pp

Gaza : au moins trois morts après une frappe israélienne sur le camp de réfugiés de Nouseirat

Gaza : au moins trois morts après une frappe israélienne sur le camp de réfugiés de Nouseirat




pp

Au moins 22 personnes tuées dans des frappes au Liban et à Gaza, et le cessez-le-feu au point mort

Au moins 22 personnes tuées dans des frappes au Liban et à Gaza, et le cessez-le-feu au point mort




pp

Trump va nommer les "faucons" Rubio et Waltz à la tête de la politique étrangère (rapports)

Trump va nommer les "faucons" Rubio et Waltz à la tête de la politique étrangère (rapports)




pp

A feature-based model selection approach using web traffic for tourism data

The increased volume of accessible internet data creates an opportunity for researchers and practitioners to improve time series forecasting for many indicators. In our study, we assess the value of web traffic data in forecasting the number of short-term visitors travelling to Australia. We propose a feature-based model selection framework which combines random forest with feature ranking process to select the best performing model using limited and informative number of features extracted from web traffic data. The data was obtained for several tourist attraction and tourism information websites that could be visited by potential tourists to find out more about their destinations. The results of random forest models were evaluated over 3- and 12-month forecasting horizon. Features from web traffic data appears in the final model for short term forecasting. Further, the model with additional data performs better on unseen data post the COVID19 pandemic. Our study shows that web traffic data adds value to tourism forecasting and can assist tourist destination site managers and decision makers in forming timely decisions to prepare for changes in tourism demand.




pp

An architectural view of VANETs cloud: its models, services, applications and challenges

This research explores vehicular ad hoc networks (VANETs) and their extensive applications, such as enhancing traffic efficiency, infotainment, and passenger safety. Despite significant study, widespread deployment of VANETs has been hindered by security and privacy concerns. Challenges in implementation, including scalability, flexibility, poor connection, and insufficient intelligence, have further complicated VANETs. This study proposes leveraging cloud computing to address these challenges, marking a paradigm shift. Cloud computing, recognised for its cost-efficiency and virtualisation, is integrated with VANETs. The paper details the nomenclature, architecture, models, services, applications, and challenges of VANET-based cloud computing. Three architectures for VANET clouds - vehicular clouds (VCs), vehicles utilising clouds (VuCs), and hybrid vehicular clouds (HVCs) - are discussed in detail. The research provides an overview, delves into related work, and explores VANET cloud computing's architectural frameworks, models, and cloud services. It concludes with insights into future work and a comprehensive conclusion.








pp

Stop Using Chrome On Your iPhone, Warns Apple—Millions Of Users Must Now Decide - Forbes

  1. Stop Using Chrome On Your iPhone, Warns Apple—Millions Of Users Must Now Decide  Forbes
  2. 4 new Chrome improvements for iOS  The Keyword
  3. Chrome on your iPhone can search using pictures and words at the same time  The Verge
  4. Google Rolls Out Four New Chrome Features for iOS  iPhone in Canada
  5. Chrome 131 for iOS adding new Google Drive, Maps integrations  9to5Google






pp

Predicting Innovation: Why Facebook/WhatsApp Merger Flunked

By Hasan Basri Cifci[1] In the world of 2014, the Commission of Facebook/WhatsApp merger case[2] concluded that integration and interoperation of Facebook and WhatsApp were unfeasible. However, Facebook integrated its three subsidiaries (WhatsApp, Instagram, and Facebook) under its brand in




pp

La justice stoppe une enquï¿œte potentiellement gï¿œnante sur Jean Castex, trois jours aprï¿œs sa nomination comme Premier ministre

Hasard du calendrier ou volontᅵ de prᅵserver le nouveau Premier ministre ? Selon Mediapart, une enquᅵte judiciaire ouverte par le parquet de Perpignan, potentiellement gᅵnante pour Jean Castex, a ᅵtᅵ...




pp

0 800 : le numï¿œro vert sur le covid rapporte gros et informe peu (certains tï¿œlï¿œopï¿œrateurs sont des intï¿œrimaires formï¿œs en 30 minutes)

Inquiet par le coronavirus ? Vous pouvez appeler le numï¿œro vert 0 800 130 000. C'est Emmanuel Macron lui-mï¿œme qui en a fait la promotion dans un tweet en avril 2020, en plein confinement. Ce 0 800 fait partie de la longue liste...




pp

Study on operational risks and preventive measures of supply chain finance

The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk.




pp

An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning

Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images.




pp

Springs of digital disruption: mediation of blockchain technology adoption in retail supply chain management

Supply chain management practices are vital for success and survival in today's competitive Indian retail market. The advent of COVID-19 pandemic necessitates a digital disruption in retail supply chain management centred on efficient technology like blockchain in order to enhance supply chain performance. The present research aims to decipher the nature of associations between supply chain management practices, blockchain technology adoption and supply chain performance in retail firms. The research is based on primary survey of specific food and grocery retailers operating on a supermarket format stores in two Indian cities. The findings pointed towards the presence of significant and positive association of all the constructs with each other. Moreover, the mediating role of blockchain technology adoption was also revealed, i.e., it partially mediates the effects of supply chain management practices on supply chain performance.




pp

Smart approach to constraint programming: intelligent backtracking using artificial intelligence

Constrained programming is the concept used to select possible alternatives from an incredibly diverse range of candidates. This paper proposes an AI-assisted Backtracking Scheme (AI-BS) by integrating the generic backtracking algorithm with Artificial Intelligence (AI). The detailed study observes that the extreme dual ray associated with the infeasible linear program can be automatically extracted from minimum unfeasible sets. Constraints are used in artificial intelligence to list all possible values for a group of variables in a given universe. To put it another way, a solution is a way of assigning a value to each variable that these values satisfy all constraints. Furthermore, this helps the study reach a decreased search area for smart backtracking without paying high costs. The evaluation results exhibit that the IB-BC algorithm-based smart electricity schedule controller performs better electricity bill during the scheduled periods than comparison approaches such as binary backtracking and binary particle swarm optimiser.




pp

Application of integrated image processing technology based on PCNN in online music symbol recognition training

To improve the effectiveness of online training for music education, it was investigated how to improve the pulse-coupled neural network in image processing for spectral image segmentation. The study proposes a two-scale descent method to achieve oblique spectral correction. Subsequently, a convolutional neural network was optimised using a two-channel feature fusion recognition network for music theory notation recognition. The results showed that this image segmentation method had the highest accuracy, close to 98%, and the accuracy of spectral tilt correction was also as high as 98.4%, which provided good image pre-processing results. When combined with the improved convolutional neural network, the average accuracy of music theory symbol recognition was about 97% and the highest score of music majors was improved by 16 points. This shows that the method can effectively improve the teaching effect of online training in music education and has certain practical value.




pp

QoS-based handover approach for 5G mobile communication system

5G mobile communication systems are an in-depth fusion of multi-radio access technologies characterised with frequent handover between cells. Handover management is a particularly challenging issue for 5G networks development. In this article, a novel optimised handover framework is proposed to find the optimal network to connect with a good quality of service in accordance with the user's preferences. This framework is based on an extension of IEEE 802.21 standard with new components and new service primitives for seamless handover. Moreover, the proposed vertical handover process is based on an adaptive heuristic model aimed at achieving an optimised network during the decision-making stage. Simulation results demonstrate that, compared to other existing works, the proposed framework is capable of selecting the best network candidate accurately based on the quality-of-service requirements of the application, network conditions, mobile terminal conditions and user preferences. It significantly reduces the handover delay, handover blocking probability and packet loss rate.




pp

Application of AI intelligent technology in natural resource planning and management

This article studies the application of artificial intelligence technology in natural resource planning and management. This article first introduces the background of NR and AI intelligent technology, then conducts academic research and summary on NR planning management and AI intelligent technology. Then, an algorithm model based on multi-objective intelligent planning algorithm is established. Finally, simulation experiments are conducted, and experiments summary and discussion are provided. The experimental results show that the average efficiency value of the four stages of NR planning and management before use is 5.25, and the average efficiency value of the four stages of NR planning and management after use is 7. The difference in the average efficiency value before and after use is 1.75. It can be seen that the use of AI intelligent technology can effectively improve the efficiency of natural resource planning and management.




pp

Application of digital twin virtual design and BIM technology in intelligent building image processing

Intelligent digital virtual technology has become an indispensable part of modern construction, but there are also some problems in its practical application. Therefore, it is necessary to strengthen the design of intelligent building image processing systems from many aspects. Starting from image digital processing methods, this paper studies the digital twin virtual design scene construction method and related algorithms, converts the original image into a colour digital image through a greyscale algorithm, and then combines morphological knowledge and feature point extraction methods to complete the construction of a three-dimensional virtual environment. Finally, through the comparison of traditional image processing effects with smart building images based on digital twins and BIM technology, the results show that the optimised image processing results have higher clarity, sharper contrast, and a sensitivity increased by 5.84%, presenting better visual effects and solving the risk of misjudgement caused by inaccurate image recognition.




pp

Ebullient supervision, employee engagement and employee commitment in a higher education institution: the partial least square approach

The study investigated the influence of ebullient supervision on employee commitment in a Ghanaian public university through the mediating role of employee engagement. The simple random sampling technique was used to draw 302 administrative staff of the university to respond to the self-administered questionnaire on the constructs. Furthermore, the partial least square structural equation technique was deployed to test the research hypotheses in the study. The results showed that ebullient supervision had a significant positive relationship with employee commitment and employee engagement. The findings further revealed that employee engagement positively correlated with employee commitment. Finally, the study's findings established that employee engagement partially mediated the link between ebullient supervision and employee commitment. The study emphasised that various supervisors in a university's administration should create an environment that favours fun where subordinates can form ties with one another.




pp

Applying a multiplex network perspective to understand performance in software development

A number of studies have applied social network analysis (SNA) to show that the patterns of social interaction between software developers explain important organisational outcomes. However, these insights are based on a single network relation (i.e., uniplex social ties) between software developers and do not consider the multiple network relations (i.e., multiplex social ties) that truly exist among project members. This study reassesses the understanding of software developer networks and what it means for performance in software development settings. A systematic review of SNA studies between 1990 and 2020 across six digital libraries within the IS and management science domain was conducted. The central contributions of this paper are an in-depth overview of SNA studies to date and the establishment of a research agenda to advance our knowledge of the concept of multiplexity on how a multiplex perspective can contribute to a software developer's coordination of tasks and performance advantages.




pp

Teaching High School Students Applied Logical Reasoning




pp

Studios, Mini-lectures, Project Presentations, Class Blog and Wiki: A New Approach to Teaching Web Technologies




pp

Didactics of Information Technology (IT) in a Science Degree: Conceptual Issues and Practical Application




pp

A Tools-Based Approach to Teaching Data Mining Methods




pp

Pattern of Plagiarism in Novice Students’ Generated Programs: An Experimental Approach




pp

Open-Source ERP: Is It Ripe for Use in Teaching Supply Chain Management?




pp

A Meta-ethnographic Synthesis of Support Services in Distance Learning Programs




pp

A Functional Programming Approach to AI Search Algorithms




pp

A Hybrid Approach for Selecting a Course Management System: A Case Study




pp

Student Perceptions of Microblogging: Integrating Twitter with Blogging to Support Learning and Interaction




pp

Designing a Mobile-app-based Collaborative Learning System




pp

A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study




pp

First Year Engagement & Retention: A Goal-Setting Approach




pp

A Template-Based Short Course Concept on Android Application Development




pp

A Multi-Pronged Approach to Work Integrated Learning for IT Students




pp

Learning by Doing: How to Develop a Cross-Platform Web App

As mobile devices become prevalent, there is always a need for apps.  How hard is it to develop an app especially a cross-platform app? The paper shares an experience in a project involved the development of a student services web app that can be run on cross-platform mobile devices.  The paper first describes the background of the project, the clients, and the proposed solution.  Then, it focuses on the step-by-step development processes and provides the illustration of written codes and techniques used.  The goal is for readers to gain an understanding on how to develop a mobile-friendly web app.  The paper concludes with teaching implications and offers thoughts for further development.  




pp

A Detailed Rubric for Assessing the Quality of Teacher Resource Apps

Since the advent of the iPhone and rise of mobile technologies, educational apps represent one of the fastest growing markets, and both the mobile technology and educational app markets are predicted to continue experiencing growth into the foreseeable future. The irony, however, is that even with a booming market for educational apps, very little research regarding the quality of them has been conducted. Though some instruments have been developed to evaluate apps geared towards student learning, no such instrument has been created for teacher resource apps, which are designed to assist teachers in completing common tasks (e.g., taking attendance, communicating with parents, monitoring student learning and behavior, etc.). Moreover, when teachers visit the App Store or Google Play to learn about apps, the only ratings provided to them are generic, five-point evaluations, which do not provide qualifiers that explain why an app earned three, two, or five points. To address that gap, previously conducted research related to designing instructional technologies coupled with best practices for supporting teachers were first identified. That information was then used to construct a comprehensive rubric for assessing teacher re-source apps. In this article, a discussion that explains the need for such a rubric is offered before describing the process used to create it. The article then presents the rubric and discusses its different components and potential limitations and concludes with suggestions for future research based on the rubric.




pp

A Comparison of Student Academic Performance with Traditional, Online, And Flipped Instructional Approaches in a C# Programming Course

Aim/Purpose: Compared student academic performance on specific course requirements in a C# programming course across three instructional approaches: traditional, online, and flipped. Background: Addressed the following research question: When compared to the online and traditional instructional approaches, does the flipped instructional approach have a greater impact on student academic performance with specific course requirements in a C# programming course? Methodology: Quantitative research design conducted over eight 16-week semesters among a total of 271 participants who were undergraduate students en-rolled in a C# programming course. Data collected were grades earned from specific course requirements and were analyzed with the nonparametric Kruskal Wallis H-Test using IBM SPSS Statistics, Version 23. Contribution: Provides empirical findings related to the impact that different instructional approaches have on student academic performance in a C# programming course. Also describes implications and recommendations for instructors of programming courses regarding instructional approaches that facilitate active learning, student engagement, and self-regulation. Findings: Resulted in four statistically significant findings, indicating that the online and flipped instructional approaches had a greater impact on student academic performance than the traditional approach. Recommendations for Practitioners: Implement instructional approaches such as online, flipped, or blended which foster active learning, student engagement, and self-regulation to increase student academic performance. Recommendation for Researchers: Build upon this study and others similar to it to include factors such as gender, age, ethnicity, and previous academic history. Impact on Society: Acknowledge the growing influence of technology on society as a whole. Higher education coursework and programs are evolving to encompass more digitally-based learning contexts, thus compelling faculty to utilize instructional approaches beyond the traditional, lecture-based approach. Future Research: Increase the number of participants in the flipped instructional approach to see if it has a greater impact on student academic performance. Include factors beyond student academic performance to include gender, age, ethnicity, and previous academic history.




pp

Evaluating the Acceptability and Usability of EASEL: A Mobile Application that Supports Guided Reflection for Experiential Learning Activities

Aim/Purpose: To examine the early perceptions (acceptability) and usability of EASEL (Education through Application-Supported Experiential Learning), a mobile platform that delivers reflection prompts and content before, during, and after an experiential learning activity. Background: Experiential learning is an active learning approach in which students learn by doing and by reflecting on the experience. This approach to teaching is often used in disciplines such as humanities, business, and medicine. Reflection before, during, and after an experience allows the student to analyze what they learn and why it is important, which is vital in helping them to understand the relevance of the experience. A just-in-time tool (EASEL) was needed to facilitate this. Methodology: To inform the development of a mobile application that facilitates real-time guided reflection and to determine the relevant feature set, we conducted a needs analysis with both students and faculty members. Data collected during this stage of the evaluation helped guide the creation of a prototype. The user experience of the prototype and interface interactions were evaluated during the usability phase of the evaluation study. Contribution: Both the needs analysis and usability assessment provided justification for continued development of EASEL as well as insight that guides current development. Findings: The interaction design of EASEL is understandable and usable. Both students and teachers value an application that facilitates real-time guided reflection. Recommendations for Practitioners: The use of a system such as EASEL can leverage time and location-based services to support students in field experiences. This technology aligns with evidence that guided reflection provides opportunities for metacognition. Recommendation for Researchers: Iterative prototyping, testing, and refinement can lead to a deliberate and effective app development process. Impact on Society: The EASEL platform leverages inherent functionality of mobile devices, such as GPS and persistent network connectivity, to adapt reflection tasks based on lo-cation or time. Students using EASEL will engage in guided reflection, which leads to metacognition and can help instructors scaffold learning Future Research: We will continue to advance the application through iterative testing and development. When ready, the application will be vetted in larger studies across varied disciplines and contexts.




pp

Browser App Approach: Can It Be an Answer to the Challenges in Cross-Platform App Development?

Aim/Purpose: As smartphones proliferate, many different platforms begin to emerge. The challenge to developers as well as IS educators and students is how to learn the skills to design and develop apps to run on cross-platforms. Background: For developers, the purpose of this paper is to describe an alternative to the complex native app development. For IS educators and students, the paper provides a feasible way to learn and develop fully functional mobile apps without technical burdens. Methodology: The methods used in the development of browser-based apps is prototyping. Our proposed approach is browser-based, supports cross-platforms, uses open-source standards, and takes advantage of “write-once-and-run-anywhere” (WORA) concept. Contribution: The paper illustrates the application of the browser-based approach to create a series of browser apps without high learning curve. Findings: The results show the potentials for using browser app approach to teach as well as to create new apps. Recommendations for Practitioners : Our proposed browser app development approach and example would be useful to mobile app developers/IS educators and non-technical students because the source code as well as documentations in this project are available for downloading. Future Research: For further work, we discuss the use of hybrid development framework to enhance browser apps.




pp

An Investigation of the Use of the ‘Flipped Classroom’ Pedagogy in Secondary English Language Classrooms

Aim/Purpose : To examine the use of a flipped classroom in the English Language subject in secondary classrooms in Hong Kong. Background: The research questions addressed were: (1) What are teachers’ perceptions towards the flipped classroom pedagogy? (2) How can teachers transfer their flipped classroom experiences to teaching other classes/subjects? (3) What are students’ perceptions towards the flipped classroom pedagogy? (4) How can students transfer their flipped classroom experiences to studying other subjects? (5) Will students have significant gain in the knowledge of the lesson topic trialled in this study? Methodology: A total of 57 students from two Secondary 2 classes in a Band 3 secondary school together with two teachers teaching these two classes were involved in this study. Both quantitative and quantitative data analyses were conducted. Contribution: Regarding whether the flipped classroom pedagogy can help students gain significantly in their knowledge of a lesson topic, only one class of students gained statistically significantly in the subject knowledge but not for another class. Findings: Students in general were positive about the flipped classroom. On the other hand, although the teachers considered that the flipped classroom pedagogy was creative, they thought it may only be useful for teaching English grammar. Recommendations for Practitioners: Teachers thought that flipping a classroom may only be useful for more motivated students, and the extra workload of finding or making suitable pre-lesson online videos is the main concern for teachers. Recommendations for Researchers: Both quantitative and qualitative analyses should be conducted to investigate the effectiveness of a flipped classroom on students’ language learning. Impact on Society : Teachers and students can transfer their flipped classroom experiences in English Language to teaching and studying other subjects. Future Research: More classes should be involved and a longer period of time should be spent on trial teaching in which a flipped classroom can be implemented in different lesson topics, not only teaching grammar. Teachers also need to determine if students can use the target language item in a task.




pp

Collaborative Approach in Software Engineering Education: An Interdisciplinary Case

Aim/Purpose: This study was aimed at enhancing students’ learning of software engineering methods. A collaboration between the Computer Science, Business Management, and Product Design programs was formed to work on actual projects with real clients. This interdisciplinary form of collaboration simulates the realities of a diverse Software Engineering team. Background: A collaborative approach implemented through projects has been the established pedagogy for introducing the Software Engineering course to undergraduate Computer Science students. The collaboration, however, is limited to collaboration among Computer Science students and their clients. This case study explored an enhancement to the collaborative approach to project development by integrating other related disciplines into the project development framework; hence, the Interdisciplinary Approach. Methodology: This study adopted the case method approach. An interdisciplinary service innovation activity was proposed to invite other disciplines in the learning process of the computer science students. The agile methodology Scrum was used as the software development approach during project development. Survey data were collected from the students to establish (a) their perception of the interdisciplinary approach to project development; (b) the factors that influenced success or failure of their team to deliver the project; and (c) the perceived skills or knowledge that they acquired from the interdisciplinary approach. Analysis of data followed a mixed method approach. Contribution: The study improved the current pedagogy for Software Engineering education by integrating other related disciplines into the software project development framework. Findings: Data collected showed that the students generally accepted the interdisciplinary approach to project development. Factors such as project relevance, teamwork, time and schedule, and administration support, among others, affect team performance towards project completion. In the case of the Computer Science students, results show that students have learned skills during the experience that, as literature reveal, can only be acquired or mastered in their future profession as software engineers. Recommendations for Practitioners: The active collaboration of the industry with the University and the involvement of the other related courses in teaching software engineering methods are critical to the development of the students, not only in learning the methodology but also as a working professional. Recommendation for Researchers: It is interesting to know and eventually understand the interactions between interdisciplinary team members in the conduct of Software Engineering practices while working on their projects. More specifically, what creative tensions arise and how do the interdisciplinary teams handle the discourse? Impact on Society: This study bridges the gap between how Software Engineering is taught in the university and how Software Engineering teams work in real life. Future Research: Future research is targeted at refining and elaborating the elements of the interdisciplinary framework presented in this paper towards an integrated course module for Software Engineering education.




pp

Delving into the Specificity of Instructional Guidance in Social Media-supported Learning Environments

Aim/Purpose: This study investigates the variations in student participation patterns across different types of instructional activities, learning modes, and with different instructional guidance approaches. In the current study, different variables, modes of learning (guided versus unguided), and types of guidance (social versus cognitive) were manipulated in a series of microblogging-supported collaborative learning tasks to examine to what extent and in which aspects instructional guidance affects the effectiveness and student perception of microblogging-supported learning. Background: Despite the overwhelming agreement on the importance of instructional guidance in microblogging-supported learning environments, very few studies have been done to examine the specificity of guidance, such as how to structure and support microblogging activities, as well as what types of guidance are appropriate in what learning contexts. Methodology: This semester-long study utilized a case-study research design via a multi-dimensional approach in a hybrid classroom with both face-to-face and online environments. Tweets were collected from four types of activities and coded based on content within their contextual setting. Twenty-four college students participated in the study. Contribution: In response to the call to improve social media learning environments under-scored in contemporary education, the current case study took an initial step aiming at deepening the understanding of the role of instructional guidance in microblogging-supported learning environments. Findings: This study showcases that with instructor facilitation, students succeeded in being engaged in a highly participatory and interactive learning experience across a variety of tasks and activities. This study indicates that students’ perspectives of social media tools rely heavily on what instructors do with the tool and how the instructional activities are structured and supported. Instructors’ scaffolding and support is instrumental in keeping students on task and engaging students with meaningful events, thus ensuring the success of microblogging-based learning activities. Meanwhile, students’ perception of usefulness of instructional guidance is closely related to their own pre-perception and experience. Recommendations for Practitioners: When incorporating social media tools, it is important to examine learner’s prior knowledge and comfort level with these tools and tailor the design of instructional activities to their attributes. It is also vital to monitor student progress, adjust the type and amount of guidance and scaffolding provided as they progress, and eventually remove the scaffolding until students can demonstrate that they can perform the task successfully without assistance. Recommendation for Researchers: Due to many other potential factors in place that could potentially influence student learning, no conclusive remarks can be made regarding the superiority of either one type of guidance approach. Future researchers should continue to develop robust research methodologies to seek ways to better operationalize this variable and strive to understand its effect. Future Research: Future replication studies in other settings, with a larger sample size, and different populations will certainly provide further insights on the effects of instructional guidance in microblogging-based learning. Alternative coding methods may also shed light on differences in student interaction in terms of content diversity and depth of learning when analyzing the tweets. Advanced data collection techniques may be explored to ascertain the completeness of data collection.




pp

Enhancing Student Learning in Cybersecurity Education using an Out-of-class Learning Approach

Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to learn a complicated subject matter and the students may be intimidated by the challenging courses in cybersecurity programs. Therefore, it is essential for the faculty members to devise some mechanisms to promote cybersecurity learning to increase its student retention. The mechanism suggested by this study was the out-of-class learning approach. Methodology: The researchers in this study employed a content analysis and adopted a semiotic method to analyze qualitative data. The researchers also conducted crosstabulation analyses using chi-square tests to detect the significant differences in the emerging learning outcomes from the two different out-of-class learning activities investigated in this study. Contribution: This study addressed the difficulty of cybersecurity education and proposed a viable mechanism to promote the student learning in such a complicated subject matter. Findings: For cybersecurity education, the out-of-class learning approach is a viable pedagogical mechanism that could lead the students to several learning outcomes, including connecting them to the real-life scenarios related to the cybersecurity profession, guiding them to their career choices and development, stimulating their intellectual growth, creating their justification of learning, and raising their cybersecurity awareness. Recommendations for Practitioners: The instructors of any cybersecurity programs should incorporate some out-of-class learning activities into the courses in their programs, especially the introductory-level courses. Additionally, it is important to coordinate the out-of-class learning activities with the in-class lessons to enable the students to justify what they have learned in their classrooms and motivate them to learn more. Recommendation for Researchers: Researchers could look beyond in-class learning and laboratory learning to investigate the impacts of out-of-class learning activities on cybersecurity education to help the students to attain better learning outcomes. Impact on Society: By promoting cybersecurity education, universities and colleges could attain a higher retention rate of the students in their cybersecurity programs. The higher retention rate of the students in cybersecurity programs would help to ease the critical shortage of cybersecurity talent. Future Research: Future research could explore the impacts of other out-of-class learning activities on cybersecurity learning; for example: job shadowing, attending cybersecurity conferences, internship, developing cybersecurity systems or tools for actual customers, working on cybersecurity research with faculty members. Additionally, future studies could investigate the effects of the out-of-class learning approach on promoting other academic programs that are characterized by intensely complex and technical nature, similar to cybersecurity programs.




pp

Using Educational Data Mining to Predict Students’ Academic Performance for Applying Early Interventions

Aim/Purpose: One of the main objectives of higher education institutions is to provide a high-quality education to their students and reduce dropout rates. This can be achieved by predicting students’ academic achievement early using Educational Data Mining (EDM). This study aims to predict students’ final grades and identify honorary students at an early stage. Background: EDM research has emerged as an exciting research area, which can unfold valuable knowledge from educational databases for many purposes, such as identifying the dropouts and students who need special attention and discovering honorary students for allocating scholarships. Methodology: In this work, we have collected 300 undergraduate students’ records from three departments of a Computer and Information Science College at a university located in Saudi Arabia. We compared the performance of six data mining methods in predicting academic achievement. Those methods are C4.5, Simple CART, LADTree, Naïve Bayes, Bayes Net with ADTree, and Random Forest. Contribution: We tested the significance of correlation attribute predictors using four different methods. We found 9 out of 18 proposed features with a significant correlation for predicting students’ academic achievement after their 4th semester. Those features are student GPA during the first four semesters, the number of failed courses during the first four semesters, and the grades of three core courses, i.e., database fundamentals, programming language (1), and computer network fundamentals. Findings: The empirical results show the following: (i) the main features that can predict students’ academic achievement are the student GPA during the first four semesters, the number of failed courses during the first four semesters, and the grades of three core courses; (ii) Naïve Bayes classifier performed better than Tree-based Models in predicting students’ academic achievement in general, however, Random Forest outperformed Naïve Bayes in predicting honorary students; (iii) English language skills do not play an essential role in students’ success at the college of Computer and Information Sciences; and (iv) studying an orientation year does not contribute to students’ success. Recommendations for Practitioners: We would recommend instructors to consider using EDM in predicting students’ academic achievement and benefit from that in customizing students’ learning experience based on their different needs. Recommendation for Researchers: We would highly endorse that researchers apply more EDM studies across various universities and compare between them. For example, future research could investigate the effects of offering tutoring sessions for students who fail core courses in their first semesters, examine the role of language skills in social science programs, and examine the role of the orientation year in other programs. Impact on Society: The prediction of academic performance can help both teachers and students in many ways. It also enables the early discovery of honorary students. Thus, well-deserved opportunities can be offered; for example, scholarships, internships, and workshops. It can also help identify students who require special attention to take an appropriate intervention at the earliest stage possible. Moreover, instructors can be aware of each student’s capability and customize the teaching tasks based on students’ needs. Future Research: For future work, the experiment can be repeated with a larger dataset. It could also be extended with more distinctive attributes to reach more accurate results that are useful for improving the students’ learning outcomes. Moreover, experiments could be done using other data mining algorithms to get a broader approach and more valuable and accurate outputs.