if

Mobile Certificate Based Network Services




if

A Packet Sniffer (PSniffer) Application for Network Security in Java




if

Applying a Modified Technology Acceptance Model to Qualitatively Analyse the Factors Affecting E-Portfolio Implementation for Student Teachers’ in Field Experience Placements




if

A Guide to Educating Different Generations in South Africa




if

Defining and Classifying Learning Outcomes: A Case Study




if

Gamification in a Social Learning Environment




if

Economic Upliftment and Social Development through the Development of Digital Astuteness in Rural Areas

One of the key attempts towards a collective African vision is the New Economic Partnership for African Development (NEPAD). Barnard and Vonk (2003) report that “53 countries have been urged to implement ICTs in three crucial development arenas: education, health and trade”. While NEPAD and other initiatives have contributed to the provision of ICT infrastructure with positive results as seen in the growth of Internet uses, the disparities in development across Africa are enormous. The challenge to Higher Education Institutions in Africa has been summarised by Colle (2005): “central to creating digital resources and academic infrastructure is the question of universities’ relevance to the world around them, and especially to the challenge of being an active player – ‘an anchor of a broad-based poverty alleviation strategy’ in an increasingly knowledge-based economy”. It can be inferred from Colle that the activities of HEIs in Africa ought to be geared towards contributing to the realisation of the Millennium development goals.




if

Emoji Identification and Prediction in Hebrew Political Corpus

Aim/Purpose: Any system that aims to address the task of modeling social media communication need to deal with the usage of emojis. Efficient prediction of the most likely emoji given the text of a message may help to improve different NLP tasks. Background: We explore two tasks: emoji identification and emoji prediction. While emoji prediction is a classification task of predicting the emojis that appear in a given text message, emoji identification is the complementary preceding task of determining if a given text message includes emojies. Methodology: We adopt a supervised Machine Learning (ML) approach. We compare two text representation approaches, i.e., n-grams and character n-grams and analyze the contribution of additional metadata features to the classification. Contribution: The task of emoji identification is novel. We extend the definition of the emoji prediction task by allowing to use not only the textual content but also meta-data analysis. Findings: Metadata improve the classification accuracy in the task of emoji identification. In the task of emoji prediction it is better to apply feature selection. Recommendations for Practitioners: In many of the cases the classifier decision seems fitter to the comment content than the emoji that was chosen by the commentator. The classifier may be useful for emoji suggestion. Recommendation for Researchers: Explore character-based representations rather than word-based representations in the case of morphologically rich languages. Impact on Society: Improve the modeling of social media communication. Future Research: We plan to address the multi-label setting of the emoji prediction task and to investigate the deep learning approach for both of our classification tasks




if

Understanding Online Learning Based on Different Age Categories

Aim/Purpose: To understand readiness of students for learning in online environments across different age groups. Background: Online learners today are diverse in age due to increasing adult/mature students who continue their higher education while they are working. Understanding the influence of the learners’ age on their online learning experience is limited. Methodology: A survey methodology approach was followed. A sample of one thousand nine hundred and twenty surveys were used. Correlation analysis was performed. Contribution: The study contributes by adding to the limited body of knowledge in this area and adds to the dimensions of the Online Learning Readiness Survey additional dimensions such as usefulness, tendency, anxiety, and attitudes. Findings: Older students have more confidence than younger ones in computer proficiency and learning skills. They are more motivated, show better attitudes and are less anxious. Recommendations for Practitioners: Practitioners should consider preferences that allow students to configure the learning approach to their age. These preferences should be tied to the dimensions of the online learning readiness survey (OLRS). Recommendations for Researchers: More empirical research is required using OLRS for online learning environments. OLRS factors are strong and can predict student readiness and performance. These are opportunities for artificial intelligence in the support of technology-mediated tools for learning.




if

Automatic Detection and Classification of Dental Restorations in Panoramic Radiographs

Aim/Purpose: The aim of this study was to develop a prototype of an information-generating computer tool designed to automatically map the dental restorations in a panoramic radiograph. Background: A panoramic radiograph is an external dental radiograph of the oro-maxillofacial region, obtained with minimal discomfort and significantly lower radiation dose compared to full mouth intra-oral radiographs or cone-beam computed tomography (CBCT) imaging. Currently, however, a radiologic informative report is not regularly designed for a panoramic radiograph, and the referring doctor needs to interpret the panoramic radiograph manually, according to his own judgment. Methodology: An algorithm, based on techniques of computer vision and machine learning, was developed to automatically detect and classify dental restorations in a panoramic radiograph, such as fillings, crowns, root canal treatments and implants. An experienced dentist evaluated 63 panoramic anonymized images and marked on them, manually, 316 various restorations. The images were automatically cropped to obtain a region of interest (ROI) containing only the upper and lower alveolar ridges. The algorithm automatically segmented the restorations using a local adaptive threshold. In order to improve detection of the dental restorations, morphological operations such as opening, closing and hole-filling were employed. Since each restoration is characterized by a unique shape and unique gray level distribution, 20 numerical features describing the contour and the texture were extracted in order to classify the restorations. Twenty-two different machine learning models were evaluated, using a cross-validation approach, to automatically classify the dental restorations into 9 categories. Contribution: The computer tool will provide automatic detection and classification of dental restorations, as an initial step toward automatic detection of oral pathologies in a panoramic radiograph. The use of this algorithm will aid in generating a radiologic report which includes all the information required to improve patient management and treatment outcome. Findings: The automatic cropping of the ROI in the panoramic radiographs, in order to include only the alveolar ridges, was successful in 97% of the cases. The developed algorithm for detection and classification of the dental restorations correctly detected 95% of the restorations. ‘Weighted k-NN’ was the machine-learning model that yielded the best classification rate of the dental restorations - 92%. Impact on Society: Information that will be extracted automatically from the panoramic image will provide a reliable, reproducible radiographic report, currently unavailable, which will assist the clinician as well as improve patients’ reliance on the diagnosis. Future Research: The algorithm for automatic detection and classification of dental restorations in panoramic imaging must be trained on a larger dataset to improve the results. This algorithm will then be used as a preliminary stage for automatically detecting incidental oral pathologies exhibited in the panoramic images.




if

Findings From an Examination of a Class Purposed to Teach the Scientific Method Applied to the Business Discipline

Aim/Purpose: This brief paper will provide preliminary insight into an institutions effort to help students understand the application of the scientific method as it applies to the business discipline through the creation of a dedicated, required course added to the curriculum of a mid-Atlantic minority-serving institution. In or-der to determine whether the under-consideration course satisfies designated student learning outcomes, an assessment regime was initiated that included examination of rubric data as well as the administration of a student perception survey. This paper summarizes the results of the early examination of the efficacy of the course under consideration. Background: A small, minority-serving, university located in the United States conducted an assessment and determined that students entering a department of business following completion of their general education science requirements had difficulties transferring their understanding of the scientific method to the business discipline. Accordingly, the department decided to create a unique course offered to sophomore standing students titled Principles of Scientific Methods in Business. The course was created by a group of faculty with input from a twenty person department. Methodology: Rubrics used to assess a course term project were collected and analyzed in Microsoft Excel to measure student satisfaction of learning goals and a student satisfaction survey was developed and administered to students enrolled in the course under consideration to measure perceived course value. Contribution: While the scientific method applies across the business and information disciplines, students often struggle to envision this application. This paper explores the implications of a course specifically purposed to engender the development and usage of logical and scientific reasoning skills in the business discipline by students in the lower level of an bachelors degree program. The information conveyed in this paper hopefully makes a contribution in an area where there is still an insufficient body of research and where additional exploration is needed. Findings: For two semesters rubrics were collected and analyzed representing the inclusion of 53 students. The target mean for the rubric was a 2.8 and the overall achieved mean was a 2.97, indicating that student performance met minimal expectations. Nevertheless, student deficiencies in three crucial areas were identified. According to the survey findings, as a result of the class students had a better understanding of the scientific method as it applies to the business discipline, are now better able to critically assess a problem, feel they can formulate a procedure to solve a problem, can test a problem-solving process, have a better understanding of how to formulate potential business solutions, understand how potential solutions are evaluated, and understand how business decisions are evaluated. Conclusion: Following careful consideration and discussion of the preliminary findings, the course under consideration was significantly enhanced. The changes were implemented in the fall of 2020 and initial data collected in the spring of 2021 is indicating measured improvement in student success as exhibited by higher rubric scores. Recommendations for Practitioners: These initial findings are promising and while considering student success, especially as we increasingly face a greater and greater portion of under-prepared students entering higher education, initiatives to build the higher order thinking skills of students via transdisciplinary courses may play an important role in the future of higher education. Recommendations for Researchers: Additional studies of transdisciplinary efforts to improve student outcomes need to be explored through collection and evaluation of rubrics used to assess student learning as well as by measuring student perception of the efficacy of these efforts. Impact on Society: Society needs more graduates who leave universities ready to solve problems critically, strategically, and with scientific reasoning. Future Research: This study was disrupted by the COVID-19 pandemic; however, it is resuming in late 2021 and it is the hope that a robust and detailed paper, with more expansive findings will eventually be generated.




if

A Classification Schema for Designing Augmented Reality Experiences

Aim/Purpose: Designing augmented reality (AR) experiences for education, health or entertainment involves multidisciplinary teams making design decisions across several areas. The goal of this paper is to present a classification schema that describes the design choices when constructing an AR interactive experience. Background: Existing extended reality schema often focuses on single dimensions of an AR experience, with limited attention to design choices. These schemata, combined with an analysis of a diverse range of AR applications, form the basis for the schema synthesized in this paper. Methodology: An extensive literature review and scoring of existing classifications were completed to enable a definition of seven design dimensions. To validate the design dimensions, the literature was mapped to the seven-design choice to represent opportunities when designing AR iterative experiences. Contribution: The classification scheme of seven dimensions can be applied to communicating design considerations and alternative design scenarios where teams of domain specialists need to collaborate to build AR experiences for a defined purpose. Findings: The dimensions of nature of reality, location (setting), feedback, objects, concepts explored, participant presence and interactive agency, and style describe features common to most AR experiences. Classification within each dimension facilitates ideation for novel experiences and proximity to neighbours recommends feasible implementation strategies. Recommendations for Practitioners: To support professionals, this paper presents a comprehensive classification schema and design rationale for AR. When designing an AR experience, the schema serves as a design template and is intended to ensure comprehensive discussion and decision making across the spectrum of design choices. Recommendations for Researchers: The classification schema presents a standardized and complete framework for the review of literature and AR applications that other researchers will benefit from to more readily identify relevant related work. Impact on Society: The potential of AR has not been fully realized. The classification scheme presented in this paper provides opportunities to deliberately design and evaluate novel forms of AR experience. Future Research: The classification schema can be extended to include explicit support for the design of virtual and extended reality applications.




if

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




if

How Different Are Johnson and Wang? Documenting Discrepancies in the Records of Ethnic Scholars in Scopus

Aim/Purpose. This study captures and describes the discrepancies in the performance matrices of comparable Chinese and American scholars as recorded by Scopus. Background. The contributions of Chinese scholars to the global knowledge enterprise are increasing, whereas indexing bibliometric databases (e.g., Scopus) are not optimally designed to track their names and record their work precisely. Methodology. Coarsened exact matching was employed to construct two samples of comparable Chinese and American scholars in terms of gender, fields of work, educational backgrounds, experience, and workplace. Under 200 scholars, around a third being Chinese and the rest American scholars, were selected through this data construction method. Statistical tests, including logit regressions, Poisson regression, and fractional response models, were applied to both samples to measure and verify the discrepancies stored within their Scopus accounts. Contribution. This study complicates the theory of academic identity development, especially on the intellectual strand, as it shows ethnic scholars may face more errors in how their track records are stored and presented. This study also provides inputs for the discussion of algorithmic discrimination from the academic context and to the scientific community. Findings. This paper finds that Chinese scholars are more prone to imprecise records in Scopus (i.e., more duplicate accounts, a higher gap between the best-statistic accounts, and the total numbers of publications and citations) than their American counterparts. These findings are consistent across two samples and with different statistical tests. Recommendations for Practitioners. This paper suggests practitioners and administrators at research institutions treat scholars’ metrics presented in Scopus or other bibliometric databases with caution while evaluating ethnic scholars’ contributions. Recommendations for Researchers. Scholars and researchers are suggested to dedicate efforts to monitoring their accounts on indexing bibliometric platforms. Impact on Society. This paper raises awareness of the barriers that ethnic scholars face in participating in the scientific community and being recognized for their contributions. Future Research. Future research can be built on this paper by expanding the size of the analytical samples and extending similar analyses on comparable data harvested from other bibliometric platforms.




if

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




if

Gender Differences among IT Professionals in Dealing with Change and Skill Set Maintenance




if

Do Project Management Tools and Outcomes Differ in Organizations of Varying Size and Sector?




if

(GbL #1) Life Skills Developed by Those Who Have Played in Video Game Tournaments




if

Employees’ Involuntary Non-Use of ICT Influenced by Power Differences: A Case Study with the Grounded Theory Approach

Power differences affect implementation of information and communication technology (ICT) in a way that creates differences in ICT use. Involuntary non-use of new ICT at work occurs when employees want to use the new technology, but are unable to due to factors beyond their control. Findings from an in-depth qualitative study show how involuntary non-use of new ICT can be attributed to power differences between occupational groups in the same organization. The findings suggest that experience is a moderating variable and that closeness to formal power holders as well as closeness to the new technology increases the probability for expert control of the ICT-organization processes. These power differences favor ICT experts over ICT novices and result in a high-quality learning environment for the ICT experts characterized by autonomy, inclusion, and adequate work processes and technological solutions. The ICT novices try to navigate in a learning-hostile work environment characterized by marginalization through expert control, isolation, and inadequate work processes and technological solutions. This led to involuntary non-use by the ICT novices, while the experts became more proficient in ICT use. These findings give managers facing a technological organizational change tools to understand important mechanisms for implementing the change in their own organization, and help them take the right actions to integrate new technology and new organization of work.




if

Text Classification Techniques: A Literature Review

Aim/Purpose: The aim of this paper is to analyze various text classification techniques employed in practice, their strengths and weaknesses, to provide an improved awareness regarding various knowledge extraction possibilities in the field of data mining. Background: Artificial Intelligence is reshaping text classification techniques to better acquire knowledge. However, in spite of the growth and spread of AI in all fields of research, its role with respect to text mining is not well understood yet. Methodology: For this study, various articles written between 2010 and 2017 on “text classification techniques in AI”, selected from leading journals of computer science, were analyzed. Each article was completely read. The research problems related to text classification techniques in the field of AI were identified and techniques were grouped according to the algorithms involved. These algorithms were divided based on the learning procedure used. Finally, the findings were plotted as a tree structure for visualizing the relationship between learning procedures and algorithms. Contribution: This paper identifies the strengths, limitations, and current research trends in text classification in an advanced field like AI. This knowledge is crucial for data scientists. They could utilize the findings of this study to devise customized data models. It also helps the industry to understand the operational efficiency of text mining techniques. It further contributes to reducing the cost of the projects and supports effective decision making. Findings: It has been found more important to study and understand the nature of data before proceeding into mining. The automation of text classification process is required, with the increasing amount of data and need for accuracy. Another interesting research opportunity lies in building intricate text data models with deep learning systems. It has the ability to execute complex Natural Language Processing (NLP) tasks with semantic requirements. Recommendations for Practitioners: Frame analysis, deception detection, narrative science where data expresses a story, healthcare applications to diagnose illnesses and conversation analysis are some of the recommendations suggested for practitioners. Recommendation for Researchers: Developing simpler algorithms in terms of coding and implementation, better approaches for knowledge distillation, multilingual text refining, domain knowledge integration, subjectivity detection, and contrastive viewpoint summarization are some of the areas that could be explored by researchers. Impact on Society: Text classification forms the base of data analytics and acts as the engine behind knowledge discovery. It supports state-of-the-art decision making, for example, predicting an event before it actually occurs, classifying a transaction as ‘Fraudulent’ etc. The results of this study could be used for developing applications dedicated to assisting decision making processes. These informed decisions will help to optimize resources and maximize benefits to the mankind. Future Research: In the future, better methods for parameter optimization will be identified by selecting better parameters that reflects effective knowledge discovery. The role of streaming data processing is still rarely explored when it comes to text classification.




if

Identification of Influential Factors in Implementing IT Governance: A Survey Study of Indonesian Companies in the Public Sector

Aim/Purpose: This study is carried out to determine the factors influencing the implementation of IT governance in public sector. Background: IT governance in organizations plays strategic roles in deciding whether IT strategies and investments of both private and public organizations could be efficient, consistent, and transparent. IT governance has the potential to be the best practice that could improve organizational performance and competency. Methodology: The study involves qualitative and quantitative approaches, where data were collected through questionnaire, observation, interview, and document study through a sample of 367 respondents. The collected data were analyzed using Structured Equation Modeling (SEM) for validating the model and testing the hypotheses. Besides, semi-structured interview, observation, and document study were also carried out to obtain the management’s feedback on the implementation of IT governance and its activities. Contribution: The results of this study contribute to knowledge regarding good IT governance. Practically, this study can be used as a guideline for the future development and good IT governance. Findings: The findings reveal that policy has a significant direct influence on system planning, the management of IT investment, system realization, operation and maintenance, and organizational culture. The existence of IT governance policies, the success of the IT process can work well. Monitoring and evaluation processes also significantly affect system plan-ning, management of IT investment, system realization, operation and maintenance, and organizational culture. It indicates the process of monitoring and evaluation required for indications of financial efficiency, infrastructure, resources, risk and organizational success. Recommendations for Practitioners: It is important for organizational management to pay more attention to the organization’s internal controls in order to create good IT governance. Recommendation for Researchers: A comparative study between Indonesia and developing countries on the implementation of IT governance is needed to capture the differences be-tween those countries. Impact on Society: Knowledge of the factors influencing the implementation of IT governance as an effort to implement and improve the quality of IT governance. Future Research: Future studies should look further at the policy and IT governance models, specifically in public organizations, besides other influencing factors. Moreover, the outcome of this study could be generated as a guideline for the advanced development of IT governance and as a point of improvement as a way to generate a better good IT governance. It is essential because such evidence is lacking in current literature.




if

The Role of Social Network in Family Business Diversification: Evidence from South Eastern Nigeria

Aim/Purpose: This study seeks to investigate if participation in business association’s programs through the traditional and new media platforms influences family businesses in South Eastern Nigeria to diversify into similar or different businesses. Background: Before the advances in information and communication technology, businesses were carried on via the traditional media. The application of these advances has changed the way business communications and transactions are conducted globally in both family and non-family businesses. Businesses are adapting to today’s turbulent environment by opening similar or different businesses in the same or different locations that are hinged on the traditional and new media platforms. Nigerians are largely involved in social network through the traditional (face-to-face contact) and new media (e.g., Facebook, WhatsApp, Twitter, YouTube and Instagram). Moreover, in spite of the commonplaceness of family businesses in Nigeria, these businesses still experience weak diversification, bankruptcy and loss of socio-emotional wealth. Consequent upon the foregoing, this paper specifically investigates if involvement in social network via the traditional media (i.e., participation in business association’s meetings, workshops, seminars) and the new media (i.e., participation in the business association’s interactive sessions on trending business issues through the association’s online social platform like WhatsApp, Twitter), influence family businesses in South Eastern Nigeria to diversify into similar or different businesses. Methodology: The study adopted a qualitative methodology. The qualitative data were generated via interview involving 30 purposively selected businesses from South Eastern Nigeria. This comprises 15 family businesses each that have respectively adopted related and unrelated diversification strategies. Two respondents (i.e., the business owner and a top level manager) each were drawn from the selected businesses. In all, 60 respondents were interviewed. Since the unit of analysis is the family business, the interview transcriptions from all the respondents were subjected to thematic content analysis on the basis of the family businesses. Contribution: Active involvement and participation in all the meetings, discussions, workshops and seminars of the social network via the traditional and new media platforms facilitates the adoption of related or unrelated diversification in family businesses. Moreover, the adoption of similar social network platforms like WhatsApp and Twitter in all the relationships among and between employees and managers, and the transactions of the businesses is one of the key factors for achieving successful related or unrelated diversification in family businesses. Findings: In spite of the risky nature of the business environment, the adoption of related diversification strategies is significantly influenced by resources such as business consultancy services garnered through the traditional and new media platforms of the social network. Also, family businesses that are actively involved in a social network where the actors interact through the traditional and new media are influenced by the resources acquired to consider adopting unrelated diversification. These resources include: better understanding of the nature of business challenges, environments and experiences; and different lines of businesses. Thus, the traditional and new media platforms are complementary in their roles. Recommendations for Practitioners: Family business owner-managers could use the findings to develop related or unrelated strategies for diversifying into existing or new markets. This can be through the localization of manufacturing plant, improvement of product packaging, sitting of sales outlet closer to the consumers, introduction of lower prices for products/services, introduction of new and better ways of service delivery, or development of more compelling promotion strategies. Recommendation for Researchers: As a veritable guide, this study could guide future researchers in the formulation of their objectives, selection of instrument for data collection and respondents, and adoption of method of data analysis. Impact on Society: Successful diversification suggests the establishment of new or more businesses. Consequently, these new or more family businesses are expected to translate to more employment opportunities and by extension reduction in unemployment and poverty rates in the society. Future Research: Further studies should be carried out to enhance the development of family businesses, contribute to the existing literature and ensure the generalization of the findings.




if

IDCUP Algorithm to Classifying Arbitrary Shapes and Densities for Center-based Clustering Performance Analysis

Aim/Purpose: The clustering techniques are normally considered to determine the significant and meaningful subclasses purposed in datasets. It is an unsupervised type of Machine Learning (ML) where the objective is to form groups from objects based on their similarity and used to determine the implicit relationships between the different features of the data. Cluster Analysis is considered a significant problem area in data exploration when dealing with arbitrary shape problems in different datasets. Clustering on large data sets has the following challenges: (1) clusters with arbitrary shapes; (2) less knowledge discovery process to decide the possible input features; (3) scalability for large data sizes. Density-based clustering has been known as a dominant method for determining the arbitrary-shape clusters. Background: Existing density-based clustering methods commonly cited in the literature have been examined in terms of their behavior with data sets that contain nested clusters of varying density. The existing methods are not enough or ideal for such data sets, because they typically partition the data into clusters that cannot be nested. Methodology: A density-based approach on traditional center-based clustering is introduced that assigns a weight to each cluster. The weights are then utilized in calculating the distances from data vectors to centroids by multiplying the distance by the centroid weight. Contribution: In this paper, we have examined different density-based clustering methods for data sets with nested clusters of varying density. Two such data sets were used to evaluate some of the commonly cited algorithms found in the literature. Nested clusters were found to be challenging for the existing algorithms. In utmost cases, the targeted algorithms either did not detect the largest clusters or simply divided large clusters into non-overlapping regions. But, it may be possible to detect all clusters by doing multiple runs of the algorithm with different inputs and then combining the results. This work considered three challenges of clustering methods. Findings: As a result, a center with a low weight will attract objects from further away than a centroid with higher weight. This allows dense clusters inside larger clusters to be recognized. The methods are tested experimentally using the K-means, DBSCAN, TURN*, and IDCUP algorithms. The experimental results with different data sets showed that IDCUP is more robust and produces better clusters than DBSCAN, TURN*, and K-means. Finally, we compare K-means, DBSCAN, TURN*, and to deal with arbitrary shapes problems at different datasets. IDCUP shows better scalability compared to TURN*. Future Research: As future recommendations of this research, we are concerned with the exploration of further available challenges of the knowledge discovery process in clustering along with complex data sets with more time. A hybrid approach based on density-based and model-based clustering algorithms needs to compare to achieve maximum performance accuracy and avoid the arbitrary shapes related problems including optimization. It is anticipated that the comparable kind of the future suggested process will attain improved performance with analogous precision in identification of clustering shapes.




if

An Augmented Infocommunication Model for Unified Communications in Situational Contexts of Collaboration

Aim/Purpose: In this work, the authors propose an augmented model for human-centered Unified Communications & Collaboration (UC&C) product design and evaluation, which is supported by previous theoretical work. Background: Although the goal of implementing UC&C in an organization is to promote and mediate group dynamics, increasing overall productivity and collaboration; it does not seem to provide a solution for effective communication. It is clear that there is still a lack of consideration for human communication processes in the development of such products. Methodology: This paper is sustained by existing research to propose and test the application of an augmented model capable of supporting the design, development and evaluation of UC&C services that can be driven by the human communication process. To test the application of the augmented model in UC&C service development, a proof-of-concept mobile prototype was elaborated upon and evaluated, making use of User Experience (UX) and user-centred methods and techniques. A total of nine testing sessions were carried out in an organizational communication setup and recorded with eye tracking technology. Contribution: The authors argue that UC&C services should look at the user’s (human) natural processes to improve effective infocommunication and thus enhance collaboration. Authors believe this augmented version of the model will pave the way improving the research and development of useful and practical infocommunication products, capable of truly serving users’ needs. Findings: On evaluation of the prototype, qualitative data analysis uncovered structural problems in the proposed prototype which hindered the augmented model’s elements and subsequently, the user experience. Five out of eighteen identified interaction issues are highlighted in this paper to demonstrate the proposed augmented model’s validity, applied in UC&C services evaluation. Recommendations for Practitioners: Considering and respecting the user’s natural communication processes, practitioners should be able to propose and develop innovative solutions that truly enable and empower effective organizational collaboration. UC&C functionalities should be designed, taking the augmented model’s proposed elements and their pertinence in representing the human interpersonal communication phenomena into consideration, namely: Social Presence; Immediacy of Communication; Concurrency and Synchronicity. Recommendation for Researchers: This paper intends to demonstrate that the adoption and use of UTAUT technology characteristics, in conjunction with Synchronicity proposition, can be considered as a reference for human-centric design and the evaluation of UC&C systems. Impact on Society: To highlight the need to develop further research on this important topic of human collaboration mediated by technology inside organizations. Future Research: This research focused its attention on communication functionalities. However, collaboration can potentially be affected by other services that may be included in a UC&C system, such as scheduling, meetings or task management. Future research could consider employing this augmented model to evaluate such systems or proof-of-concept prototypes.




if

Predicting Key Predictors of Project Desertion in Blockchain: Experts’ Verification Using One-Sample T-Test

Aim/Purpose: The aim of this study was to identify the critical predictors affecting project desertion in Blockchain projects. Background: Blockchain is one of the innovations that disrupt a broad range of industries and has attracted the interest of software developers. However, despite being an open-source software (OSS) project, the maintenance of the project ultimately relies on small core developers, and it is still uncertain whether the technology will continue to attract a sufficient number of developers. Methodology: The study utilized a systematic literature review (SLR) and an expert review method. The SLR identified 21 primary studies related to project desertion published in Scopus databases from the year 2010 to 2020. Then, Blockchain experts were asked to rank the importance of the identified predictors of project desertion in Blockchain. Contribution: A theoretical framework was constructed based on Social Cognitive Theory (SCT) constructs; personal, behavior, and environmental predictors and related theories. Findings: The findings indicate that the 12 predictors affecting Blockchain project desertion identified through SLR were important and significant. Recommendations for Practitioners: The framework proposed in this paper can be used by the Blockchain development community as a basis to identify developers who might have the tendency to abandon a Blockchain project. Recommendation for Researchers: The results show that some predictors, such as code testing tasks, contributed code decoupling, system integration and expert heterogeneity that are not covered in the existing developer turnover models can be integrated into future research efforts. Impact on Society: This study highlights how an individual’s design choices could determine the success or failure of IS projects. It could direct Blockchain crypto-currency investors and cyber-security managers to pay attention to the developer’s behavior while ensuring secure investments, especially for crypto-currencies projects. Future Research: Future research may employ additional methods, such as a meta-analysis, to provide a comprehensive picture of the main predictors that can predict project desertion in Blockchain.




if

The International Case for Micro-Credentials for Life-Wide And Life-Long Learning: A Systematic Literature Review

Aim/Purpose: Systematic literature reviews seek to locate all studies that contain material of relevance to a research question and to synthesize the relevant outcomes of those studies. The primary aim of this paper was to synthesize both research and practice reports on micro-credentials (MCRs). Background: There has been an increase in reports and research on the plausibility of MCRs to support dynamic human skills development for an increasingly impatient and rapidly changing digital world. The integration of fast-paced emerging technologies and digitalization necessitate alternative learning paradigms. MCRs offer time, financial, and space flexibility and can be stacked into a larger qualification, thereby allowing for a broader range of transdisciplinary competencies within a qualification. However, MCRs often lack the academic rigor required for accreditation within existing disciplines. Methodology: The study followed the PRISMA framework (Preferred Reporting Items for Systematic Reviews and Meta Analyses), which offers a rigorous method to enhance reporting quality. The study used both academic research and practice reports. Contribution: The paper makes a theoretical contribution to the discourse about the need for innovation within existing educational paradigms for continued relevance in a changing world. It also contributes to the debate on the role of MCRs in bridging the gap between practice and academia despite the growing difference between their interests, and the role that MCRs play in the social-economic plans of countries. Findings: The key findings are that investments in MCRs are mainly in the Science, Technology, Engineering and Mathematics (STEM) and Education sectors, and have taken place mainly in high-income countries and regions – contexts that particularly value practice-accredited MCRs. Low-income countries, by contrast, remain traditional and insist on MCRs that are formally accredited by a recognized academic institution. This contributes to a widening skills gap between low- and high-income countries or regions, which results in greater global disparities. There is also a growing divide between academia and practice concerning their interest in MCRs (a reflection of the rigor versus relevance debate), which partially explains why many global and larger organizations have gone on to create their own learning institutions. Recommendations for Practitioners: We recommend that educational mechanisms consider the critical importance of MCRs as part of innovative efforts for life-wide (different sectors) and life-long (same sector) learning, especially in low-income countries. MCRs provide dynamic mechanisms to fill skills gaps in an increasing ruthless international battle for talent. Recommendation for Researchers: We recommend focused research into skills and career pathways using MCRs while at the same time remaining responsive to transdisciplinary efforts and sensitive to global and local changes within any sector. Impact on Society: Work and society have transformed over time, and more so in the new digital age, yet academia has been slow in adapting to the changes, forcing organizations to create their own learning institutions or to use MCRs to fill the skills gap. The purpose of education goes beyond preparing individuals for work, extending further to creating an environment where individuals and governments seek their own social and economic outcomes. MCRs provide a flexible means for co-creation between individuals, education, organizations, and government that could stem global rising unemployment, social exclusion, and redundancy. Future Research: Future research should focus on the co-creation of MCRs between practitioners and academia.




if

Dark Side of Mobile Phone Technology: Assessing the Impact of Self-Phubbing and Partner-Phubbing on Life Satisfaction

Aim/Purpose: The study aims to explore the attributes of self-phubbing and partner-phubbing, as well as their impact on marital relationship satisfaction and the quality of communication. Furthermore, it aims to comprehend how these characteristics could impact an individual’s total level of life satisfaction. Background: The study aims to establish a clear association between specific mobile phone usage behaviors and their subsequent impact on relationship satisfaction and the quality of communication. This study investigates the effects of two types of behaviors on interpersonal relationships: self-phubbing, which refers to an individual being deeply absorbed in their own mobile phone use, and partner-phubbing, which refers to witnessing one’s partner being deeply absorbed in a mobile device. Methodology: This study utilizes a quantitative approach. The poll involved 150 smartphone users in Malaysia who are in relationships, and they participated by completing a questionnaire. The data analysis was performed using the Partial Least Squares-based Structural Equation Modeling method. Contribution: This research addresses the gap and gives insight into the consequences of self and partner phubbing and its impact on the relationship and life satisfaction among partners by providing a research model that was validated with primary data. Findings: The results of this survey show that smartphone conflicts harm relationship satisfaction but not communication quality. It was revealed that communication quality does not directly bring a negative impact on life satisfaction, but it directly affects relationship satisfaction, which, in turn, harms life satisfaction. Recommendations for Practitioners: The findings of this study can be used by practitioners to improve relationship counseling and therapy. Through the integration of the notion of phubbing and its impact on relationship happiness, couples can receive guidance on how to reduce the tension that arises from using smartphones. Recommendation for Researchers: Previous research was conducted exclusively on only an individual’s phubbing behavior, but limited work was done on the partner’s phubbing behavior. Future researchers can enhance this model by identifying more factors. Impact on Society: This study addresses broader societal ramifications in addition to the dynamics of particular relationships. This study promotes a more mindful use of smartphones by exposing the complex relationships between technology use, relationship happiness, and general life contentment. This will ultimately lead to healthier relationships and improved societal well-being. Future Research: In the future, we are going to implement an artificial neural network approach to test this data to predict the most important factors that influence phubbing.




if

Employing Artificial Neural Networks and Multiple Discriminant Analysis to Evaluate the Impact of the COVID-19 Pandemic on the Financial Status of Jordanian Companies

Aim/Purpose: This paper aims to empirically quantify the financial distress caused by the COVID-19 pandemic on companies listed on Amman Stock Exchange (ASE). The paper also aims to identify the most important predictors of financial distress pre- and mid-pandemic. Background: The COVID-19 pandemic has had a huge toll, not only on human lives but also on many businesses. This provided the impetus to assess the impact of the pandemic on the financial status of Jordanian companies. Methodology: The initial sample comprised 165 companies, which was cleansed and reduced to 84 companies as per data availability. Financial data pertaining to the 84 companies were collected over a two-year period, 2019 and 2020, to empirically quantify the impact of the pandemic on companies in the dataset. Two approaches were employed. The first approach involved using Multiple Discriminant Analysis (MDA) based on Altman’s (1968) model to obtain the Z-score of each company over the investigation period. The second approach involved developing models using Artificial Neural Networks (ANNs) with 15 standard financial ratios to find out the most important variables in predicting financial distress and create an accurate Financial Distress Prediction (FDP) model. Contribution: This research contributes by providing a better understanding of how financial distress predictors perform during dynamic and risky times. The research confirmed that in spite of the negative impact of COVID-19 on the financial health of companies, the main predictors of financial distress remained relatively steadfast. This indicates that standard financial distress predictors can be regarded as being impervious to extraneous financial and/or health calamities. Findings: Results using MDA indicated that more than 63% of companies in the dataset have a lower Z-score in 2020 when compared to 2019. There was also an 8% increase in distressed companies in 2020, and around 6% of companies came to be no longer healthy. As for the models built using ANNs, results show that the most important variable in predicting financial distress is the Return on Capital. The predictive accuracy for the 2019 and 2020 models measured using the area under the Receiver Operating Characteristic (ROC) graph was 87.5% and 97.6%, respectively. Recommendations for Practitioners: Decision makers and top management are encouraged to focus on the identified highly liquid ratios to make thoughtful decisions and initiate preemptive actions to avoid organizational failure. Recommendation for Researchers: This research can be considered a stepping stone to investigating the impact of COVID-19 on the financial status of companies. Researchers are recommended to replicate the methods used in this research across various business sectors to understand the financial dynamics of companies during uncertain times. Impact on Society: Stakeholders in Jordanian-listed companies should concentrate on the list of most important predictors of financial distress as presented in this study. Future Research: Future research may focus on expanding the scope of this study by including other geographical locations to check for the generalisability of the results. Future research may also include post-COVID-19 data to check for changes in results.




if

Customer Churn Prediction in the Banking Sector Using Machine Learning-Based Classification Models

Aim/Purpose: Previous research has generally concentrated on identifying the variables that most significantly influence customer churn or has used customer segmentation to identify a subset of potential consumers, excluding its effects on forecast accuracy. Consequently, there are two primary research goals in this work. The initial goal was to examine the impact of customer segmentation on the accuracy of customer churn prediction in the banking sector using machine learning models. The second objective is to experiment, contrast, and assess which machine learning approaches are most effective in predicting customer churn. Background: This paper reviews the theoretical basis of customer churn, and customer segmentation, and suggests using supervised machine-learning techniques for customer attrition prediction. Methodology: In this study, we use different machine learning models such as k-means clustering to segment customers, k-nearest neighbors, logistic regression, decision tree, random forest, and support vector machine to apply to the dataset to predict customer churn. Contribution: The results demonstrate that the dataset performs well with the random forest model, with an accuracy of about 97%, and that, following customer segmentation, the mean accuracy of each model performed well, with logistic regression having the lowest accuracy (87.27%) and random forest having the best (97.25%). Findings: Customer segmentation does not have much impact on the precision of predictions. It is dependent on the dataset and the models we choose. Recommendations for Practitioners: The practitioners can apply the proposed solutions to build a predictive system or apply them in other fields such as education, tourism, marketing, and human resources. Recommendation for Researchers: The research paradigm is also applicable in other areas such as artificial intelligence, machine learning, and churn prediction. Impact on Society: Customer churn will cause the value flowing from customers to enterprises to decrease. If customer churn continues to occur, the enterprise will gradually lose its competitive advantage. Future Research: Build a real-time or near real-time application to provide close information to make good decisions. Furthermore, handle the imbalanced data using new techniques.




if

Navigating the Future: Exploring AI Adoption in Chinese Higher Education Through the Lens of Diffusion Theory

Aim/Purpose: This paper aims to investigate and understand the intentions of management undergraduate students in Hangzhou, China, regarding the adoption of Artificial Intelligence (AI) technologies in their education. It addresses the need to explore the factors influencing AI adoption in the educational context and contribute to the ongoing discourse on technology integration in higher education. Background: The paper addresses the problem by conducting a comprehensive investigation into the perceptions of management undergraduate students in Hangzhou, China, regarding the adoption of AI in education. The study explores various factors, including Perceived Relative Advantage and Trialability, to shed light on the nuanced dynamics influencing AI technology adoption in the context of higher education. Methodology: The study employs a quantitative research approach, utilizing the Confirmatory Tetrad Analysis (CTA) and Partial Least Squares Structural Equation Modeling (PLS-SEM) methodologies. The research sample consists of management undergraduate students in Hangzhou, China, and the methods include data screening, principal component analysis, confirmatory tetrad analysis, and evaluation of the measurement and structural models. We used a random sampling method to distribute 420 online, self-administered questionnaires among management students aged 18 to 21 at universities in Hangzhou. Contribution: This paper explores how management students in Hangzhou, China, perceive the adoption of AI in education. It identifies factors that influence AI adoption intention. Furthermore, the study emphasizes the complex nature of technology adoption in the changing educational technology landscape. It offers a thorough comprehension of this process while challenging and expanding the existing literature by revealing the insignificant impacts of certain factors. This highlights the need for an approach to AI integration in education that is context-specific and culturally sensitive. Findings: The study highlights students’ positive attitudes toward integrating AI in educational settings. Perceived relative advantage and trialability were found to impact AI adoption intention significantly. AI adoption is influenced by social and cultural contexts rather than factors like compatibility, complexity, and observability. Peer influence, instructor guidance, and the university environment were identified as pivotal in shaping students’ attitudes toward AI technologies. Recommendations for Practitioners: To promote the use of AI among management students in Hangzhou, practitioners should highlight the benefits and the ease of testing these technologies. It is essential to create communication strategies tailored to the student’s needs, consider cultural differences, and utilize the influence of peers and instructors. Establishing a supportive environment within the university that encourages innovation through policies and regulations is vital. Additionally, it is recommended that students’ attitudes towards AI be monitored constantly, and strategies adjusted accordingly to keep up with the changing technological landscape. Recommendation for Researchers: Researchers should conduct cross-disciplinary and cross-cultural studies with qualitative and longitudinal research designs to understand factors affecting AI adoption in education. It is essential to investigate compatibility, complexity, observability, individual attitudes, prior experience, and the evolving role of peers and instructors. Impact on Society: The study’s insights into the positive attitudes of management students in Hangzhou, China, toward AI adoption in education have broader societal implications. It reflects a readiness for transformative educational experiences in a region known for technological advancements. However, the study also underscores the importance of cautious integration, considering associated risks like data privacy and biases to ensure equitable benefits and uphold educational values. Future Research: Future research should delve into AI adoption in various academic disciplines and regions, employing longitudinal designs and qualitative methods to understand cultural influences and the roles of peers and instructors. Investigating moderating factors influencing specific factors’ relationship with AI adoption intention is essential for a comprehensive understanding.




if

Emphasizing Data Quality for the Identification of Chili Varieties in the Context of Smart Agriculture

Aim/Purpose: This research aims to evaluate models from meta-learning techniques, such as Riemannian Model Agnostic Meta-Learning (RMAML), Model-Agnostic Meta-Learning (MAML), and Reptile meta-learning, to obtain high-quality metadata. The goal is to utilize this metadata to increase accuracy and efficiency in identifying chili varieties in smart agriculture. Background: The identification of chili varieties in smart agriculture is a complex process that requires a multi-faceted approach. One challenge in chili variety identification is the lack of a large and diverse dataset. This can be addressed using meta-learning techniques, which allow the model to leverage knowledge learned from other related tasks or artificially expand the dataset by applying transformations to existing data. Another challenge is the variation in growing conditions, which can affect the appearance of chili varieties. Meta-learning techniques can help address this challenge by allowing the model to adapt to variations in growing conditions with task-specific embeddings and optimizations. With the help of meta-learning techniques, such as data augmentation, data characterization, selection of datasets, and performance estimation, quality metadata for accurate identification of chili varieties can be achieved even in the presence of limited data and variations in growing conditions. Furthermore, the use of meta-learning techniques in chili variety identification can also assist in addressing challenges related to the computational complexity of the task. Methodology: The research approach employed is quantitative, specifically comparing three models from meta-learning techniques to determine which model is most suitable for our dataset. Data was collected from the variety assembly garden in the form of images of chili leaves using a mobile device. The research successfully gathered 1,974 images of chili leaves, with 697 images of large red chilies, 649 images of curly red chilies, and 628 images of cayenne peppers. These chili leaf images were then processed using augmentation techniques. The results of image data augmentation were categorized based on leaf characteristics (such as oval, lancet, elliptical, serrated leaf edges, and flat leaf edges). Subsequently, training and validation utilized three models from meta-learning techniques. The final stage involved model evaluation using 2-way and 3-way classification, as well as 5-shot and 10-shot learning scenarios to select the dataset with the best performance. Contribution: Improving classification accuracy, with a focus on ensuring high-quality data, allows for more precise identification and classification of chili varieties. Enhancing model training through an emphasis on data quality ensures that the models receive reliable and representative input, leading to improved generalization and performance in identifying chili varieties. Findings: With small collections of datasets, the authors have used data augmentation and meta-learning techniques to overcome the challenges of limited data and variations in growing conditions. Recommendations for Practitioners: By leveraging the knowledge and adaptability gained from meta-learning, accurate identification of chili varieties can be achieved even with limited data and variations in growing conditions. The use of meta-learning techniques in chili variety identification can greatly improve the accuracy and reliability of the identification process. Recommendation for Researchers: Using meta-learning techniques, such as transfer learning and parameter optimization, researchers can overcome challenges related to limited data and variations in growing conditions in chili variety identification. Impact on Society: The findings from this research can help identify superior chili seeds, thereby motivating farmers to cultivate high-quality chilies and achieve bountiful harvests. Future Research: We intend to verify our approach on a more extensive array of datasets and explore the implementation of more resilient regularization techniques, going beyond image augmentation, within the meta-learning techniques. Furthermore, our goal is to expand our research to encompass the automatic learning of parameters during training and tackle issues associated with noisy labels. Building on the insights gained from our observed outcomes, a future objective is to enhance the refinement of model-agnostic meta-learning techniques that can effectively adapt to intricate task distributions with substantial domain gaps between tasks. To realize this aim, our proposal involves devising model-agnostic meta-learning techniques specifically designed for multi-modal scenarios.




if

IRNN-SS: deep learning for optimised protein secondary structure prediction through PROMOTIF and DSSP annotation fusion

DSSP stands as a foundational tool in the domain of protein secondary structure prediction, yet it encounters notable challenges in accurately annotating irregular structures, such as β-turns and γ-turns, which constitute approximately 25%-30% and 10%-15% of protein turns, respectively. This limitation arises from DSSP's reliance on hydrogen-bond analysis, resulting in annotation gaps and reduced consensus on irregular structures. Alternatively, PROMOTIF excels at identifying these irregular structure annotations using phi-psi information. Despite their complementary strengths, previous methodologies utilised DSSP and PROMOTIF separately, leading to disparate prediction methods for protein secondary structures, hampering comprehensive structure analysis crucial for drug development. In this work, we bridge this gap using an annotation fusion approach, combining DSSP structures with beta, and gamma turns. We introduce IRNN-SS, a model employing deep inception and bidirectional gated recurrent neural networks, achieving 77.4% prediction accuracy on benchmark datasets, outpacing current models.




if

Optimisation with deep learning for leukaemia classification in federated learning

The most common kind of blood cancer in people of all ages is leukaemia. The fractional mayfly optimisation (FMO) based DenseNet is proposed for the identification and classification of leukaemia in federated learning (FL). Initially, the input image is pre-processed by adaptive median filter (AMF). Then, cell segmentation is done using the Scribble2label. After that, image augmentation is accomplished. Finally, leukaemia classification is accomplished utilising DenseNet, which is trained using the FMO. Here, the FMO is devised by merging the mayfly algorithm (MA) and the fractional concept (FC). Following local training, the server performs local updating and aggregation using a weighted average by RV coefficient. The results showed that FMO-DenseNet attained maximum accuracy, true negative rate (TNR) and true positive rate (TPR) of 94.3%, 96.5% and 95.3%. Moreover, FMO-DenseNet gained minimum mean squared error (MSE) and root mean squared error (RMSE) of 5.7%, 9.2% and 30.4%.




if

Alzheimer's disease classification using hybrid Alex-ResNet-50 model

Alzheimer's disease (AD), a leading cause of dementia and mortality, presents a growing concern due to its irreversible progression and the rising costs of care. Early detection is crucial for managing AD, which begins with memory deterioration caused by the damage to neurons involved in cognitive functions. Although incurable, treatments can manage its symptoms. This study introduces a hybrid AlexNet+ResNet-50 model for AD diagnosis, utilising a pre-trained convolutional neural network (CNN) through transfer learning to analyse MRI scans. This method classifies MRI images into Alzheimer's disease (AD), moderate cognitive impairment (MCI), and normal control (NC), enhancing model efficiency without starting from scratch. Incorporating transfer learning allows for refining the CNN to categorise these conditions accurately. Our previous work also explored atlas-based segmentation combined with a U-Net model for segmentation, further supporting our findings. The hybrid model demonstrates superior performance, achieving 94.21% accuracy in identifying AD cases, indicating its potential as a highly effective tool for early AD diagnosis and contributing to efforts in managing the disease's impact.




if

Scoping and Sequencing Educational Resources and Speech Acts: A Unified Design Framework for Learning Objects and Educational Discourse




if

The OSEL Taxonomy for the Classification of Learning Objects




if

An Engagement Model for Learning: Providing a Framework to Identify Technology Services




if

BILDU: Compile, Unify, Wrap, and Share Digital Learning Resources




if

Inquiry-Directed Organization of E-Portfolio Artifacts for Reflection




if

Initial Development of a Learners’ Ratified Acceptance of Multibiometrics Intentions Model (RAMIM)




if

Drills, Games or Tests? Evaluating Students' Motivation in Different Online Learning Activities, Using Log File Analysis




if

If We Build It, Will They Come? Adoption of Online Video-Based Distance Learning




if

Analyzing Associations between the Different Ratings Dimensions of the MERLOT Repository




if

Kindergarten Children’s Perceptions of “Anthropomorphic Artifacts” with Adaptive Behavior




if

Lifelong Learning at the Technion: Graduate Students’ Perceptions of and Experiences in Distance Learning




if

Academic Course Gamification: The Art of Perceived Playfulness




if

5-7 Year Old Children's Conceptions of Behaving Artifacts and the Influence of Constructing Their Behavior on the Development of Theory of Mind (ToM) and Theory of Artificial Mind (ToAM)

Nowadays, we are surrounded by artifacts that are capable of adaptive behavior, such as electric pots, boiler timers, automatic doors, and robots. The literature concerning human beings’ conceptions of “traditional” artifacts is vast, however, little is known about our conceptions of behaving artifacts, nor of the influence of the interaction with such artifacts on cognitive development, especially among children. Since these artifacts are provided with an artificial “mind,” it is of interest to assess whether and how children develop a Theory of Artificial Mind (ToAM) which is distinct from their Theory of Mind (ToM). The study examined a new theoretical scheme named ToAM (Theory of Artificial Mind) by means of qualitative and quantitative methodology among twenty four 5-7 year old children from central Israel. It also examined the effects of interacting with behaving artifacts (constructing versus observing the robot’s behavior) using the “RoboGan” interface on children’s development of ToAM and their ToM and looked for conceptions that evolve among children while interacting with behaving artifacts which are indicative of the acquisition of ToAM. In the quantitative analysis it was found that the interaction with behaving artifacts, whether as observers or constructors and for both age groups, brought into awareness children’s ToM as well as influenced their ability to understand that robots can behave independently and based on external and environmental conditions. In the qualitative analysis it was found that participating in the intervention influenced the children’s ToAM for both constructors and for the younger observer. Engaging in building the robot’s behavior influenced the children’s ability to explain several of the robots’ behaviors, their understanding of the robot’s script-based behavior and rule-based behavior and the children’s metacognitive development. The theoretical and practical importance of the study is discussed.




if

Will a Black Hole Eventually Swallow Earth?” Fifth Graders' Interest in Questions from a Textbook, an Open Educational Resource and Other Students' Questions

Can questions sent to Open-Educational-Resource (OER) websites such as Ask-An-Expert serve as indicators for students’ interest in science? This issue was examined using an online questionnaire which included an equal number of questions about the topics “space” and “nutrition” randomly selected from three different sources: a 5th-grade science textbook, the “Ask-An-Expert” website, and questions collected from other students in the same age group. A sample of 113 5th-graders from two elementary schools were asked to rate their interest level in finding out the answer to these questions without knowledge of their source. Significant differences in students’ interest level were found between questions: textbook questions were ranked lowest for both subjects, and questions from the open-resource were ranked high. This finding suggests that questions sent to an open-resource could be used as an indicator of students’ interest in science. In addition, the high correlation of interests expressed by students from the two schools may point to a potential generalization of the findings. This study contributes by highlighting OER as a new and promising indicator of student interest, which may help bring “student voices” into mainstream science teaching to increase student interest in science.




if

Influence of Organizational Culture on the Job Motivations of Lifelong Learning Center Teachers

Aim/Purpose: The aim of the research was to examine the relationship between the sub-dimensions of organizational culture perceptions, such as task culture, success culture, support culture, and bureaucratic culture and job motivations of ISMEK Lifelong Learning Center teachers. Background: It is thought that if teachers’ perceptions of organizational culture and levels of job motivation are assessed and the effects of school culture on the motivation level of teachers investigated, solutions to identified problems can be developed. Methodology: The study was conducted using survey research. The sample population consisted of 354 teachers working for the Istanbul Metropolitan Municipality’s Lifelong Learning Center (ISMEK). The personal information form prepared by the researchers, the School Culture Scale developed by Terzi (2005) and the Job Motivation Scale developed by Aksoy (2006) were administered to the teachers. Contribution: This study will contribute to research on the job motivations of teachers involved in adult education. Findings: The findings indicated that task culture differs according to gender. Teachers report high levels of job motivation, but job motivation varies with gender, education level, and number of years working at the ISMEK Lifelong Learning Center. A significant relationship was found between sub-dimensions of organizational culture and job motivation. Organizational culture explains more than half of the change in job motivation. The sub-dimensions of organizational culture, task culture, achievement culture, and support culture were found to be significantly predictive of job motivation. Recommendations for Practitioners: In order to increase motivation of teachers, a success-oriented structure should be formed within the organization. It is necessary for teachers and managers to support each other and to establish a support culture in their institutions. In order to establish a culture of support, managers need to receive in-service training. Recommendation for Researchers: This study was carried out in the ISMEK Lifelong Learning Center and similar studies can be done in classrooms, training centers, and study centers. Impact on Society: Teachers working in adult education should be afforded a more comfortable working environment that will positively impact job motivation, resulting in a higher quality of education for students. Therefore, this research may contribute to an increase in the number of students who engage in lifelong learning opportunities. Future Research: This qualitative study utilized a relational survey model. A more in-depth qualitative study employing observation and interviews is warranted.




if

Positive vs. Negative Framing of Scientific Information on Facebook Using Peripheral Cues: An Eye-Tracking Study of the Credibility Assessment Process

Aim/Purpose: To examine how positive/negative message framing – based on peripheral cues (regarding popularity, source, visuals, and hyperlink) – affects perceptions of credibility of scientific information posted on social networking sites (in this case, Facebook), while exploring the mechanisms of viewing the different components. Background: Credibility assessment of information is a key skill in today's information society. However, it is a demanding cognitive task, which is impossible to perform for every piece of online information. Additionally, message framing — that is, the context and approach used to construct information— may impact perceptions of credibility. In practice, people rely on various cues and cognitive heuristics to determine whether they think a piece of content is true or not. In social networking sites, content is usually enriched by additional information (e.g., popularity), which may impact the users' perceived credibility of the content. Methodology: A quantitative controlled experiment was designed (N=19 undergraduate students), collecting fine grained data with an eye tracking camera, while analyzing it using transition graphs. Contribution: The findings on the mechanisms of that process, enabled by the use of eye tracking data, point to the different roles of specific peripheral cues, when the message is overall peripherally positive or negative. It also contributes to the theoretical literature on framing effects in science communication, as it highlights the peripheral cues that make a strong frame. Findings: The positively framed status was perceived, as expected from the Elaboration Likelihood Model, more credible than the negatively framed status, demonstrating the effects of the visual framing. Differences in participants' mechanisms of assessing credibility between the two scenarios were evident in the specific ways the participants examined the various status components. Recommendations for Practitioners: As part of digital literacy education, major focus should be given to the role of peripheral cues on credibility assessment in social networking sites. Educators should emphasize the mechanisms by which these cues interact with message framing, so Internet users would be encouraged to reflect upon their own credibility assessment skills, and eventually improve them. Recommendation for Researchers: The use of eye tracking data may help in collecting and analyzing fine grained data on credibility assessment processes, and on Internet behavior at large. The data shown here may shed new light on previously studied phenomena, enabling a more nuanced understanding of them. Impact on Society: In an era when Internet users are flooded with information that can be created by virtually anyone, credibility assessment skills have become ever more important, hence the prominence of this skill. Improving citizens' assessment of information credibility — to which we believe this study contributes — results on a greater impact on society. Future Research: The role of peripheral cues and of message framing should be studied in other contexts (not just scientific news) and in other platforms. Additional peripheral cues not tested here should be also taken into consideration (e.g., connections between the information consumer and the information sharer, or the type of the leading image).