the

COVID-19 disruptions driving sustainable tourism: a case of the Hawaiian tourism industry

This study inquires about the COVID-19-generated momentum and how it resulted in transformative opportunities for the hard-hit tourism industry in Hawai'i. It also investigates the type of sustainability-based management strategies that were favoured by actors from the industry to help navigate uncertain times and capture transformative opportunities. Findings indicate that actors from the tourism industry in Hawai'i perceived the COVID-19 pandemic as a huliau, or a point of transformation, to reflect and re-evaluate the tourism industry's responsibility and shift toward a recovery focused on sustainability. This research confirms that the pandemic-driven momentum accelerated opportunities for changing and transforming traditional business models and indicators of progress within the tourism industry in Hawai'i. Further research may explore additional Pacific Island countries to gain a deeper understanding of the problem within the region's context.




the

Evaluation method for the effectiveness of online course teaching reform in universities based on improved decision tree

Aiming at the problems of long evaluation time and poor evaluation accuracy of existing evaluation methods, an improved decision tree-based evaluation method for the effectiveness of college online course teaching reform is proposed. Firstly, the teaching mode of college online course is analysed, and an evaluation system is constructed to ensure the applicability of the evaluation method. Secondly, AHP entropy weight method is used to calculate the weights of evaluation indicators to ensure the accuracy and authority of evaluation results. Finally, the evaluation model based on decision tree algorithm is constructed and improved by fuzzy neural network to further optimise the evaluation results. The parameters of fuzzy neural network are adjusted and gradient descent method is used to optimise the evaluation results, so as to effectively evaluate the effect of college online course teaching reform. Through experiments, the evaluation time of the method is less than 5 ms, and the evaluation accuracy is more than 92.5%, which shows that the method is efficient and accurate, and provides an effective evaluation means for the teaching reform of online courses in colleges and universities.




the

A method for evaluating the quality of college curriculum teaching reform based on data mining

In order to improve the evaluation effect of current university teaching reform, a new method for evaluating the quality of university course teaching reform is proposed based on data mining algorithms. Firstly, the optimal data clustering criterion was used to select evaluation indicators and a quality evaluation system for university curriculum teaching reform was established. Next, a reform quality evaluation model is constructed using BP neural network, and the training process is improved through genetic algorithm to obtain the model weight and threshold of the optimal solution. Finally, the calculated parameters are substituted into the model to achieve accurate evaluation of the quality of university curriculum teaching reform. Selecting evaluation accuracy and evaluation efficiency as evaluation indicators, the practicality of the proposed method was verified through experiments. The experimental results showed that the proposed method can mine teaching reform data and evaluate the quality of teaching reform. Its evaluation accuracy is higher than 96.3%, and the evaluation time is less than 10ms, which is much better than the comparison method, fully demonstrating the practicality of the method.




the

A method for evaluating the quality of teaching reform based on fuzzy comprehensive evaluation

In order to improve the comprehensiveness of evaluation results and reduce errors, a teaching reform quality evaluation method based on fuzzy comprehensive evaluation is proposed. Firstly, on the premise of meeting the principles of indicator selection, factor analysis is used to construct an evaluation indicator system. Then, calculate the weights of various evaluation indicators through fuzzy entropy, establish a fuzzy evaluation matrix, and calculate the weight vector of evaluation indicators. Finally, the fuzzy cognitive mapping method is introduced to improve the fuzzy comprehensive evaluation method, obtaining the final weight of the evaluation indicators. The weight is multiplied by the fuzzy evaluation matrix to obtain the comprehensive evaluation result. The experimental results show that the maximum relative error of the proposed method's evaluation results is about 2.0, the average comprehensive evaluation result is 92.3, and the determination coefficient is closer to 1, verifying the application effect of this method.




the

Constitutional and international legal framework for the protection of genetic resources and associated traditional knowledge: a South African perspective

The value and utility of traditional knowledge in conserving and commercialising genetic resources are increasingly becoming apparent due to advances in biotechnology and bioprospecting. However, the absence of an international legally binding instrument within the WIPO system means that traditional knowledge associated with genetic resources is not sufficiently protected like other forms of intellectual property. This means that indigenous peoples and local communities (IPLCs) do not benefit from the commercial exploitation of these resources. The efficacy of domestic tools to protect traditional knowledge and in balancing the rights of IPLCs and intellectual property rights (IPRs) is still debated. This paper employs a doctrinal research methodology based on desktop research of international and regional law instruments and the Constitution of the Republic of South Africa, 1996, to determine the basis for balancing the protection of genetic resources and associated traditional knowledge with competing interests of IPLCs and IPRs in South Africa.




the

Intellectual property protection for virtual assets and brands in the Metaverse: issues and challenges

Intellectual property rights face new obstacles and possibilities as a result of the emergence of the Metaverse, a simulation of the actual world. This paper explores the current status of intellectual property rights in the Metaverse and examines the challenges and opportunities for enforcement. The article describes virtual assets and investigates their copyright and trademark protection. It also examines the protection of user-generated content in the Metaverse and the potential liability for copyright infringement. The article concludes with a consideration of the technological and jurisdictional obstacles to enforcing intellectual property rights in the Metaverse, as well as possible solutions for stakeholders. This paper will appeal to lawyers, policymakers, developers of virtual assets, platform owners, and anyone interested in the convergence of technology and intellectual property rights.




the

Emotional intelligence and managerial leadership in the fast moving consumer durable goods industry in India's perspective

Dynamic nature of the FMCG sector perpetually provides a tricky challenge for organisational leaders to nurture their employees. High demand for products, less shelf life and tough competitors always challenge the leaders to uphold their products in the market. Due to technology and e-commerce, many new competitors have joined the market, vying with the industry's veterans. Due to their unique business models that match client needs, these firms are expected to boost FMCG industry income in the future. Managers' leadership styles depend primarily on emotional intelligence. This quantitative study examines how emotional intelligence influences West Bengal FMCG senior managers' leadership styles. 500 FMCG managers were selected. PLS-SEM is used to study. Emotionally competent leaders choose transactional and transformational leadership styles depending on the occasion. Managers' transactional leadership style is strongly influenced by their sympathetic awareness, as shown by a path coefficient of 0.755. Transformational leadership style has a path coefficient of 0.693, indicating that managers' empathy affects their organisational management. Thus, sympathetic awareness and emotion regulation predict good management leadership.




the

The performance evaluation of teaching reform based on hierarchical multi-task deep learning

The research goal is to solve the problems of low accuracy and long time existing in traditional teaching reform performance evaluation methods, a performance evaluation method of teaching reform based on hierarchical multi-task deep learning is proposed. Under the principle of constructing the evaluation index system, the evaluation indicator system should be constructed. The weight of the evaluation index is calculated through the analytic hierarchy process, and the calculation result of the evaluation weight is taken as the model input sample. A hierarchical multi-task deep learning model for teaching reform performance evaluation is built, and the final teaching reform performance score is obtained. Through relevant experiments, it is proved that compared with the experimental comparison method, this method has the advantages of high evaluation accuracy and short time, and can be further applied in relevant fields.




the

Can artificial intelligence replace whistle-blowers in the business sector?

The major technological developments have changed the traditional way of doing business. These developments have facilitated whistle-blowing. Access to data is easier and faster and communicating with the public can be done in seconds. Another development is the artificial intelligence (AI) which enters the business workplace in different forms challenging the traditional working relations. The combination of these concepts gives the idea of artificial whistle-blowing or robot whistle-blowing. The concept is that a machine should conceive and report relevant wrongdoing avoiding the traditional model of whistle-blowing where the employee is the person who should report. This concept, yet unexplored, presents interesting positive and negative aspects. The purpose of this contribution is to present the idea of artificial whistle-blowing and its advantages and disadvantages for the business sector. As a conclusion, this paper suggests that the concept of artificial whistle-blowing needs still to be researched and an optimal solution, for the time being, is to permit artificial whistle-blowing as a helping tool for the employees to detect wrongdoings but report them themselves.




the

Auditing the Performing Rights Society - investigating a new European Union Collective Management Organization member audit method

The European Union Rights Management Directive 2014/26/EU, provides regulatory oversight of European Union (EU) Collective Management Organizations (CMOs). However, the Directive has no provision indicating how members of EU CMOs may conduct non-financial audits of their CMO income and reporting. This paper addresses the problem of a lack of an audit method through a case study of the five writer members of the music group Duran Duran, who have been members of the UK's CMO for performing rights - the Performing Rights Society (PRS) for over 35 years. The paper argues a new audit CMO member method that can address the lacunae regarding the absence of CMO member right to audit a CMO and an applicable CMO audit method.




the

The right to access information under the GDPR

The present paper offers a critique of the General Data Protection Regulation in the realm of access to information. Even though the GDPR supports the constitutionally obvious position that the right to data protection does not outweigh other equally important rights, the enhanced protection of the right to the protection of personal data leads to the potential neglect of other constitutional rights, such as that of access to information. Data protection and access to information authorities should be established both on an EU, as well as at national level as a single authority. Scientific research must be facilitated through access to a multitude of information. The present article explores the question of data ownership and aims to propose a new system that will enhance access to information. A key tool of our research will be the comparative overview of existing legislative systems and a review of the different approaches in the case-law of independent authorities.




the

National ICT policy challenges for developing countries: a grounded theory informed literature review

This paper presents a review of the literature on the challenges of national information and communication technology (ICT) policies in the context of African countries. National ICT policies have been aligned with socio-development agendas of African countries. However, the policies have not delivered the expected outcomes due to many challenges. Studies have been conducted in isolation to highlight the challenges in the policy process. The study used grounded theory informed literature review to holistically analyse the problems in the context of African countries. The results were categorised in the typology of the policy process to understand the challenges from a broad perspective. The problems were categorised into agenda setting, policy formulation, legal frameworks, implementation and evaluation. In addition, there were constraints related to policy monitoring in the policy phases and imbalance of power among the policy stakeholders. The review suggests areas of further research.




the

A prototype for intelligent diet recommendations by considering disease and medical condition of the patient

The patient must follow a good diet to lessen the risk of health conditions. The body needs vitamins, minerals, and nutrients for illness prevention. When the human body does not receive the right amount of nutrients, nutritional disorders can develop, which can cause a number of different health issues. Chronic diseases like diabetes and hypertension can be brought on by dietary deficiencies. The human body receives the nutrients from a balanced diet to function properly. This research has a prototype that enables patients to find nutritious food according to their health preferences. It suggests meals based on their preferences for nutrients such as protein, fibre, high-fibre, low-fat, etc., and diseases such as pregnancy and diabetes. The process implements the recommendation based on the patient's profile (content-relied, K-NN), recommendation relied on patients with similar profiles, and recommendation based on the patient's past or recent activity.




the

Visualizing Research Data Records for their Better Management

As academia in general, and research funders in particular, place ever greater importance on data as an output of research, so the value of good research data management practices becomes ever more apparent. In response to this, the Innovative Design and Manufacturing Research Centre (IdMRC) at the University of Bath, UK, with funding from the JISC, ran a project to draw up a data management planning regime. In carrying out this task, the ERIM (Engineering Research Information Management) Project devised a visual method of mapping out the data records produced in the course of research, along with the associations between them. This method, called Research Activity Information Development (RAID) Modelling, is based on the Unified Modelling Language (UML) for portability. It is offered to the wider research community as an intuitive way for researchers both to keep track of their own data and to communicate this understanding to others who may wish to validate the findings or re-use the data.




the

FISHNet: encouraging data sharing and reuse in the freshwater science community

This paper describes the FISHNet project, which developed a repository environment for the curation and sharing of data relating to freshwater science, a discipline whose research community is distributed thinly across a variety of institutions, and usually works in relative isolation as individual researchers or within small groups. As in other “small sciences”, these datasets tend to be small and “hand-crafted”, created to address particular research questions rather than with a view to reuse, so they are rarely curated effectively, and the potential for sharing and reusing them is limited. The paper addresses a variety of issues and concerns raised by freshwater researchers as regards data sharing, describes our approach to developing a repository environment that addresses these concerns, and identifies the potential impact within the research community of the system.




the

Cloud as Infrastructure at the Texas Digital Library

In this paper, we describe our recent work in using cloud computing to provision digital library services. We consider our original and current motivations, technical details of our implementation, the path we took, and our future work and lessons learned. We also compare our work with other digital library cloud efforts.




the

Building the Hydra Together: Enhancing Repository Provision through Multi-Institution Collaboration

In 2008 the University of Hull, Stanford University and University of Virginia decided to collaborate with Fedora Commons (now DuraSpace) on the Hydra project. This project has sought to define and develop repository-enabled solutions for the management of multiple digital content management needs that are multi-purpose and multi-functional in such a way as to allow their use across multiple institutions. This article describes the evolution of Hydra as a project, but most importantly as a community that can sustain the outcomes from Hydra and develop them further. The data modelling and technical implementation are touched on in this context, and examples of the Hydra heads in development or production are highlighted. Finally, the benefits of working together, and having worked together, are explored as a key element in establishing a sustainable open source solution.




the

Beyond The Low Hanging Fruit: Data Services and Archiving at the University of New Mexico

Open data is becoming increasingly important in research. While individual researchers are slowlybecoming aware of the value, funding agencies are taking the lead by requiring data be made available, and also by requiring data management plans to ensure the data is available in a useable form. Some journals also require that data be made available. However, in most cases, “available upon request” is considered sufficient. We describe a number of historical examples of data use and discovery, then describe two current test cases at the University of New Mexico. The lessons learned suggest that an instituional data services program needs to not only facilitate fulfilling the mandates of granting agencies but to realize the true value of open data. Librarians and institutional archives should actively collaborate with their researchers. We should also work to find ways to make open data enhance a researchers career. In the long run, better quality data and metadata will result if researchers are engaged and willing participants in the dissemination of their data.




the

CLIF: Moving repositories upstream in the content lifecycle

The UK JISC-funded Content Lifecycle Integration Framework (CLIF) project has explored the management of digital content throughout its lifecycle from creation through to preservation or disposal. Whilst many individual systems offer the capability of carrying out lifecycle stages to varying degrees, CLIF recognised that only by facilitating the movement of content between systems could the full lifecycle take advantage of systems specifically geared towards different stages of the digital lifecycle. The project has also placed the digital repository at the heart of this movement and has explored this through carrying out integrations between Fedora and Sakai, and Fedora and SharePoint. This article will describe these integrations in the context of lifecycle management and highlight the issues discovered in enabling the smooth movement of content as required.




the

REDDNET and Digital Preservation in the Open Cloud: Research at Texas Tech University Libraries on Long-Term Archival Storage

In the realm of digital data, vendor-supplied cloud systems will still leave the user with responsibility for curation of digital data. Some of the very tasks users thought they were delegating to the cloud vendor may be a requirement for users after all. For example, cloud vendors most often require that users maintain archival copies. Beyond the better known vendor cloud model, we examine curation in two other models: inhouse clouds, and what we call "open" clouds—which are neither inhouse nor vendor. In open clouds, users come aboard as participants or partners—for example, by invitation. In open cloud systems users can develop their own software and data management, control access, and purchase their own hardware while running securely in the cloud environment. To do so will still require working within the rules of the cloud system, but in some open cloud systems those restrictions and limitations can be walked around easily with surprisingly little loss of freedom. It is in this context that REDDnet (Research and Education Data Depot network) is presented as the place where the Texas Tech University (TTU)) Libraries have been conducting research on long-term digital archival storage. The REDDnet network by year's end will be at 1.2 petabytes (PB) with an additional 1.4 PB for a related project (Compact Muon Soleniod Heavy Ion [CMS-HI]); additionally there are over 200 TB of tape storage. These numbers exclude any disk space which TTU will be purchasing during the year. National Science Foundation (NSF) funding covering REDDnet and CMS-HI was in excess of $850,000 with $850,000 earmarked toward REDDnet. In the terminology we used above, REDDnet is an open cloud system that invited TTU Libraries to participate. This means that we run software which fits the REDDnet structure. We are beginning to complete the final design of our system, and starting to move into the first stages of construction. And we have made a decision to move forward and purchase one-half petabyte of disk storage in the initial phase. The concerns, deliberations and testing are presented here along with our initial approach.




the

Cognitive biases in decision making during the pandemic: insights and viewpoint from people's behaviour

In this article, we have attempted to study the ways in which the COVID-19 pandemic has gradually increased and impacted the world. The authors integrate the knowledge from cognitive psychology literature to illustrate how the limitations of the human mind might have a critical role in the decisions taken during the COVID-19 pandemic. The authors show the correlation between different biases in various contexts involved in the COVID-19 pandemic and highlight the ways in which we can nudge ourselves and various stakeholders involved in the decision-making process. This study uses a typology of biases to examine how different patterns of biases affect the decision-making behaviour of people during the pandemic. The presented model investigates the potential interrelations among environmental transformations, cognitive biases, and strategic decisions. By referring to cognitive biases, our model also helps to understand why the same performance improvement practices might incite different opinions among decision-makers.




the

An empirical study on the nexus among the prices of commodities: an ARDL and bound test approach

This study investigates the nexus among the commodities: bitcoin, copper, gold, silver, crude oil, and iron ore. Previous studies on establishing the plausibility and the dynamic nexus among commodities are rare. This research attempts to fill this gap. This study investigates whether there are long-term and short-term links between commodities for the period 2010-2022 by applying the bounds testing method to co-integration and ECM, built using an ARDL model and establishing both short-term and long-term relationships among the economic variables analysed. The ECM confirmed the presence of some co-integration relationship for all the variables, both in the short and long term. A strong correlation was discovered among the commodities, which were greatly influenced by their lagged values. The results of this study provides an opportunity for policymakers and researchers to understand the nature of the relationship between the analysed variables and further support the development of new policies for economic sustainability.




the

Performance improvement in inventory classification using the expectation-maximisation algorithm

Multi-criteria inventory classification (MCIC) is popularly used to aid managers in categorising the inventory. Researchers have used numerous mathematical models and approaches, but few resorted to unsupervised machine-learning techniques to address MCIC. This study uses the expectation-maximisation (EM) algorithm to estimate the parameters of the Gaussian mixture model (GMM), a popular unsupervised machine learning algorithm, for ABC inventory classification. The EM-GMM algorithm is sensitive to initialisation, which in turn affects the results. To address this issue, two different initialisation procedures have been proposed for the EM-GMM algorithm. Inventory classification outcomes from 14 existing MCIC models have been given as inputs to study the significance of the two proposed initialisation procedures of the EM-GMM algorithm. The effectiveness of these initialisation procedures corresponding to various inputs has been analysed toward inventory management performance measures, i.e., fill rate, total relevant cost, and inventory turnover ratio.




the

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




the

The role of shopping apps and their impact on the online purchasing behaviour patterns of working women in Bangalore

The study aims to analyse the impact of shopping applications on the shopping behaviour of the working women community in Bangalore, a city known as the IT hub. The research uses a quantitative analysis with SPSS version 23 software and a structured questionnaire survey technique to gather data from the working women community. The study uses descriptive statistics, ANOVA, regression, and Pearson correlation analysis to evaluate the perception of working women regarding the significance of online shopping applications. The results show that digital shopping applications are more prevalent among the working women community in Bangalore. The study also evaluates the socio-economic and psychological factors that influence their purchasing behaviour. The findings suggest that online marketers should enhance their strategies to improve their business on digital platforms. The research provides valuable insights into the shopping habits of the working women community in Bangalore.




the

Connecting with the Y Generation: an Analysis of Factors Associated with the Academic Performance of Foundation IS Students




the

The Usage of E-Learning Material to Support Good Communication with Learners




the

Towards a Structural Model Connecting Hard Skills, Soft Skills and Job Conditions and the IS Professional: The Student Perspective




the

On the Idea of Organization Transformation: The IS/IT Design Challenge in Systems Thinking




the

The Evaluation of a Computer Ethics Program




the

Returning the ‘I’ in the ‘IT’ Education of MScIS/MBA Professionals




the

A Computer Hardware/Software/Services Planning and Selection Course for the CIS/IT Curriculum




the

Exploring Change and Innovation by ICT Teaching Staff in the New Zealand Polytechnic Sector




the

Action-Guidance: An Action Research Project for the Application of Informing Science in Educational and Vocational Guidance




the

Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use




the

Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia




the

Challenge or Chaos: A Discourse Analysis of Women’s Perceptions of the Culture of Change in the IT Industry




the

Creation of Anticipatory Information Support for Virtual Organizations between System(S) Theory and System Thinking




the

A Contribution to Defining the Term ‘Definition’




the

Technology and Marginalization: A Case Study of the Limited Adoption of the Intranet at a State-owned Organization in Rural Australia




the

Assessing the Impact of Instructional Methods and Information Technology on Student Learning Styles




the

The SWIMS CD-ROM Pilot: Using Community Development Principles and Technologies of the Information Society to Address Identified Informational Needs




the

The Human Dimension on Distance Learning: A Case Study of a Telecommunications Company




the

Students’ Pedagogical Preferences in the Delivery of IT Capstone Courses




the

Collaborative Work Skills for the Beginning IS Professional




the

Extended Object Languages for the Extolware Persistence Framework




the

The Roles of Challenge and Skill in the Flow Experiences of Web Users




the

Exploring the Research Ethics Domain for Postgraduate Students in Computing




the

Promoting Fusion in the Business-IT Relationship




the

Biases and Heuristics in Judgment and Decision Making: The Dark Side of Tacit Knowledge