. Future Research: There is scope to explore the wider applications of the discrete mathematics elements model in varied computer science sub-disciplines, and its adaptability across different educational frameworks.




été

Implementation of a novel technique for ordering of features algorithm in detection of ransomware attack

In today's world, malware has become a part and threat to our computer systems. All electronic devices are very susceptible/vulnerable to various threats like different types of malware. There is one subset of malware called ransomware, which is majorly used to have large financial gains. The attacker asks for a ransom amount to regain access to the system/data. When dynamic technique using machine learning is used, it is very important to select the correct set of features for the detection of a ransomware attack. In this paper, we present two novel algorithms for the detection of ransomware attacks. The first algorithm is used to assign the time stamp to the features (API calls) for the ordering and second is used for the ordering and ranking of the features for the early detection of a ransomware attack.




été

Determinants of FinTech adoption by microfinance institutions in India to increase efficiency and productivity

The present study attempts to find out the determinants of FinTech adoption for financial inclusion by a microfinance institution in India. The factors such as efficiency, consistency, convenience, reliability are taken as predictors of organisational attitude. Similarly, organisational attitude, ease of use, and perceived benefits are considered as antecedents of organisational adoption intention of FinTech in microfinance institutions of India. The purposive sampling technique was used to get a filled survey instrument by target samples. The results indicate that convenience and consistency in the use of FinTech applications build a favourable attitude to adopt it. Furthermore, perceived benefits are the most important antecedents of the adoption intention of FinTech in the microfinance institution in India. Additionally, the reliability of the application has a positive but insignificant impact on organisational attitude to adopt FinTech. The implications of the present study are discussed.




été

Synoptic crow search with recurrent transformer network for DDoS attack detection in IoT-based smart homes

Smart home devices are vulnerable to various attacks, including distributed-denial-of-service (DDoS) attacks. Current detection techniques face challenges due to nonlinear thought, unusual system traffic, and the fluctuating data flow caused by human activities and device interactions. Identifying the baseline for 'normal' traffic and suspicious activities like DDoS attacks from encrypted data is also challenging due to the encrypted protective layer. This work introduces a concept called synoptic crow search with recurrent transformer network-based DDoS attack detection, which uses the synoptic weighted crow search algorithm to capture varying traffic patterns and prioritise critical information handling. An adaptive recurrent transformer neural network is introduced to effectively regulate DDoS attacks within encrypted data, counting the historical context of the data flow. The proposed model shows effective performance in terms of low false alarm rate, higher detection rate, and accuracy.




été

An MCDM approach to compare different concepts of SMED to reduce the setup time in concrete products manufacturing: a case study

In the construction sector, moulding machines are crucial in producing concrete products, yet changing their mould can pose challenges for some businesses. This paper presents a case study aimed at reducing the setup time of HESS RH 600 moulding machine. Four alternatives are proposed and evaluated to achieve this goal. The first alternative involves converting internal to external activities, while the subsequent alternatives aim to improve the basic solution. These include building a canopy near the machine (alternative 2), installing an air reservoir (alternative 3), and a comprehensive approach involving building the canopy, installing the air reservoir, and adding a new forklift to facilitate the machine setup process (alternative 4). The analytic hierarchy process (AHP) heuristic method is used to select the best alternative solution based on prespecified criteria. It is found that the application of the single-minute exchange of die (SMED) solution without any further improvement is the most favourable.




été

Evolution of academic research in French business schools (2008-2018): isomorphism and heterogeneity

In the perspective of institutional theory, business education is an institutional field, in which two major institutional forces are accreditations and rankings. In this context, French business schools (BS) have adopted an isomorphic response by starting to engage in research and publishing in academic journals. Studies have discussed their research as a new institutional trajectory. However, what remains unknown is how they differ from each other in such research dynamics. To bring new insights to the discussion, this quantitative study examines, over the period of 2008-2018, the evolution of research of French BS by systematically comparing the 'best' schools with other schools in all analyses. The results indicate a strong isomorphism in terms of publication quantity and productivity, scale of research collaboration and the internationalisation of research. However, these schools are heterogeneous in terms research quality and scale of international research collaboration, reflecting the diversity in their research strategy.




été

Modeling and Performance Analysis of Dynamic Random Early Detection (DRED) Gateway for Congestion Avoidance




été

A Profile of Digital Information Literacy Competencies of High School Students




été

Workflows without Engines: Modeling for Today’s Heterogeneous Information Systems  




été

Automatic Conceptual Analysis for Plagiarism Detection




été

An Exploration of How a Technology-Facilitated Part-Complete Solution Method Supports the Learning of Computer Programming




été

Assessing for Competence Need Not Devalue Grades




été

Aligning Efficacy Beliefs and Competence: A Framework for Developing Technical Knowledge




été

A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems




été

A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)




été

Place Determinants for the Personalization-Privacy Tradeoff among Students

Aim/Purpose: This exploratory study investigates the influential factors of users’ decisions in the dilemma of whether to agree to online personalization or to protect their online privacy. Background: Various factors related to online privacy and anonymity were considered, such as user’s privacy concern on the Web in general and particularly on social networks, user online privacy literacy, and field of study. Methodology: To this end, 155 students from different fields of study in the Israeli academia were administered closed-ended questionnaires. Findings: The multivariate linear regression analysis showed that as the participants’ privacy concern increases, they tend to prefer privacy protection over online personalization. In addition, there were significant differences between men and women, as men tended to favor privacy protection more than women did. Impact on Society: This research has social implications for the academia and general public as they show it is possible to influence the personalization-privacy tradeoff and encourage users to prefer privacy protection by raising their concern for the preservation of their online privacy. Furthermore, the users’ preference to protect their privacy even at the expense of their online malleability may lead to the reduction of online privacy-paradox behavior. Future Research: Since our results were based on students' self-perceptions, which might be biased, future work should apply qualitative analysis to explore additional types and influencing factors of online privacy behavior.




été

The Competencies Required for the BPA Role: An Analysis of the Kenyan Context

Aim/Purpose: This study aims to answer the research question titled What are the competencies required for the Business Process Analyst (BPA) role in organizations with ERP systems in Kenya. Through 4 hypotheses, this study focuses on two specific aspects: (1) Enhancing BPM Maturity and (2) ERP implementation. Background: The emergence of complex systems and complex processes in organizations in Kenya has given rise to the need to understand the BPM domain as well as a need to analyze the new roles within organizational environments that drive BPM initiatives. The most notable role in this domain is the BPA. Furthermore, many organizations in Kenya and across Africa are making significant investments in ERP systems. Organizations, therefore, need to understand the BPA role for ERP systems implementation projects. Methodology: This study uses a sequential mixed methods approach analyzing quantitative survey data followed by the analysis of qualitative interview data. Contribution: The main contribution of this study is a description of competencies that are critical for the BPA in Kenya both in terms of enhancing BPM maturity and for driving ERP systems implementations. In addition, this study sheds light on critical BPA competencies that are perceived to be undervalued in the Kenyan context. Findings: Findings show that business process orchestration competencies are important for driving BPM maturity and for ERP systems implementations. This study found that business process elicitation, business analysis, business process improvement and a holistic overview of business thinking are often overlooked as critical competencies for BPAs but are nevertheless critical for building the BPA practitioner. Recommendations for Practitioners: From this study, practitioners such as top managers and BPAs can be enlightened on the specific competencies that require focus when carrying out BPM and when implementing ERP systems projects. Future Research: The next step is to investigate the interventions that organizations implement to build their BPA competencies. The main aim of this would be to describe those interventions that impact the requisite BPA competencies especially those competencies that were seen to be undervalued within the Kenyan context.




été

Automatic Detection and Classification of Dental Restorations in Panoramic Radiographs

Aim/Purpose: The aim of this study was to develop a prototype of an information-generating computer tool designed to automatically map the dental restorations in a panoramic radiograph. Background: A panoramic radiograph is an external dental radiograph of the oro-maxillofacial region, obtained with minimal discomfort and significantly lower radiation dose compared to full mouth intra-oral radiographs or cone-beam computed tomography (CBCT) imaging. Currently, however, a radiologic informative report is not regularly designed for a panoramic radiograph, and the referring doctor needs to interpret the panoramic radiograph manually, according to his own judgment. Methodology: An algorithm, based on techniques of computer vision and machine learning, was developed to automatically detect and classify dental restorations in a panoramic radiograph, such as fillings, crowns, root canal treatments and implants. An experienced dentist evaluated 63 panoramic anonymized images and marked on them, manually, 316 various restorations. The images were automatically cropped to obtain a region of interest (ROI) containing only the upper and lower alveolar ridges. The algorithm automatically segmented the restorations using a local adaptive threshold. In order to improve detection of the dental restorations, morphological operations such as opening, closing and hole-filling were employed. Since each restoration is characterized by a unique shape and unique gray level distribution, 20 numerical features describing the contour and the texture were extracted in order to classify the restorations. Twenty-two different machine learning models were evaluated, using a cross-validation approach, to automatically classify the dental restorations into 9 categories. Contribution: The computer tool will provide automatic detection and classification of dental restorations, as an initial step toward automatic detection of oral pathologies in a panoramic radiograph. The use of this algorithm will aid in generating a radiologic report which includes all the information required to improve patient management and treatment outcome. Findings: The automatic cropping of the ROI in the panoramic radiographs, in order to include only the alveolar ridges, was successful in 97% of the cases. The developed algorithm for detection and classification of the dental restorations correctly detected 95% of the restorations. ‘Weighted k-NN’ was the machine-learning model that yielded the best classification rate of the dental restorations - 92%. Impact on Society: Information that will be extracted automatically from the panoramic image will provide a reliable, reproducible radiographic report, currently unavailable, which will assist the clinician as well as improve patients’ reliance on the diagnosis. Future Research: The algorithm for automatic detection and classification of dental restorations in panoramic imaging must be trained on a larger dataset to improve the results. This algorithm will then be used as a preliminary stage for automatically detecting incidental oral pathologies exhibited in the panoramic images.




été

Autoethnography of the Cultural Competence Exhibited at an African American Weekly Newspaper Organization

Aim/Purpose: Little is known of the cultural competence or leadership styles of a minority owned newspaper. This autoethnography serves to benchmark one early 1990s example. Background: I focused on a series of flashbacks to observe an African American weekly newspaper editor-in-chief for whom I reported to 25 years ago. In my reflections I sought to answer these questions: How do minorities in entrepreneurial organizations view their own identity, their cultural competence? What degree of this perception is conveyed fairly and equitably in the community they serve? Methodology: Autoethnography using both flashbacks and article artifacts applied to the leadership of an early 1990s African American weekly newspaper. Contribution: Since a literature gap of minority newspaper cultural competence examples is apparent, this observation can serve as a benchmark to springboard off older studies like that of Barbarin (1978) and that by examining the leadership styles and editorial authenticity as noted by The Chicago School of Media Theory (2018), these results can be used for comparison to other such minority owned publications. Findings: By bringing people together, mixing them up, and conducting business any other way than routine helped the Afro-American Gazette, Grand Rapids, proudly display a confidence sense of cultural competence. The result was a potentiating leadership style, and this style positively changed the perception of culture, a social theory change example. Recommendations for Practitioners: For the minority leaders of such publications, this example demonstrates effective use of potentiating leadership to positively change the perception of the quality of such minority owned newspapers. Recommendations for Researchers: Such an autoethnography could be used by others to help document other examples of cultural competence in other minority owned newspapers. Impact on Society: The overall impact shows that leadership at such minority owned publications can influence the community into a positive social change example. Future Research: Research in the areas of culture competence, leadership, within minority owned newspapers as well as other minority alternative publications and websites can be observed with a focus on what works right as well as examples that might show little social change model influence. The suggestion is to conduct the research while employed if possible, instead of relying on flashbacks.




été

Factors Determining the Balance between Online and Face-to-Face Teaching: An Analysis using Actor-Network Theory




été

Using eTechnologies for Active Learning




été

Determinants of Intent to Continue Using Online Learning: A Tale of Two Universities




été

Heart Rate Recovery in Decision Support for High Performance Athlete Training Schedules

This work investigated the suitability of a new tool for decision support in training programs of high performance athletes. The aim of this study was to find a reliable and robust measure of the fitness of an athlete for use as a tool for adjusting training schedules. We examined the use of heart rate recovery percentage (HRr%) for this purpose, using a two-phased approach. Phase 1 consisted of testing the suitability of HRr% as a measure of aerobic fitness, using a modified running test specifically designed for high-performance team running sports such as football. Phase 2 was conducted over a 12-week training program with two different training loads. HRr% measured aerobic fitness and a running time-trial measured performance. Consecutive measures of HRr% during phase 1 indicated a Pearson’s r of 0.92, suggesting a robust measure of aerobic fitness. During phase 2, HRr% reflected the training load and significantly increased when the training load was reduced between weeks 4 to 5. This work shows that HRr% is a robust indicator of aerobic fitness and provides an on-the-spot index that is useful for training load adjustment of elite-performance athletes.




été

Security as a Solution: An Intrusion Detection System Using a Neural Network for IoT Enabled Healthcare Ecosystem

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.




été

Understanding the Determinants of Wearable Payment Adoption: An Empirical Study

Aim/Purpose: The aim of this study is to determine the variables which affect the intention to use Near Field Communication (NFC)-enabled smart wearables (e.g., smartwatches, rings, wristbands) payments. Background: Despite the enormous potential of wearable payments, studies investigating the adoption of this technology are scarce. Methodology: This study extends the Technology Acceptance Model (TAM) with four additional variables (Perceived Security, Trust, Perceived Cost, and Attractiveness of Alternatives) to investigate behavioral intentions to adopt wearable payments. The moderating role of gender was also examined. Data collected from 311 Kuwaiti respondents were analyzed using Structural Equation Modeling (SEM) and multi-group analysis (MGA). Contribution: The research model provided in this study may be useful for academics and scholars conducting further research into m-payments adoption, specifically in the case of wearable payments where studies are scarce and still in the nascent stage; hence, addressing the gap in existing literature. Further, this study is the first to have specifically investigated wearable payments in the State of Kuwait; therefore, enriching Kuwaiti context literature. Findings: This study empirically demonstrated that behavioral intention to adopt wearable payments is mainly predicted by attractiveness of alternatives, perceived usefulness, perceived ease of use, perceived security and trust, while the role of perceived cost was found to be insignificant. Recommendations for Practitioners: This study draws attention to the importance of cognitive factors, such as perceived usefulness and ease of use, in inducing users’ behavioral intention to adopt wearable payments. As such, in the case of perceived usefulness, smart wearable devices manufacturers and banks enhance the functionalities and features of these devices, expand on the financial services provided through them, and maintain the availability, performance, effectiveness, and efficiency of these tools. In relation to ease of use, smart wearable devices should be designed with an easy to use, high quality and customizable user interface. The findings of this study demonstrated the influence of trust and perceived security in motivating users to adopt wearable payments, Hence, banks are advised to focus on a relationship based on trust, especially during the early stages of acceptance and adoption of wearable payments. Recommendation for Researchers: The current study validated the role of attractiveness of alternatives, which was never examined in the context of wearable payments. This, in turn, provides a new dimension about a determinant factor considered by customers in predicting their behavioral intention to adopt wearable payments. Impact on Society: This study could be used in other countries to compare and verify the results. Additionally, the research model of this study could also be used to investigate other m-payments methods, such as m-wallets and P2P payments. Future Research: Future studies should investigate the proposed model in a cross-country and cross-cultural perspective with additional economic, environmental, and technological factors. Also, future research may conduct a longitudinal study to explain how temporal changes and usage experience affect users’ behavioral intentions to adopt wearable payments. Finally, while this study included both influencing factors and inhibiting factors, other factors such as social influence, perceived compatibility, personal innovativeness, mobility, and customization could be considered in future research.




été

The Roles of Knowledge Management and Cooperation in Determining Company Innovation Capability: A Literature Review

Aim/Purpose: The aim of this study is to develop a research model derived from relevant literature to guide empirical efforts. Background: Companies struggle to innovate, which is essential for improving their performance, surviving in competition, and growing. A number of studies have discussed company innovation capability, stating that innovation capability is influenced by several variables such as cooperation and knowledge management. Therefore, further research is necessary to identify factors playing a role in enhancing innovation capability. Methodology: This study is based on systematic literature review. The stages are: (1) research scope review, (2) comprehensive online research, (3) journal quality assessment, (4) data extraction from journals, (5) journal synthesis, and (6) comprehensive report. The online research used Google Scholar database, by browsing titles, abstracts, and keywords to locate empirical research studies in peer-reviewed journals published in 2010-2020. Furthermore, 62 related articles were found, of which 38 articles were excluded from further analysis and 24 articles were selected because they were more related to the topic. Contribution: The results of this study enrich the research in the field of knowledge management, cooperation, and innovation capability by developing a conceptual framework of innovation capability. The proposed theoretical model may be fundamental in addressing the need of a research model to guide further empirical efforts. Findings: This study provides a research model derived from systematically reviewing relevant literature. The proposed theoretical model was done by incorporating the aspects of knowledge management, cooperation, and innovation capability. The model shows that knowledge management and cooperation are essential aspects of innovation capability. Furthermore, this study also provides the dimensions and sub dimensions of each variable that was established after synthesizing the literature review. Recommendations for Practitioners: Business practitioners can use the identified predictors of innovation capability and the dimensions of each variable to explore their company’s innovation capability. They can also take the relevant variables into consideration when making policies regarding innovation. Recommendation for Researchers: The theoretical model proposed in this study needs validation with further empirical investigation. Impact on Society: Readers of this paper can obtain an understanding that knowledge management and cooperation are essential aspects to consider in enhancing innovation capability. Future Research: Future studies should explore other dimensions of knowledge management and cooperation through alternative approaches and perspectives.




été

Implementing Security in IoT Ecosystem Using 5G Network Slicing and Pattern Matched Intrusion Detection System: A Simulation Study

Aim/Purpose: 5G and IoT are two path-breaking technologies, and they are like wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G as a wall. The main challenge that emerges here is to secure the ecosystem created by the collaboration of 5G and IoT, which consists of a network, users, endpoints, devices, and data. Other than underlying and hereditary security issues, they bring many Zero-day vulnerabilities, which always pose a risk. This paper proposes a security solution using network slicing, where each slice serves customers with different problems. Background: 5G and IoT are a combination of technology that will enhance the user experience and add many security issues to existing ones like DDoS, DoS. This paper aims to solve some of these problems by using network slicing and implementing an Intrusion Detection System to identify and isolate the compromised resources. Methodology: This paper proposes a 5G-IoT architecture using network slicing. Research here is an advancement to our previous implementation, a Python-based software divided into five different modules. This paper’s amplification includes induction of security using pattern matching intrusion detection methods and conducting tests in five different scenarios, with 1000 up to 5000 devices in different security modes. This enhancement in security helps differentiate and isolate attacks on IoT endpoints, base stations, and slices. Contribution: Network slicing is a known security technique; we have used it as a platform and developed a solution to host IoT devices with peculiar requirements and enhance their security by identifying intruders. This paper gives a different solution for implementing security while using slicing technology. Findings: The study entails and simulates how the IoT ecosystem can be variedly deployed on 5G networks using network slicing for different types of IoT devices and users. Simulation done in this research proves that the suggested architecture can be successfully implemented on IoT users with peculiar requirements in a network slicing environment. Recommendations for Practitioners: Practitioners can implement this solution in any live or production IoT environment to enhance security. This solution helps them get a cost-effective method for deploying IoT devices on a 5G network, which would otherwise have been an expensive technology to implement. Recommendation for Researchers: Researchers can enhance the simulations by amplifying the different types of IoT devices on varied hardware. They can even perform the simulation on a real network to unearth the actual impact. Impact on Society: This research provides an affordable and modest solution for securing the IoT ecosystem on a 5G network using network slicing technology, which will eventually benefit society as an end-user. This research can be of great assistance to all those working towards implementing security in IoT ecosystems. Future Research: All the configuration and slicing resources allocation done in this research was performed manually; it can be automated to improve accuracy and results. Our future direction will include machine learning techniques to make this application and intrusion detection more intelligent and advanced. This simulation can be combined and performed with smart network devices to obtain more varied results. A proof-of-concept system can be implemented on a real 5G network to amplify the concept further.




été

Determinants of Online Behavior Among Jordanian Consumers: An Empirical Study of OpenSooq

Aim/Purpose: This study identifies the elements that influence intentions to purchase from the most popular Arabic online classifieds platform, OpenSooq.com. Background: Online purchasing has become popular among consumers in the past two decades, with perceived risk and trust playing key roles in consumers’ intention to purchase online. Methodology: A questionnaire survey was conducted of Internet users from three Jordanian districts to investigate how they used the OpenSooq platform in their e-commerce activities. In total, 202 usable responses were collected, and the data were analyzed with PLS-SEM for hypothesis testing and model validation. Contribution: Though online trading is increasingly popular, the factors that impact the behavior of consumers when purchasing high-value products have not been adequately investigated. Therefore, this study examined the factors affecting perceived risk, and the potential impact of privacy concerns on the perceived risk of online smartphone buyers. The study framework can help explore online behavior in various situations to ascertain similarities and differences and probe other aspects of online buying. Findings: Perceived risk negatively correlates with online purchasing behavior and trust. However, privacy concern and perceived risk, transaction security and trust, and trust and online purchasing behavior exhibited positive correlations. Recommendations for Practitioners: Customers can complete and retain online purchases in a range of settings illuminated in this study’s methods and procedures. Moreover, businesses can manage their IT arrangements to make Internet shopping more convenient and build processes for online shopping that allow for engagement, training, and ease of use, thus improving their customers’ online purchasing behavior. Recommendation for Researchers: Given the insight into the understanding and integration of variables including perceived risk, privacy issues, trust, transaction security, and online purchasing behavior, academics can build on the groundwork of this research paradigm to investigate underdeveloped countries, particularly Jordan, further. Impact on Society: Understanding the characteristics that influence online purchasing behavior can help countries realize the full potential of online shopping, particularly the benefits of safe, fast, and low-cost financial transactions without the need for an intermediary. Future Research: Future research can examine the link between online purchase intent, perceived risk, privacy concerns, trust, and transaction security to see if the findings of this study in Jordan can be applied to a broader context in other countries.




été

Determinants of Knowledge Transfer for Information Technology Project Managers: A Systematic Literature Review

Aim/Purpose: The purpose of this study is to identify the key determinants hindering Knowledge Transfer (KT) practices for Information Technology Project Managers (ITPMs) Background: The failure rate of IT projects remains unacceptably high worldwide, and KT between project managers and team members has been recognized as a significant issue affecting project success. Therefore, this study tries to identify the determinants of KT within the context of IT projects for ITPMs. Methodology: A systematic review of the literature (SLR) was employed in the investigation. The SLR found 28 primary studies on KT for ITPMs that were published in Scopus and Web of Science databases between 2010 and 2023. Contribution: Social Cognitive Theory (SCT) was used to build a theoretical framework where the determinants were categorized into Personal factors, Environmental (Project organizational) factors, and other factors, such as Technological factors influencing ITPMs (Behavioral factors), to implement in KT practices. Findings: The review identified 11 key determinants categorized into three broad categories: Personal factors (i.e., motivation, absorptive capability, trust, time urgency), Project Organizational factors (i.e., team structure, leadership style, reward system, organizational culture, communication), and Technological factors (i.e., project task collaboration tool and IT infrastructure and support) that influence implementing KT for ITPMs Recommendations for Practitioners: The proposed framework in this paper can be used by project managers as a guide to adopt KT practices within their project organization. Recommendation for Researchers: The review showed that some determinants, such as Technological factors, have not been adequately explored in the existing KT model in the IT projects context and can be integrated with other relevant theories to understand how a project manager’s knowledge can be transferred and retained in the organization using technology in future research. Impact on Society: This study emphasizes the role of individual actions and project organizational and technological matters in shaping the efficacy of KT within project organizations. It offers insight that could steer business owners or executives within project organizations to closely observe the behavior of project managers, thereby securing successful project outcomes. Future Research: The determinant list provided in this paper is acquired from extensive SLR and, therefore, further research should aim to expand and deepen the investigation by validating these determinants from experts in the field of IT and project management. Future studies can also add other external technological determinants to provide a more comprehensive KT implementation framework. Similarly, this research does not include determinants identified directly from the industry, as it relies solely on determinants found in the existing literature. Although a comprehensive attempt has been made to encompass all relevant papers, there remains a potential for overlooking some research in this process.




été

Determinants of the Intention to Use Big Data Analytics in Banks and Insurance Companies: The Moderating Role of Managerial Support

Aim/Purpose: The aim of this research paper is to suggest a comprehensive model that incorporates the technology acceptance model with the task-technology fit model, information quality, security, trust, and managerial support to investigate the intended usage of big data analytics (BDA) in banks and insurance companies. Background: The emergence of the concept of “big data,” prompted by the widespread use of connected devices and social media, has been pointed out by many professionals and financial institutions in particular, which makes it necessary to assess the determinants that have an impact on behavioral intention to use big data analytics in banks and insurance companies. Methodology: The integrated model was empirically assessed using self-administered questionnaires from 181 prospective big data analytics users in Moroccan banks and insurance firms and examined using partial least square (PLS) structural equation modeling. The results cover sample characteristics, an analysis of the validity and reliability of measurement models’ variables, an evaluation of the proposed hypotheses, and a discussion of the findings. Contribution: The paper makes a noteworthy contribution to the BDA adoption literature within the finance sector. It stands out by ingeniously amalgamating the Technology Acceptance Model (TAM) with Task-Technology Fit (TTF) while underscoring the critical significance of information quality, trust, and managerial support, due to their profound relevance and importance in the finance domain. Thus showing BDA has potential applications beyond the finance sector. Findings: The findings showed that TTF and trust’s impact on the intention to use is considerable. Information quality positively impacted perceived usefulness and ease of use, which in turn affected the intention to use. Moreover, managerial support moderates the correlation between perceived usefulness and the intention to use, whereas security did not affect the intention to use and managerial support did not moderate the influence of perceived ease of use. Recommendations for Practitioners: The results suggest that financial institutions can improve their adoption decisions for big data analytics (BDA) by understanding how users perceive it. Users are predisposed to use BDA if they presume it fits well with their tasks and is easy to use. The research also emphasizes the importance of relevant information quality, managerial support, and collaboration across departments to fully leverage the potential of BDA. Recommendation for Researchers: Further study may be done on other business sectors to confirm its generalizability and the same research design can be employed to assess BDA adoption in organizations that are in the advanced stage of big data utilization. Impact on Society: The study’s findings can enable stakeholders of financial institutions that are at the primary stage of big data exploitation to understand how users perceive BDA technologies and the way their perception can influence their intention toward their use. Future Research: Future research is expected to conduct a comparison of the moderating effect of managerial support on users with technical expertise versus those without; in addition, international studies across developed countries are required to build a solid understanding of users’ perceptions towards BDA.




été

Determinants of Radical and Incremental Innovation: The Roles of Human Resource Management Practices, Knowledge Sharing, and Market Turbulence

Aim/Purpose: Given the increasingly important role of knowledge and human resources for firms in developing and emerging countries to pursue innovation, this paper aims to study and explore the potential intermediating roles of knowledge donation and collection in linking high-involvement human resource management (HRM) practice and innovation capability. The paper also explores possible moderators of market turbulence in fostering the influences of knowledge-sharing (KS) behaviors on innovation competence in terms of incremental and radical innovation. Background: The fitness of HRM practice is critical for organizations to foster knowledge capital and internal resources for improving innovation and sustaining competitive advantage. Methodology: The study sample is 309 respondents and Structural Equation Model (SEM) was used for the analysis of the data obtained through a questionnaire survey with the aid of AMOS version 22. Contribution: This paper increases the understanding of the precursor role of high-involvement HRM practices, intermediating mechanism of KS activities, and the regulating influence of market turbulence in predicting and fostering innovation capability, thereby pushing forward the theory of HRM and innovation management. Findings: The empirical findings support the proposed hypotheses relating to the intermediating role of KS in the HRM practices-innovation relationship. It spotlights the crucial character of market turbulence in driving the domination of knowledge-sharing behaviors on incremental innovation. Recommendations for Practitioners: The proposed research model can be applied by leaders and directors to foster their organizational innovation competence. Recommendation for Researchers: Researchers are recommended to explore the influence of different models of HRM practices on innovation to identify the most effective pathway leading to innovation for firms in developing and emerging nations. Impact on Society: This paper provides valuable initiatives for firms in developing and emerging markets on how to leverage the strategic and internal resources of an organization for enhancing innovation. Future Research: Future studies should investigate the influence of HRM practices and knowledge resources to promote frugal innovation models for dealing with resource scarcity.




été

Investigating the Determinants of Online Shopping Repurchase Intention in Generation Z Customers in India: An Exploratory Study

Aim/Purpose: This study investigates the factors that affect the repurchase intentions of Generation Z consumers in India’s online shopping industry, focusing on combining the Expectation-Confirmation Model (ECM) and Extended Technology Acceptance Model (E-TAM). The aim is to understand the intricate behaviors that shape technology adoption and sustained usage, which are essential for retaining customers in e-commerce. Background: Social media and other online platforms have significantly influenced daily life and become essential communication tools owing to technological advancements. Online shopping is no exception, offering a range of product choices, information, and convenience compared with traditional commerce. Indian retailers recognize this trend as an opportunity to promote their brands through e-shopping platforms, leading to increased competition. Generation Z comprises 32% of the world’s population and is a significant emerging customer base in India. Numerous studies have been conducted to study customers’ repurchase intention in the online shopping domain, but few studies have explicitly focused on Generation Z as a customer base. This study aims to comprehensively understand the topic and investigate the variables that impact consumers’ online repurchase intention by examining their post-adoption behavioral processes. Methodology: The study employed a quantitative research design with structural equation modeling using AMOS to analyze responses from 410 participants. This method thoroughly examined hypotheses regarding factors affecting repurchase intention (security, ease of use, privacy, and internet self-efficacy) and the mediating role of e-satisfaction. Contribution: This study makes a unique contribution to the field of e-commerce by focusing on Generation Z in India, a rapidly growing demographic in the e-commerce industry. The results on the mediating role of e-satisfaction have significant implications for e-retailers seeking to enhance customer retention strategies and gain a competitive edge in the market. Findings: The research findings underscore the significant influence of security, ease of use, and internet self-efficacy on repurchase intentions, with e-satisfaction playing a pivotal role as a mediating factor. Notably, while privacy concerns did not directly impact repurchase intentions, they displayed considerable influence when mediated by e-satisfaction, highlighting the intricate interplay between these variables in the context of online shopping, which is the unique finding of this study. Recommendations for Practitioners: This study has several significant implications for practitioners. Effectively addressing computer-related individual differences, such as computer self-efficacy, is crucial for boosting online customers’ repurchase intention. For instance, if an e-retailer intends to target Generation Z customers, they should collaborate with IT professionals and develop various computer literacy programs on online streaming platforms, such as YouTube. These programs will enhance target customers’ confidence in online shopping portals and increase their online repeat purchases. Additionally, practitioners should strive to improve the online shopping experience by making the portal user-friendly. Generation Z is accustomed to a fast Internet experience, so they prefer that the process of completing online transactions is swift with fewer clicks. The search for products, payments, and redress should not be tedious. Furthermore, the primary objective of the e-retailer should be to satisfy customers, as satisfied customers repeat their purchases and increase overall profitability. Recommendation for Researchers: The current study was conducted in the Delhi-NCR region of India, and its findings could serve as a basis for future research. For instance, the scale devised in this study could be utilized to examine the impact of cash-on-delivery as a payment method on purchase intention across the country. Alternatively, a comparative analysis could be conducted to compare cash-on-delivery effects in various countries. Impact on Society: The study’s findings enable stakeholders in the online shopping industry to comprehend the post-adoption behavior of Generation Z users and augment existing literature by establishing a correlation between determinants that impact repurchase intention and e-satisfaction, which serves as a mediator. Future Research: This study examines the factors that impact the propensity of Generation Z shoppers to engage in repeat online purchases. This study focuses on India, where the Generation Y (millennial) customer base is also substantial within the online shopping market. Future research could compare the shopping habits of Generation Z and Generation Y customers, as the latter may place greater importance on privacy and security. Additional studies could broaden the scope of this research and explore the comparative viewpoints of both generations. Also, it would be advantageous to conduct in-depth interviews and longitudinal studies to acquire a more in-depth comprehension of the evolving digitalization of shopping.




été

Revolutionizing Autonomous Parking: GNN-Powered Slot Detection for Enhanced Efficiency

Aim/Purpose: Accurate detection of vacant parking spaces is crucial for autonomous parking. Deep learning, particularly Graph Neural Networks (GNNs), holds promise for addressing the challenges of diverse parking lot appearances and complex visual environments. Our GNN-based approach leverages the spatial layout of detected marking points in around-view images to learn robust feature representations that are resilient to occlusions and lighting variations. We demonstrate significant accuracy improvements on benchmark datasets compared to existing methods, showcasing the effectiveness of our GNN-based solution. Further research is needed to explore the scalability and generalizability of this approach in real-world scenarios and to consider the potential ethical implications of autonomous parking technologies. Background: GNNs offer a number of advantages over traditional parking spot detection methods. Unlike methods that treat objects as discrete entities, GNNs may leverage the inherent connections among parking markers (lines, dots) inside an image. This ability to exploit spatial connections leads to more accurate parking space detection, even in challenging scenarios with shifting illumination. Real-time applications are another area where GNNs exhibit promise, which is critical for autonomous vehicles. Their ability to intuitively understand linkages across marking sites may further simplify the process compared to traditional deep-learning approaches that need complex feature development. Furthermore, the proposed GNN model streamlines parking space recognition by potentially combining slot inference and marking point recognition in a single step. All things considered, GNNs present a viable method for obtaining stronger and more precise parking slot recognition, opening the door for autonomous car self-parking technology developments. Methodology: The proposed research introduces a novel, end-to-end trainable method for parking slot detection using bird’s-eye images and GNNs. The approach involves a two-stage process. First, a marking-point detector network is employed to identify potential parking markers, extracting features such as confidence scores and positions. After refining these detections, a marking-point encoder network extracts and embeds location and appearance information. The enhanced data is then loaded into a fully linked network, with each node representing a marker. An attentional GNN is then utilized to leverage the spatial relationships between neighbors, allowing for selective information aggregation and capturing intricate interactions. Finally, a dedicated entrance line discriminator network, trained on GNN outputs, classifies pairs of markers as potential entry lines based on learned node attributes. This multi-stage approach, evaluated on benchmark datasets, aims to achieve robust and accurate parking slot detection even in diverse and challenging environments. Contribution: The present study makes a significant contribution to the parking slot detection domain by introducing an attentional GNN-based approach that capitalizes on the spatial relationships between marking points for enhanced robustness. Additionally, the paper offers a fully trainable end-to-end model that eliminates the need for manual post-processing, thereby streamlining the process. Furthermore, the study reduces training costs by dispensing with the need for detailed annotations of marking point properties, thereby making it more accessible and cost-effective. Findings: The goal of this research is to present a unique approach to parking space recognition using GNNs and bird’s-eye photos. The study’s findings demonstrated significant improvements over earlier algorithms, with accuracy on par with the state-of-the-art DMPR-PS method. Moreover, the suggested method provides a fully trainable solution with less reliance on manually specified rules and more economical training needs. One crucial component of this approach is the GNN’s performance. By making use of the spatial correlations between marking locations, the GNN delivers greater accuracy and recall than a completely linked baseline. The GNN successfully learns discriminative features by separating paired marking points (creating parking spots) from unpaired ones, according to further analysis using cosine similarity. There are restrictions, though, especially where there are unclear markings. Successful parking slot identification in various circumstances proves the recommended method’s usefulness, with occasional failures in poor visibility conditions. Future work addresses these limitations and explores adapting the model to different image formats (e.g., side-view) and scenarios without relying on prior entry line information. An ablation study is conducted to investigate the impact of different backbone architectures on image feature extraction. The results reveal that VGG16 is optimal for balancing accuracy and real-time processing requirements. Recommendations for Practitioners: Developers of parking systems are encouraged to incorporate GNN-based techniques into their autonomous parking systems, as these methods exhibit enhanced accuracy and robustness when handling a wide range of parking scenarios. Furthermore, attention mechanisms within deep learning models can provide significant advantages for tasks that involve spatial relationships and contextual information in other vision-based applications. Recommendation for Researchers: Further research is necessary to assess the effectiveness of GNN-based methods in real-world situations. To obtain accurate results, it is important to employ large-scale datasets that include diverse lighting conditions, parking layouts, and vehicle types. Incorporating semantic information such as parking signs and lane markings into GNN models can enhance their ability to interpret and understand context. Moreover, it is crucial to address ethical concerns, including privacy, potential biases, and responsible deployment, in the development of autonomous parking technologies. Impact on Society: Optimized utilization of parking spaces can help cities manage parking resources efficiently, thereby reducing traffic congestion and fuel consumption. Automating parking processes can also enhance accessibility and provide safer and more convenient parking experiences, especially for individuals with disabilities. The development of dependable parking capabilities for autonomous vehicles can also contribute to smoother traffic flow, potentially reducing accidents and positively impacting society. Future Research: Developing and optimizing graph neural network-based models for real-time deployment in autonomous vehicles with limited resources is a critical objective. Investigating the integration of GNNs with other deep learning techniques for multi-modal parking slot detection, radar, and other sensors is essential for enhancing the understanding of the environment. Lastly, it is crucial to develop explainable AI methods to elucidate the decision-making processes of GNN models in parking slot detection, ensuring fairness, transparency, and responsible utilization of this technology.




été

Decoding YouTube Video Reviews: Uncovering The Factors That Determine Video Review Helpfulness

Aim/Purpose: This study aims to identify the characteristics of YouTube video reviews that consumers utilize to evaluate review helpfulness and explores how they process such information. This study aims to investigate the effect of argument quality, review popularity, number of likes, and source credibility on consumers’ perception of YouTube’s video review helpfulness. Background: Video reviews posted on YouTube are an emerging form of online reviews, which have the potential to be more helpful than textual reviews due to their visual and audible cues that deliver more vivid information about product features and specifications. With the availability of an enormous number of video reviews with unpredictable quality, it becomes challenging for consumers to find helpful reviews without consuming significant time and effort. In addition, YouTube does not provide a specific feature that indicates a review helpfulness similar to the one found on e-commerce websites. Consequently, consumers have to examine the characteristics of video reviews that are readily available on YouTube, evaluate them, and form a perception of whether a review is helpful or not. Despite the increasing popularity of YouTube’s video reviews, video reviews’ helpfulness received inadequate attention in the literature. The antecedents of the helpfulness of online video reviews are still underinvestigated, and more research is needed to identify the characteristics that consumers depend upon to assess video review helpfulness. Furthermore, it is important to understand how consumers process the information they gain from these characteristics to form a perception of their helpfulness. Methodology: Following an extended investigation of the relevant literature, we identified four key video characteristics that consumers presumably utilize to evaluate review helpfulness on YouTube (i.e., review popularity, number of likes, source credibility, and argument quality). By employing the Elaboration Likelihood Model (ELM), we classified these characteristics along the central and peripheral routes. The central route characteristics require a high cognitive effort by consumers to process the review’s message and reach a logical decision. In contrast, the peripheral route assumes that consumers judge the review’s message based on superficial qualities without substantial cognitive effort. A research model is introduced to investigate the effect of central and peripheral cues and their corresponding video review characteristics on review helpfulness. Accordingly, argument quality is proposed in the central route of the model, while review popularity, number of likes, and source credibility are proposed in the peripheral route. Furthermore, the study investigates how consumers process the information they obtain from these routes jointly or independently. To empirically test the proposed model, a convenient sample of 361 YouTube users was obtained through an online survey. The partial least squares method was used to investigate the effect of the proposed characteristics on video review helpfulness. Contribution: This study contributes to the literature in several ways. First, it is one of the few studies that investigate online video reviews’ helpfulness. Second, this study identifies several unique characteristics of YouTube’s video reviews that span peripheral and central routes, which potentially contribute to review helpfulness. Third, this study proposes a conceptual model based on the ELM to explore the effect of central and peripheral cues and their corresponding review characteristics on review helpfulness. Fourth, the research findings provide implications for research and practice that advance the theoretical understanding of video reviews’ helpfulness and serve as guidelines to create more helpful video reviews by better understanding the consumer’s cognitive processes. Findings: The results show that among the four characteristics proposed in the research model, argument quality in the central route is the strongest determinant factor affecting video review helpfulness. Results also show that review popularity, source credibility, and the number of likes in the peripheral route have significant effects on video review helpfulness. Altogether, our results show that the effect of the peripheral route adds up to 0.463 compared to 0.430, which is the impact magnitude of the argument quality construct in the central route. Based on the comparable effect magnitude of the central and peripheral routes of the model on video review helpfulness, our results indicate that both peripheral and central cues significantly affect consumers’ perception of video review helpfulness. The two routes are not mutually exclusive, and their cues can be processed in parallel or consecutive ways. Recommendations for Practitioners: The study recommends creating a dedicated category for reviews on YouTube with a specific feature for consumers to indicate the helpfulness of a video review, similar to the helpful vote button in textual reviews. The study also recommends that reviewers deliver more appealing and convincing argument quality, work toward improving their credibility, and understand the factors that contribute to video popularity. Impact on Society: Identifying the characteristics that affect video review helpfulness on YouTube helps consumers access helpful reviews more efficiently and improves their purchase decisions. Future Research: Future research could look into different types of data that could be extracted from YouTube to investigate the helpfulness of online video reviews. Future studies could employ machine learning and sentiment analysis techniques to reach more insights. Future research could also investigate the effect of product types in the context of online video reviews.




été

Experiences and Opinions of E-learners: What Works, What are the Challenges, and What Competencies Ensure Successful Online Learning




été

The Resonance Factor: Probing the Impact of Video on Student Retention in Distance Learning




été

An Assessment of Competency-Based Simulations on E-Learners’ Management Skills Enhancements

There is a growing interest in the assessment of tangible skills and competence. Specifically, there is an increase in the offerings of competency-based assessments, and some academic institutions are offering college credits for individuals who can demonstrate adequate level of competency on such assessments. An increased interest has been placed on competency-based computer simulations that can assist learners to gain tangible skills. While computer simulations and competency-based projects, in general and particularly in management, have demonstrated great value, there are still limited empirical results on their benefits to e-learners. Thus, we have developed a quasi-experimental research, using a survey instrument on pre- and post-tests, to collect the set of 12 management skills from e-learners attending courses that included both competency-based computer simulations and those that didn’t. Our data included a total of 253 participants. Results show that all 12 management skills measures demonstrated very high reliability. Our results also indicate that all 12 skills of the competency-based computer simulations had higher increase than those that didn’t. Analyses on the mean increases indicated an overall statistically significant difference for six of the 12 management skills enhancements between the experimental and control groups. Our findings demonstrate that overall computer simulations and competency-based projects do provide added value in the context of e-learning when it comes to management skills.




été

Computer Self-Efficacy: A Practical Indicator of Student Computer Competency in Introductory IS Courses




été

Detecting Data Errors in Organizational Settings: Examining the Generalizability of Experimental Findings




été

An Attention Economy Perspective on the Effectiveness of Incomplete Information




été

The Impact of Inaccurate Color on Customer Retention and CRM




été

International Standard of Transdisciplinary Education and Transdisciplinary Competence

Aim/Purpose: The year 2020 marks the 50th anniversary of the first official definition of the term “transdisciplinarity.” This paper focuses on a critical analysis of the development of modern transdisciplinarity since its inception. Background: The article presents two main directions for the development of transdisciplinarity. It also shows its identification features, strengths, and weaknesses, as well as the significant role transdisciplinarity plays in science and education. Methodology: The methodology employed in this article is a content analysis of resolutions of international forums as well as articles on transdisciplinarity published from 1970 to 2019. Contribution: For one reason or the other, several of these authors did not quote the opinions of the original authors of transdisciplinarity. The subsequent use of those articles by other authors thus posed some ambiguities about the place and role of transdisciplinarity in science and education. The advent of e-databases has made it possible to access the original forum articles. This further made it possible to refine the original content of the term “transdisciplinarity” and to trace its development without mixing it with vague opinions. Based on these findings, the perception of transdisciplinarity as a marginal trend in science and education could be eliminated. Findings: This paper shows how modern transdisciplinarity is developing into two main directions: transdisciplinarity in science as well as transdisciplinarity in education. These orientations have individual goals and objectives. The transdisciplinarity of scientific research helps to complete the transformation of the potential for interdisciplinary interaction and the integration of disciplines. Whereas, in education, transdisciplinarity (meta-discipline) is about developing an international standard for transdisciplinary education and also describing the content of transdisciplinary competence for students of diverse disciplines at all levels of higher education (bachelor’s, master’s and postgraduate studies). Recommendation for Researchers: Transdisciplinary research involves the interaction of people with disciplinary knowledge plus a degree of scientific outlook. Since disciplinary knowledge domains remain in their disciplinary boxes, it is, therefore, advisable to generalize disciplinary knowledge rather than force them to interact. This is the basis for proposing the systems transdisciplinary approach—which provides a methodology for unifying and generalizing disciplinary knowledge. Future Research: As the research shows, the organizers of modern international forums do not take into account the division of transdisciplinarity development trends. To increase the effectiveness and significance of such forums, it is necessary to return to the practice of organizing special international forums on the transdisciplinarity of science and that of education.




été

Ensemble Learning Approach for Clickbait Detection Using Article Headline Features

Aim/Purpose: The aim of this paper is to propose an ensemble learners based classification model for classification clickbaits from genuine article headlines. Background: Clickbaits are online articles with deliberately designed misleading titles for luring more and more readers to open the intended web page. Clickbaits are used to tempted visitors to click on a particular link either to monetize the landing page or to spread the false news for sensationalization. The presence of clickbaits on any news aggregator portal may lead to an unpleasant experience for readers. Therefore, it is essential to distinguish clickbaits from authentic headlines to mitigate their impact on readers’ perception. Methodology: A total of one hundred thousand article headlines are collected from news aggregator sites consists of clickbaits and authentic news headlines. The collected data samples are divided into five training sets of balanced and unbalanced data. The natural language processing techniques are used to extract 19 manually selected features from article headlines. Contribution: Three ensemble learning techniques including bagging, boosting, and random forests are used to design a classifier model for classifying a given headline into the clickbait or non-clickbait. The performances of learners are evaluated using accuracy, precision, recall, and F-measures. Findings: It is observed that the random forest classifier detects clickbaits better than the other classifiers with an accuracy of 91.16 %, a total precision, recall, and f-measure of 91 %.




été

The Impact of Vocabulary Preteaching and Content Previewing on the Listening Comprehension of Arabic-Speaking EFL Learners

Aim/Purpose: The purpose of this study is to determine the impact of pre-listening activities on Arabic-speaking EFL learners’ comprehension of spoken texts. Background: This study aims to contribute to the current research and to increase our understanding about the effectiveness of pre-listening activities. Specifically, this study seeks to clarify some of the research in this area that seems to be incongruent. Methodology: The study investigates two widely implemented activities in second language (L2) classrooms: vocabulary preteaching and content previewing. Ninety-three native-Arabic speaking EFL learners, whose proficiently levels were beginner, intermediate, or advanced, were randomly assigned to a control group or one of three experimental groups: the vocabulary-only (VO) group, content-only (CO) group, or vocabulary + content (VC) group. Each of the experimental groups received one of the treatments to determine which pre-listening activity was more effective and whether additional pre-listening activities yield additional comprehension. Listening comprehension of the aural text was measured by a test comprising 13 multiple-choice and true-false questions. Contribution: The present study provided additional explanations regarding the long-standing contradicting results about vocabulary preteaching and content previewing. Findings: The results showed that pre-listening activities had a positive impact on Arabic-speaking EFL learners’ listening comprehension, with the VO group significantly increasing their scores on the posttest compared to those of the control or other groups. Vocabulary preteaching was particularly beneficial for more advanced learners. With regard to which pre-listening activity contributed the most to better listening comprehension, vocabulary preteaching was the most effective. Content previewing did not increase comprehension for the CO group and had no additional benefit for the VC group. Recommendation for Researchers: This paper recommends that researchers explore new pre-listening activities that have never studied. Future research should be extended to include other nations and contextual situations to extend our knowledge about the effect of pre-listening activities. As far as listening comprehension can only be achieved when listeners are attentive and engaged, the listening text should be interesting and the lexical coverage of the listening text should be appropriate for all participants. Future Research: The results are to be interpreted carefully because they are limited by the students’ L2 proficiency, demographic, and cultural backgrounds (i.e., first language (L1) proficiency, age, gender, Middle Eastern culture). Results might be quite different if the study was conducted with different populations who have different life and language learning experiences (Vandergrift & Baker, 2015). Therefore, the results of this study indicate there is much room for improvement and a need for further research.