q

A Student Project to Qualify Underprivileged Adolescents




q

Quality Measures that Matter




q

Inquiry-Based Training Model and the Design of E-Learning Environments




q

Exploring the Impact of Decision Making Culture on the Information Quality – Information Use Relationship: An Empirical Investigation of Two Industries




q

The Need for Qualitative Methods in Undergraduate IS Education




q

How Business Departments Manage the Requirements Engineering Process in Information Systems Projects in Small and Medium Enterprises




q

Applying a Modified Technology Acceptance Model to Qualitatively Analyse the Factors Affecting E-Portfolio Implementation for Student Teachers’ in Field Experience Placements




q

A Framework for Using Questions as Meta-tags to Enhance Knowledge Support Services as Part of a Living Lab Environment




q

Course Quality Starts with Knowing Its C-Index




q

Critical Design Factors of Developing a High-quality Educational Website: Perspectives of Pre-service Teachers




q

Enterprise Resource Planning (ERP) Systems – Is Botswana Winning? A Question on Culture Effects




q

Requirements Elicitation Problems: A Literature Analysis

Requirements elicitation is the process through which analysts determine the software requirements of stakeholders. Requirements elicitation is seldom well done, and an inaccurate or incomplete understanding of user requirements has led to the downfall of many software projects. This paper proposes a classification of problem types that occur in requirements elicitation. The classification has been derived from a literature analysis. Papers reporting on techniques for improving requirements elicitation practice were examined for the problem the technique was designed to address. In each classification the most recent or prominent techniques for ameliorating the problems are presented. The classification allows the requirements engineer to be sensitive to problems as they arise and the educator to structure delivery of requirements elicitation training.




q

Student Preferences and Performance in Online and Face-to-Face Classes Using Myers-Briggs Indicator: A Longitudinal Quasi-Experimental Study

This longitudinal, quasi-experimental study investigated students’ cognitive personality type using the Myers-Briggs personality Type Indicator (MBTI) in Internet-based Online and Face-to-Face (F2F) modalities. A total of 1154 students enrolled in 28 Online and 32 F2F sections taught concurrently over a period of fourteen years. The study measured whether the sample is similar to the national average percentage frequency of all 16 different personality types; whether specific personality type students preferred a specific modality of instructions and if this preference changed over time; whether learning occurred in both class modalities; and whether specific personality type students learned more from a specific modality. Data was analyzed using regression, t-test, frequency, and Chi-Squared. The study concluded that data used in the study was similar to the national statistics; that no major differences in preference occurred over time; and that learning did occur in all modalities, with more statistically significant learning found in the Online modality versus F2F for Sensing, Thinking, and Perceiving types. Finally, Sensing and Thinking (ST) and Sensing and Perceiving (SP) group types learned significantly more in Online modality versus F2F.




q

The Use, Impact, and Unintended Consequences of Mobile Web-Enabled Devices in University Classrooms

The impact that mobile web-enabled devices have had on the lives and behavior of university students has been immense. Yet, many of the models used in the classrooms have remained unchanged. Although a traditional research approach of examining the literature, developing a methodology, and so on is followed, this paper’s main aim is to inform practitioners on observations and examples from courses which insist on and encourage mobiles in the classroom. The paper asked three research questions regarding the use, impact, and unintended consequences of mobile web-enabled devices in the classroom. Data was collected from observing and interacting with post graduate students and staff in two universities across two continents: Africa and Europe. The paper then focuses on observations and examples on the use, impact, and unintended consequences of mobile web-enabled devices in two classrooms. The findings are that all students used mobile web-enabled devices for a variety of reasons. The use of mobile devices did not negatively impact the class, rather students appeared to be more engaged and comfortable knowing they were allowed to openly access their mobile devices. The unintended consequences included the use of mobiles to translate text into home languages.




q

Medical Image Security Using Quantum Cryptography

Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched.




q

Predicting Suitable Areas for Growing Cassava Using Remote Sensing and Machine Learning Techniques: A Study in Nakhon-Phanom Thailand

Aim/Purpose: Although cassava is one of the crops that can be grown during the dry season in Northeastern Thailand, most farmers in the region do not know whether the crop can grow in their specific areas because the available agriculture planning guideline provides only a generic list of dry-season crops that can be grown in the whole region. The purpose of this research is to develop a predictive model that can be used to predict suitable areas for growing cassava in Northeastern Thailand during the dry season. Background: This paper develops a decision support system that can be used by farmers to assist them determine if cassava can be successfully grown in their specific areas. Methodology: This study uses satellite imagery and data on land characteristics to develop a machine learning model for predicting suitable areas for growing cassava in Thailand’s Nakhon-Phanom province. Contribution: This research contributes to the body of knowledge by developing a novel model for predicting suitable areas for growing cassava. Findings: This study identified elevation and Ferric Acrisols (Af) soil as the two most important features for predicting the best-suited areas for growing cassava in Nakhon-Phanom province, Thailand. The two-class boosted decision tree algorithm performs best when compared with other algorithms. The model achieved an accuracy of .886, and .746 F1-score. Recommendations for Practitioners: Farmers and agricultural extension agents will use the decision support system developed in this study to identify specific areas that are suitable for growing cassava in Nakhon-Phanom province, Thailand Recommendation for Researchers: To improve the predictive accuracy of the model developed in this study, more land and crop characteristics data should be incorporated during model development. The ground truth data for areas growing cassava should also be collected for a longer period to provide a more accurate sample of the areas that are suitable for cassava growing. Impact on Society: The use of machine learning for the development of new farming systems will enable farmers to produce more food throughout the year to feed the world’s growing population. Future Research: Further studies should be carried out to map other suitable areas for growing dry-season crops and to develop decision support systems for those crops.




q

The Competencies Required for the BPA Role: An Analysis of the Kenyan Context

Aim/Purpose: This study aims to answer the research question titled What are the competencies required for the Business Process Analyst (BPA) role in organizations with ERP systems in Kenya. Through 4 hypotheses, this study focuses on two specific aspects: (1) Enhancing BPM Maturity and (2) ERP implementation. Background: The emergence of complex systems and complex processes in organizations in Kenya has given rise to the need to understand the BPM domain as well as a need to analyze the new roles within organizational environments that drive BPM initiatives. The most notable role in this domain is the BPA. Furthermore, many organizations in Kenya and across Africa are making significant investments in ERP systems. Organizations, therefore, need to understand the BPA role for ERP systems implementation projects. Methodology: This study uses a sequential mixed methods approach analyzing quantitative survey data followed by the analysis of qualitative interview data. Contribution: The main contribution of this study is a description of competencies that are critical for the BPA in Kenya both in terms of enhancing BPM maturity and for driving ERP systems implementations. In addition, this study sheds light on critical BPA competencies that are perceived to be undervalued in the Kenyan context. Findings: Findings show that business process orchestration competencies are important for driving BPM maturity and for ERP systems implementations. This study found that business process elicitation, business analysis, business process improvement and a holistic overview of business thinking are often overlooked as critical competencies for BPAs but are nevertheless critical for building the BPA practitioner. Recommendations for Practitioners: From this study, practitioners such as top managers and BPAs can be enlightened on the specific competencies that require focus when carrying out BPM and when implementing ERP systems projects. Future Research: The next step is to investigate the interventions that organizations implement to build their BPA competencies. The main aim of this would be to describe those interventions that impact the requisite BPA competencies especially those competencies that were seen to be undervalued within the Kenyan context.




q

Transition to First Year University Study: A Qualitative Descriptive Study on the Psychosocial and Emotional Impacts of a Science Workshop

Aim/purpose The purpose of this article is to discuss the psychosocial and emotional outcomes of an introductory health science workshop designed to support and assist incoming health science students before starting their university study.   Background For the past two decades, a South Australian university offered an on-campus face to face workshop titled ‘Preparation for Health Sciences’ to incoming first-year students from eleven allied health programs such as Nursing, Physiotherapy and Medical Imaging. While many were locals, a good number came from regional and rural areas, and many were international students also. They consisted of both on-campus and off-campus students.   The workshop was created as a new learning environment that was available for students of diverse age groups, educational and cultural backgrounds to prepare them to study sciences. The content of the four-day workshop was developed in consultation with the program directors of the allied health programs. The objectives were to: introduce the assumed foundational science knowledge to undertake health sciences degree; gain confidence in approaching science subjects; experience lectures and laboratory activities; and become familiar with the University campus and its facilities. The workshop was delivered a week before the orientation week, before first-year formal teaching weeks. The topics covered were enhancing study skills, medical and anatomical terminology, body systems, basic chemistry and physics, laboratory activities, and assessment of learning.   Methodology In order to determine the outcomes of the workshop, a survey was used requiring participants to agree or disagree about statements concerning the preparatory course and answer open-ended questions relating to the most important information learned and the best aspects of the workshop. Several students piloted this questionnaire before use in order to ascertain the clarity of instructions, terminology and statements. The result of the 2015-2018 pre- and post-evaluation showed that the workshop raised confidence and enthusiasm in commencing university and that the majority considered the workshop useful overall. The findings of the survey are drawn upon to examine the psychosocial and emotional impacts of the workshop on participants. Using secondary qualitative analysis, the researchers identified the themes relating to the psychosocial and emotional issues conveyed by the participants.   Contribution The contributions of the article are in the areas of improving students’ confidence to complete their university degrees and increasing the likelihood of academic success. Findings Of the 285 students who participated in the workshops from 2015 to 2018, 166 completed the survey conducted at the conclusion of the initiative, representing a 58% response rate. The workshops achieved the objectives outlined at the outset. While there were many findings reported (Thalluri, 2016), the results highlighted in this paper relate to the psychosocial and emotional impacts of the workshop on students. Three themes emerged, and these were Increased preparedness and confidence; Networking and friendships that enhanced support, and Reduced anxiety to study sciences. Some drawbacks were also reported including the cost, time and travel involved. Recommendations for practitioners Students found the introductory workshop to be psychosocially and emotionally beneficial. It is recommended that the same approach be applied for teaching other challenging fields such as mathematics and physics within the university and in other contexts and institutions. Recommendations for researchers Improving and extending the workshop to provide greater accessibility and autonomy is recommended. A longitudinal study to follow up the durability of the workshop is also proposed. Impact on society The impacts in the broader community include: higher academic success for students; improved mental health due to social networking and friendship groups and reduced anxiety and fear; reduced dropout rate in their first year; greater potential to complete educational degrees; reduced wastage in human and financial resources; and increased human capital. Future research Addressing the limitations of cost, time and travel involved, and following-up with the participants’ academic and workplace performance are future directions for research.




q

Assessing the Graphic Questionnaire Used in Digital Literacy Training

Aim/Purpose: To capture digital training experiences, the paper introduces a novel data collection method – a graphic questionnaire. It aims to demonstrate the opportunities and limitations of this tool for collecting feedback from socially disadvantaged participants of digital literacy training about their progress. Background: In training of digital skills for disadvantaged audiences through informal educational interventions, it is important to get sufficient knowledge on factors that lead to their progress in the course of training. There are many tools to measure the achievements of formal education participants, but assessing the effectiveness of informal digital skills training is researched less. The paper introduces a small-scale case study of the training programme aimed at the developing of reading and digital skills among the participants from three socially disadvantaged groups – people with hearing impairments, children from low income families, and elderly persons. The impact of the training on participants was evaluated using different tools, including a short graphic questionnaire to capture the perceptions of the participants after each training. Methodology: We performed a thematic analysis of graphic questionnaires collected after each training session to determine how the students perceived their progress in developing literacy and digital skills. Contribution The findings of the paper can assist in designing assessment of digital literacy programmes that focus not only on final results, but also on the process of gaining digital skills and important factors that facilitate progress. Findings: The graphic questionnaire allowed the researchers to get insights into the perception of acquired skills and progressive achievements of the participants through rich self-reports of attitudes, knowledge gained, and activities during training sessions. However, the graphic questionnaire format did not allow the collection of data about social interaction and cooperation that could be important in learning. Recommendations for Practitioners: Graphic questionnaires are useful and easy-to-use tools for getting rich contextual information about the attitudes, behaviour, and acquisition of knowledge in digital literacy training. They can be used in applied assessments of digital literacy training in various settings. Their simplicity can appeal to respondents; however, in the long-run interest of respondents in continuing self-reports should be sustained by additional measures. Recommendations for Researchers: Researcher may explore the variety of simple and attractive research instruments, such as “honeycomb” questionnaires and similar, to facilitate data collection and saturate feedback with significant perception of personal experiences in gaining digital literacy skills. Impact on Society: Designing effective digital literacy programmes, including engaging self-assessment methods and tools, aimed at socially disadvantaged people will contribute to their digital inclusion and to solving the issues of digital divide. Future Research: Exploration of diverse research methods and expanding the research toolset in assessing digital literacy training could advance our understanding of important processes and factors in gaining digital skills.




q

Agile Requirements Engineering: An Empirical Analysis and Evidence from a Tertiary Education Context

Aim/Purpose: The study describes empirical research into agile Requirements Engineering (RE) practices based on an analysis of data collected in a large higher education organization. Background: Requirements Engineering (RE) in agile development contexts is considerably different than in traditional software development. The field of agile RE is still nascent where there is a need to evaluate its impact in real-world settings. Methodology: Using a case study methodology, the study involved interviewing nine experienced software practitioners who reflected on the use and implementation of various agile RE practices in two software development projects of a student management system. Contribution: The primary contribution of the paper is the evaluation of agile RE practices in a large tertiary educational organization. Based on the analysis of the data, it provides valuable insights into the practice of agile RE in a specific context (i.e., education), but just as importantly, the ones that were omitted or replaced with others and why. Findings: While the evolutionary and iterative approach to defining requirements was followed in general, not all agile practices could be fully adhered to in the case organization. Although face-to-face communication with the customers has been recognized as one the most important agile RE practices, it was one of the most difficult practices to achieve with a large and diverse customer base. Addressing people issues (e.g., resistance to change, thinking, and mindset) was found to be a key driver to following the iterative RE process effectively. Contrary to the value-based approach advocated in the literature, the value-based approach was not strictly adhered to in requirements prioritization. Continuous integration was perceived to be a more beneficial practice than prototyping, as it allows frequent integration of code and facilitates delivering working software when necessary. Recommendations for Practitioners: Our study has important implications for practitioners. Based on our empirical analysis, we provide specific recommendations for effective implementation of agile RE practices. For example, our findings suggest that practitioners could address the challenges associated with limited face-to-face communication challenges by producing flexible, accessible, and electronic documentation to enable communication. Recommendations for Researchers: Researchers can use the identified agile RE practices and their variants to per-form in-depth investigations into agile requirements engineering in other educational contexts. Impact on Society: There are a number of new technologies that offer exciting new opportunities that can be explored to maximize the benefits of agile and other requirements techniques. Future Research: Future research could conduct case studies in different contexts and thus con-tribute to developing bundles or collections of practices to improve software development processes in specific contexts.




q

Retail Quest: Student Perceptions of a Virtual Field Trip App

Aim/Purpose: Two popular methods for encouraging active learning are Augmented Reality (AR) and Virtual Field Trips (VFTs). This exploratory case study examines college students’ perceptions of a prototype AR and VFT app as an active learning strategy. Background: AR allows students to learn as they physically explore a destination, while VFTs give students the opportunity to visit exciting destinations without leaving their homes. AR and VFTs promote active learning, which has been shown to increase college student success in Science, Technology, Engineering, and Math (STEM) courses. The aim of the VFT app in this study is to provide college students in a STEM course with an interactive lesson on modeling information systems using diagrams. Methodology: This exploratory case study is intended to serve as a condensed case study performed with the prototype version of a VFT app before implementing a large-scale investigation of students’ perceptions of a more refined version of the app. The study employed a qualitative approach involving a survey with open-ended questions to gather college students’ perceptions of learning with a VFT. The data were analyzed using inductive coding. The participants are students at a mid-sized, urban, public university. Contribution: This exploratory case study serves as a proof-of-concept and starting point for other faculty who may be interested in developing their own AR and VFT apps to engage students in active learning. Releasing the app to a common Open Educational Resources (OER) repository will give other faculty easy access to re-use the app and build upon it to create their own virtual field trips. OER are learning materials that are freely available for students and faculty to download and use in their coursework. Findings: Students overwhelmingly perceived the VFT app helped them learn about the subject that was presented, citing the visual nature of the app, the real-life scenarios presented in the app, and the app’s ease of use as reasons why. The majority (over 89%) also agreed that the app motivated them to learn more about the subject, mainly due to the app’s real-life scenarios, and over 83% of students cited at least one benefit to learning with the app, such as the navigation/location features, the easy-to-use interface, and the real-world scenarios. Recommendations for Practitioners: The pedagogical implications of this study are that faculty should adopt VFTs as an active learning strategy, particularly in STEM college courses, based on the students’ positive perceptions of learning, motivation, and benefits of VFTs. Recommendations for Researchers: Researchers can expand on this exploratory case study by conducting a larger-scale study of the VFT app employed in the case study, or by developing their own VFT app based on the one in this study, to capture a broader group of students’ perceptions of VFTs as an active learning strategy. Impact on Society: The broad impact of this research on society is encouraging the adoption of VFTs as an active learning strategy since active learning strategies are shown to increase college students’ success and engagement. Future Research: Future research will be conducted in subsequent terms to gather additional data on students’ perceptions of the VFT app, as well as their perceptions of the relationship between learning and the VFT technology. Further research is also needed to survey faculty on their perceptions of how engaging with the app impacts student learning, particularly in regards to the VFT technology within the app.




q

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




q

TQM for Information Systems: Are Indian Organizations Ready?




q

Adaptation of a Cluster Discovery Technique to a Decision Support System




q

The Technology Ownership and Information Acquisition Habits of HBCU Freshmen




q

Towards Network Perspective of Intra-Organizational Learning: Bridging the Gap between Acquisition and Participation Perspective




q

Framework for Quality Metrics in Mobile-Wireless Information Systems




q

User Acceptance of the E-Government Services in Malaysia: Structural Equation Modelling Approach




q

Information Quality and Absorptive Capacity in Service and Product Innovation Processes




q

Assessment of Quality of Warranty Policy




q

Using Research Techniques to Teach Management of IT Concepts to Postgraduate Business Students




q

A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research




q

The Generalized Requirement Approach for Requirement Validation with Automatically Generated Program Code




q

A Qualitative Descriptive Analysis of Collaboration Technology in the Navy

Collaboration technologies enable people to communicate and use information to make organizational decisions. The United States Navy refers to this concept as information dominance. Various collaboration technologies are used by the Navy to achieve this mission. This qualitative descriptive study objectively examined how a matrix oriented Navy activity perceived an implemented collaboration technology. These insights were used to determine whether a specific collaboration technology achieved a mission of information dominance. The study used six collaboration themes as a foundation to include: (a) Cultural intelligence, (b) Communication, (c) Capability, (d) Coordination, (e) Cooperation, and (f) Convergence. It was concluded that collaboration technology was mostly perceived well and helped to achieve some levels of information dominance. Collaboration technology improvement areas included bringing greater awareness to the collaboration technology, revamping the look and feel of the user interface, centrally paying for user and storage fees, incorporating more process management tools, strategically considering a Continuity of Operations, and incorporating additional industry best practices for data structures. Emerging themes of collaboration were collected to examine common patterns identified in the collected data. Emerging themes included acceptance, awareness, search, scope, content, value, tools, system performance, implementation, training, support, usage, structure, complexity, approach, governance/configuration management/policy, and resourcing.




q

Knowledge Capture and Acquisition Mechanisms at Kisii University

Knowledge management and knowledge assets have gained much prominence in recent years and are said to improve organizational performance. Knowledge capture and acquisition mechanisms enhance organizational memory and performance. However, knowledge capture and acquisition mechanisms in higher education institutions are not well known. The aim of this study was to investigate the knowledge capture and acquisition mechanisms at Kisii University. This was a case study in which data were collected through interviews and questionnaires. Purposive sampling was used to determine interview participants while questionnaire respondents were selected through stratified random sampling. Qualitative and quantitative data were analysed using SPSS® student version 14; it revealed that there were various knowledge capture and acquisition mechanisms at Kisii University. It was also established that the University encountered various challenges in knowledge capture and acquisition and lacked some essential knowledge capture and acquisition mechanisms. In this regard, this study proposed knowledge capture and acquisition guidelines that may be adopted by the University to enhance its organizational memory and performance.




q

Text Classification Techniques: A Literature Review

Aim/Purpose: The aim of this paper is to analyze various text classification techniques employed in practice, their strengths and weaknesses, to provide an improved awareness regarding various knowledge extraction possibilities in the field of data mining. Background: Artificial Intelligence is reshaping text classification techniques to better acquire knowledge. However, in spite of the growth and spread of AI in all fields of research, its role with respect to text mining is not well understood yet. Methodology: For this study, various articles written between 2010 and 2017 on “text classification techniques in AI”, selected from leading journals of computer science, were analyzed. Each article was completely read. The research problems related to text classification techniques in the field of AI were identified and techniques were grouped according to the algorithms involved. These algorithms were divided based on the learning procedure used. Finally, the findings were plotted as a tree structure for visualizing the relationship between learning procedures and algorithms. Contribution: This paper identifies the strengths, limitations, and current research trends in text classification in an advanced field like AI. This knowledge is crucial for data scientists. They could utilize the findings of this study to devise customized data models. It also helps the industry to understand the operational efficiency of text mining techniques. It further contributes to reducing the cost of the projects and supports effective decision making. Findings: It has been found more important to study and understand the nature of data before proceeding into mining. The automation of text classification process is required, with the increasing amount of data and need for accuracy. Another interesting research opportunity lies in building intricate text data models with deep learning systems. It has the ability to execute complex Natural Language Processing (NLP) tasks with semantic requirements. Recommendations for Practitioners: Frame analysis, deception detection, narrative science where data expresses a story, healthcare applications to diagnose illnesses and conversation analysis are some of the recommendations suggested for practitioners. Recommendation for Researchers: Developing simpler algorithms in terms of coding and implementation, better approaches for knowledge distillation, multilingual text refining, domain knowledge integration, subjectivity detection, and contrastive viewpoint summarization are some of the areas that could be explored by researchers. Impact on Society: Text classification forms the base of data analytics and acts as the engine behind knowledge discovery. It supports state-of-the-art decision making, for example, predicting an event before it actually occurs, classifying a transaction as ‘Fraudulent’ etc. The results of this study could be used for developing applications dedicated to assisting decision making processes. These informed decisions will help to optimize resources and maximize benefits to the mankind. Future Research: In the future, better methods for parameter optimization will be identified by selecting better parameters that reflects effective knowledge discovery. The role of streaming data processing is still rarely explored when it comes to text classification.




q

Investigating Knowledge Acquisition among Faculty Members

Aim/Purpose: This study investigates the issue of knowledge acquisition among faculty members. Background: The paper reports the use of knowledge acquisition tools and reading knowledge sources by faculty members. It also identifies demographic differ-ences among participants in using knowledge acquisition tools and reading knowledge sources. Methodology: The study used an online survey-based questionnaire tool for data collection. The participants consisted of 300 faculty members from 26 academic institu-tions in UAE. Statistical tests are used to verify and validate the hypotheses. Contribution: The paper represents one of the few empirical studies conducted on knowledge acquisition among faculty members in the GCC countries. Find-ings of the study may contribute to the theoretical and practical understanding of knowledge acquisition among faculty members. Findings: Findings of the study revealed that medical faculty members read knowledge acquisition sources more than other faculty members. Likewise, IT faculty members use knowledge acquisition tools more than other faculty members. Results of the study supported stage three of knowledge acquisition proposed in the “Stage Theory of Knowledge Consumption Growth” (Mathew, 1985). The study found that journals are the most sources read by the participants while web-based training (WBT) tools are the most used knowledge acquisition tools among faculty members. Results of the study indicated significant differ-ences among faculty members of different age groups, academic ranks, aca-demic specializations, and institutional affiliation in reading knowledge sources. Likewise, findings of the study revealed significant difference among partici-pants of different academic specializations in using knowledge acquisition tools. Recommendations for Practitioners: Results of the study could be extrapolated to other faculty members in the GCC countries. Recommendation for Researchers: More researches could be done to address different issues of knowledge acquisition among faculty members. Impact on Society: Faculty reading of knowledge sources and use of knowledge acquisition tools may have direct or indirect positive impacts on innovation, creativity, and re-search productivity in any society. Future Research: It will be interesting to apply more than one data collection method in the future research.




q

Contextualist Inquiry into E-Commerce Institutionalization in Developing Countries: The Case of Mozambican Women-led SMMES

Aim/Purpose: This study explores how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce by focusing on the ongoing interaction between the SMME, its context, and process of e-commerce institutionalization. Background: It is believed that institutionalization of e-commerce provides significant benefits of unlimited access to new markets, and access to new, improved, inexpensive and convenient operational methods of transacting. Although prior studies have examined the adoption of e-commerce and the enabling and constraining factors, few have examined e-commerce (i) institutionalization (that is, post-adoption), and (ii) from a gender perspective. This study aims to respond to this paucity in the literature by exploring how women-led SMMEs in developing countries, specifically in the Mozambican context, institutionalise e-commerce. Methodology: The study follows a qualitative inquiry approach for both data collection and analysis. Semi-structured interviews were adopted for data collection and thematic analysis implemented on the data. SMMEs were purposively sampled to allow for the selection of information-rich SMMEs for study and specifically those that have gone through the experience of adoption and in some cases have institutionalized e-commerce. Contribution: The empirical findings explain how the institutionalization process from interactive e-commerce to transactive e-commerce unfolds in the Mozambican context. Findings: Transition from interactive to transactive e-commerce is firstly influenced by (i) the type of business the SMME is engaged in; and (ii) customer and trading partner’s readiness for e-commerce. Secondly, the transition process is influenced by the internal factors of (i) manager’s demographic factors; (ii) mimetic behaviour arising from exposure to (foreign) organizations in the same industry that have mature forms of e-commerce; (iii) the business networks developed with some of these organizations that have mature forms of e-commerce; (iv) access to financial resources; and (v) social media technologies. Thirdly, the process is influenced by external contextual factors of (i) limited government intervention towards e-commerce endeavors; (ii) limited to lack of financial institutions readiness for e-commerce; (iii) lack of local available IT expertise; (iv) consumer’s low purchasing power due to economic recessions; (vi) international competitive pressure; and (vii) sociocultural practices. Recommendations for Practitioners: The study provides SMME managers, practitioners, and other stakeholders concerned with women’s development with a better understanding of the process in order to develop appropriate policies and interventions that are suitable for the reality of women-led SMMEs in Mozambique and other developing countries with similar contextual characteristics. Recommendation for Researchers: The study contributes to the existing debate of e-commerce and the use of ICT for development in developing countries by providing a distinct contribution of the institutionalization process and how the contextual structures influence this process. Impact on Society: Women-led SMME managers can learn from the different experiences, and compare their e-commerce efforts with SMMEs that were able to institutionalize and make strategies for improvements within their organizations. Future Research: The manner in which women-led SMMEs employ e-commerce requires further investigation to understand how issues related to gender, the cultural context, and different regions or countries impact this process.




q

Improving Webpage Access Predictions Based on Sequence Prediction and PageRank Algorithm

Aim/Purpose: In this article, we provide a better solution to Webpage access prediction. In particularly, our core proposed approach is to increase accuracy and efficiency by reducing the sequence space with integration of PageRank into CPT+. Background: The problem of predicting the next page on a web site has become significant because of the non-stop growth of Internet in terms of the volume of contents and the mass of users. The webpage prediction is complex because we should consider multiple kinds of information such as the webpage name, the contents of the webpage, the user profile, the time between webpage visits, differences among users, and the time spent on a page or on each part of the page. Therefore, webpage access prediction draws substantial effort of the web mining research community in order to obtain valuable information and improve user experience as well. Methodology: CPT+ is a complex prediction algorithm that dramatically offers more accurate predictions than other state-of-the-art models. The integration of the importance of every particular page on a website (i.e., the PageRank) regarding to its associations with other pages into CPT+ model can improve the performance of the existing model. Contribution: In this paper, we propose an approach to reduce prediction space while improving accuracy through combining CPT+ and PageRank algorithms. Experimental results on several real datasets indicate the space reduced by up to between 15% and 30%. As a result, the run-time is quicker. Furthermore, the prediction accuracy is improved. It is convenient that researchers go on using CPT+ to predict Webpage access. Findings: Our experimental results indicate that PageRank algorithm is a good solution to improve CPT+ prediction. An amount of though approximately 15 % to 30% of redundant data is removed from datasets while improving the accuracy. Recommendations for Practitioners: The result of the article could be used in developing relevant applications such as Webpage and product recommendation systems. Recommendation for Researchers: The paper provides a prediction model that integrates CPT+ and PageRank algorithms to tackle the problem of complexity and accuracy. The model has been experimented against several real datasets in order to show its performance. Impact on Society: Given an improving model to predict Webpage access using in several fields such as e-learning, product recommendation, link prediction, and user behavior prediction, the society can enjoy a better experience and more efficient environment while surfing the Web. Future Research: We intend to further improve the accuracy of webpage access prediction by using the combination of CPT+ and other algorithms.




q

The Nexus Between Learning Orientation, TQM Practices, Innovation Culture, and Organizational Performance of SMEs in Kuwait

Aim/Purpose: This paper aimed to examine the impact of learning orientation on organizational performance of small and medium enterprises (SMEs) via the mediating role of total quality management (TQM) practices and the moderating role of innovation culture. Background: SMEs’ organizational performance in developing countries, particularly in Kuwait, remains below expectation due to increasing competition and inadequate managerial practices that negatively impact their performance. Although several studies had revealed a significant effect of learning orientation on SMEs’ performance, the direct impact of learning orientation on their performance is still unclear. Thus, the link between learning orientation and organizational performance remains inconclusive and requires further examination. Methodology: This study adopted a quantitative approach based on a cross-sectional survey and descriptive design to gather the data in a specific period. The data were collected by distributing a survey questionnaire to the owners and Chief Executive Officers (CEOs) of Kuwaiti SMEs using online and on-hand instruments with 384 useable data obtained. Furthermore, the partial least square-structural equation modeling (PLS-SEM) analysis was performed to test the hypotheses. Contribution: This study bridged the significant gap in the role of learning orientation on SMEs’ performance in developing countries, specifically Kuwait. In this sense, a conceptual model was introduced, comprising a learning orientation, TQM practices, innovation culture, and organizational performance. In addition, this study confirmed the significant influence of TQM practices and innovation culture as intermediate variables in strengthening the relationship between learning orientation and organizational performance, which has not yet been verified in Kuwait. Findings: The results in this study revealed that learning orientation had a significant impact on organizational performance of SMEs in Kuwait. It could be observed that TQM practices play an important role in mediating the relationship between learning orientation and performance of SMEs, as well as that innovation culture plays an important moderating role in the same relation. Recommendations for Practitioners: This study provided a framework for the decision-makers of SMEs on the significant impact of the antecedents that enhanced the level of organizational performance. Hence, owners/CEOs of SMEs should improve their awareness and knowledge of the importance of learning orientation, TQM practices, and innovation culture since it could significantly influence their performance to achieve success and sustainability when adopted and managed systematically. The CEOs should also consider building an innovation culture in the internal environment, which enables them to transform new knowledge and ideas into innovative methods and practices. Recommendation for Researchers: The results in this study highlighted the mediating effect of TQM practices on the relationship between learning orientation (the independent variable) and organizational performance (the dependent variable) of SMEs and the moderating effect of innovation culture in the same nexus. These relationships were not extensively addressed in SMEs and thus required further validation. Impact on Society: This study also influenced the management strategies and practices adopted by entrepreneurs and policymakers working in SMEs in developing countries, which is reflected in their development and the national economy. Future Research: Future studies should apply the conceptual framework of this study and assess it further in other sectors, including large firms in developing and developed countries, to generalize the results. Additionally, other mechanisms should be introduced as significant antecedents of SMEs’ performance, such as market orientation, technological orientation, and entrepreneurial orientation, which could function with learning orientation to influence organizational performance effectively.




q

The Influence of Crisis Management, Risk-Taking, and Innovation in Sustainability Practices: Empirical Evidence From Iraq

Aim/Purpose: This study examines the impact of decision-making, crisis management, and decision-making on sustainability through the mediation of open innovation in the energy sector. Background: Public companies study high-performance practices, requiring overcoming basic obstacles such as financial crises that prevent the adoption and development of sustainability programs. Methodology: Due to the COVID-19 pandemic, which has led to the closure of businesses in Iraq, a survey was distributed. To facilitate responses, free consultations were offered to help complete the questionnaire quickly. Of the 435 questionnaires answered, 397 were used for further analysis. Contribution: The impact of crises that impede the energy sector from adopting sustainable environmental regulations is investigated in this study. Its identification of specific constraints to open innovation leads to the effectiveness of adopting environmentally friendly policies and reaching high levels of sustainable performance. Findings: The impacts of risk-taking, crisis management, and decision-making on sustainability have been explored. Results show that open innovation fully mediates the relationship between the factors of risk-taking, crisis management, decision-making, and sustainability. Recommendations for Practitioners: The proposed model can be used by practitioners to develop and improve sustainable innovation practices and achieve superior performance. Recommendation for Researchers: Researchers are recommended to conduct in-depth studies of the phenomenon based on theoretical and empirical foundations, especially in light of the relationship between crisis management, decision-making, and risk-taking and their impact on sustainability based on linear and non-compensatory relationships. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in adopting sustainable practices to minimize pollution in the Iraqi context. Future Research: A more in-depth study can be performed using a larger sample, which not only includes the energy industry but also other industries.




q

Determinants of Online Behavior Among Jordanian Consumers: An Empirical Study of OpenSooq

Aim/Purpose: This study identifies the elements that influence intentions to purchase from the most popular Arabic online classifieds platform, OpenSooq.com. Background: Online purchasing has become popular among consumers in the past two decades, with perceived risk and trust playing key roles in consumers’ intention to purchase online. Methodology: A questionnaire survey was conducted of Internet users from three Jordanian districts to investigate how they used the OpenSooq platform in their e-commerce activities. In total, 202 usable responses were collected, and the data were analyzed with PLS-SEM for hypothesis testing and model validation. Contribution: Though online trading is increasingly popular, the factors that impact the behavior of consumers when purchasing high-value products have not been adequately investigated. Therefore, this study examined the factors affecting perceived risk, and the potential impact of privacy concerns on the perceived risk of online smartphone buyers. The study framework can help explore online behavior in various situations to ascertain similarities and differences and probe other aspects of online buying. Findings: Perceived risk negatively correlates with online purchasing behavior and trust. However, privacy concern and perceived risk, transaction security and trust, and trust and online purchasing behavior exhibited positive correlations. Recommendations for Practitioners: Customers can complete and retain online purchases in a range of settings illuminated in this study’s methods and procedures. Moreover, businesses can manage their IT arrangements to make Internet shopping more convenient and build processes for online shopping that allow for engagement, training, and ease of use, thus improving their customers’ online purchasing behavior. Recommendation for Researchers: Given the insight into the understanding and integration of variables including perceived risk, privacy issues, trust, transaction security, and online purchasing behavior, academics can build on the groundwork of this research paradigm to investigate underdeveloped countries, particularly Jordan, further. Impact on Society: Understanding the characteristics that influence online purchasing behavior can help countries realize the full potential of online shopping, particularly the benefits of safe, fast, and low-cost financial transactions without the need for an intermediary. Future Research: Future research can examine the link between online purchase intent, perceived risk, privacy concerns, trust, and transaction security to see if the findings of this study in Jordan can be applied to a broader context in other countries.




q

Multiple Models in Predicting Acquisitions in the Indian Manufacturing Sector: A Performance Comparison

Aim/Purpose: Acquisitions play a pivotal role in the growth strategy of a firm. Extensive resources and time are dedicated by a firm toward the identification of prospective acquisition candidates. The Indian manufacturing sector is currently experiencing significant growth, organically and inorganically, through acquisitions. The principal aim of this study is to explore models that can predict acquisitions and compare their performance in the Indian manufacturing sector. Background: Mergers and Acquisitions (M&A) have been integral to a firm’s growth strategy. Over the years, academic research has investigated multiple models for predicting acquisitions. In the context of the Indian manufacturing industry, the research is limited to prediction models. This research paper explores three models, namely Logistic Regression, Decision Tree, and Multilayer Perceptron, to predict acquisitions. Methodology: The methodology includes defining the accounting variables to be used in the model which have been selected based on strong theoretical foundations. The Indian manufacturing industry was selected as the focus, specifically, data for firms listed in the Bombay Stock Exchange (BSE) between 2010 and 2022 from the Prowess database. There were multiple techniques, such as data transformation and data scrubbing, that were used to mitigate bias and enhance the data reliability. The dataset was split into 70% training and 30% test data. The performance of the three models was compared using standard metrics. Contribution: The research contributes to the existing body of knowledge in multiple dimensions. First, a prediction model customized to the Indian manufacturing sector has been developed. Second, there are accounting variables identified specific to the Indian manufacturing sector. Third, the paper contributes to prediction modeling in the Indian manufacturing sector where there is limited research. Findings: The study found significant supporting evidence for four of the proposed hypotheses indicating that accounting variables can be used to predict acquisitions. It has been ascertained that statistically significant variables influence acquisition likelihood: Quick Ratio, Equity Turnover, Pretax Margin, and Total Sales. These variables are intrinsically linked with the theories of liquidity, growth-resource mismatch, profitability, and firm size. Furthermore, comparing performance metrics reveals that the Decision Tree model exhibits the highest accuracy rate of 62.3%, specificity rate of 66.4%, and the lowest false positive ratio of 33.6%. In contrast, the Multilayer Perceptron model exhibits the highest precision rate of 61.4% and recall rate of 64.3%. Recommendations for Practitioners: The study findings can help practitioners build custom prediction models for their firms. The model can be developed as a live reference model, which is continually updated based on a firm’s results. In addition, there is an opportunity for industry practitioners to establish a benchmark score that provides a reference for acquisitions. Recommendation for Researchers: Researchers can expand the scope of research by including additional classification modeling techniques. The data quality can be enhanced by cross-validation with other databases. Textual commentary about the target firms, including management and analyst quotes, provides additional insight that can enhance the predictive power of the models. Impact on Society: The research provides insights into leveraging emerging technologies to predict acquisitions. The theoretical basis and modeling attributes provide a foundation that can be further expanded to suit specific industries and firms. Future Research: There are opportunities to expand the scope of research in various dimensions by comparing acquisition prediction models across industries and cross-border and domestic acquisitions. Additionally, it is plausible to explore further research by incorporating non-financial data, such as management commentary, to augment the acquisition prediction model.




q

The Influence of Ads’ Perceived Intrusiveness in Geo-Fencing and Geo-Conquesting on Purchase Intention: The Mediating Role of Customers’ Attitudes

Aim/Purpose: This study focuses on two targeting strategies of out-store Location-Based Mobile Advertising (LBMA): the geo-fencing strategy (i.e., targeting customers who are near the focal store) and the geo-conquesting strategy (i.e., targeting those who are near competitors’ stores to visit the focal store). To the authors’ knowledge, no previous studies have compared the perceived intrusiveness of advertisements (ads) in geo-fencing and geo-conquesting settings, despite the accumulating literature on out-store LBMA. Hence, the aim of this study is to determine which targeting strategy is more effective in terms of reducing the perception of ads’ intrusiveness and increasing positive customers’ attitudes and purchase intention. Background: The intrusive nature of LBMA is perceived negatively by some customers, impacting their attitudes toward the ad, purchase intention, and even their perception of the brand. Therefore, identifying the targeting strategy under which ads are perceived as less intrusive is essential. Additionally, brick-and-mortar clothing stores in Jordan are facing challenges due to the rise of online shopping and increased competition from nearby stores. Thus, examining geo-fencing and geo-conquesting might tackle these challenges and encourage local clothing retailers to adopt these strategies. Methodology: A quantitative method was used in this study. A between-subjects experimental design was used to collect the data using a scenario-based survey distributed to Jordanians aged 18 to 45. A total of 531 responses were collected. After excluding those who do not belong to the targeted age group and those who did not pass the manipulation check, 406 responses were analyzed using the Statistical Package for the Social Sciences (SPSS) software version 28 and the Analysis of Moment Structures (AMOS) software version 26 to conduct Structural Equation Modeling (SEM). Contribution: This work offers valuable contributions by investigating the impact of the perceived intrusiveness of ads on purchase intention in the contexts of geo-fencing and geo-conquesting, which has not been studied before. Additionally, it fills a gap by examining this phenomenon in Jordan, a developing country in which attitudes toward LBMA have not been previously explored. Findings: The results revealed that location-based mobile ads sent under a geo-fencing strategy are perceived as less intrusive than those sent under a geo-conquesting strategy. In addition, customers’ attitudes fully mediate the relationship between intrusiveness and purchase intention only under the geo-fencing strategy. Ultimately, neither of the strategies is more effective in terms of increasing positive customer attitudes and purchase intentions in the context of clothing retail stores in Jordan. Recommendations for Practitioners: Clothing retailers in Jordan should consider adopting geo-fencing and geo-conquesting strategies to boost purchase intentions and tackle industry challenges. Additionally, to increase purchase intentions with geo-fencing, practitioners should focus on fostering positive customer attitudes toward ads, as simply perceiving them as less intrusive is not sufficient to drive purchase intention without the mediating effect of positive attitudes. Recommendation for Researchers: This research is crucial for academics and researchers as geolocation technology and LBMA are expected to advance significantly in the future. Researchers can investigate this topic through a randomized field experiment, followed by a research questionnaire to collect data from a real-world setting. Impact on Society: Utilizing LBMA is essential for local clothing retail stores that are trying to effectively reach and connect with their customers because searching the Internet for local goods and services is done primarily on mobile devices. Indeed, this study revealed that customers in both settings (i.e., geo-fencing and geo-conquesting) reported a high intention to visit the promoting store and to purchase from the advertised product category. Future Research: Future research can apply this topic to different industries and cultural contexts, as the results may vary across industries and regions. Moreover, future research could build on this study by investigating additional constructs, such as product category involvement, customization, and content type of the message (e.g., informative, entertaining).




q

Barriers of Agile Requirements Engineering in the Public Sector: A Systematic Literature Review

Aim/Purpose: The objective of this study is to summarize the challenges of Agile Requirements Engineering (Agile RE) in the public sector in republican and constitutional monarchy nations. Additionally, it offers recommendations to address these challenges. Background: Failure of IT projects in the public sector results in financial losses for the state and loss of public trust, often attributed to issues in requirements engineering such as prioritization of user needs and excessive scope of requirements. IT projects can have a higher success rate with Agile RE, but there are also drawbacks. Therefore, this study holds significance by presenting a thorough framework designed to pinpoint and overcome the challenges associated with Agile RE to increase the success rate of IT projects. Methodology: This study employs a Systematic Literature Review (SLR) protocol in the field of software engineering or related domains, which consists of three main phases: planning the review, conducting the review with a snowballing approach, and reporting the review. Furthermore, the authors perform open coding to categorize challenges based on the Agile methodologies adoption factor model and axial coding to map potential solutions. Contribution: The authors assert that this research enriches the existing literature on Agile RE, specifically within the public sector context, by mapping out challenges and possible solutions that contribute to creating a foundation for future studies to conduct a more in-depth analysis of Agile adoption in the public sector. Furthermore, it compares the barriers of Agile RE in the public sector with the general context, leading to the discovery of new theories specifically for this field. Findings: Most challenges related to Agile RE in the public sector are found in the people and process aspects. Project and organizational-related are subsequent aspects. Therefore, handling people and processes proficiently is imperative within Agile RE to prevent project failure. Recommendations for Practitioners: Our findings offer a comprehensive view of Agile RE in the public sector in republican and constitutional monarchy nations. This study maps the challenges encountered by the public sector and provides potential solutions. The authors encourage practitioners to consider our findings as a foundation for adopting Agile methodology in the public sector. Furthermore, this study can assist practitioners in identifying existing barriers related to Agile RE, pinpointing elements that contribute to overcoming those challenges, and developing strategies based on the specific needs of the organizations. Recommendation for Researchers: Researchers have the potential to expand the scope of this study by conducting research in other countries, especially African countries, as this study has not yet encompassed this geographic region. Additionally, they can strengthen the evidence linking Agile RE challenges to the risk of Agile project failure by performing empirical validation in a specific country. Impact on Society: This research conducts a comprehensive exploration of Agile RE within the public sector, serving as a foundation for the successful adoption of Agile methodology by overcoming obstacles related to Agile RE. This study highlights the importance of managing people, processes, projects, and organizational elements to increase the success of Agile adoption in the public sector. Future Research: In the future, researchers should work towards resolving the limitations identified in this study. This study has not provided a clear prioritization of challenges and solutions according to their significance. Therefore, future researchers can perform a Fuzzy Analytical Hierarchical Process (F-AHP) to prioritize the proposed solutions.




q

Emphasizing Data Quality for the Identification of Chili Varieties in the Context of Smart Agriculture

Aim/Purpose: This research aims to evaluate models from meta-learning techniques, such as Riemannian Model Agnostic Meta-Learning (RMAML), Model-Agnostic Meta-Learning (MAML), and Reptile meta-learning, to obtain high-quality metadata. The goal is to utilize this metadata to increase accuracy and efficiency in identifying chili varieties in smart agriculture. Background: The identification of chili varieties in smart agriculture is a complex process that requires a multi-faceted approach. One challenge in chili variety identification is the lack of a large and diverse dataset. This can be addressed using meta-learning techniques, which allow the model to leverage knowledge learned from other related tasks or artificially expand the dataset by applying transformations to existing data. Another challenge is the variation in growing conditions, which can affect the appearance of chili varieties. Meta-learning techniques can help address this challenge by allowing the model to adapt to variations in growing conditions with task-specific embeddings and optimizations. With the help of meta-learning techniques, such as data augmentation, data characterization, selection of datasets, and performance estimation, quality metadata for accurate identification of chili varieties can be achieved even in the presence of limited data and variations in growing conditions. Furthermore, the use of meta-learning techniques in chili variety identification can also assist in addressing challenges related to the computational complexity of the task. Methodology: The research approach employed is quantitative, specifically comparing three models from meta-learning techniques to determine which model is most suitable for our dataset. Data was collected from the variety assembly garden in the form of images of chili leaves using a mobile device. The research successfully gathered 1,974 images of chili leaves, with 697 images of large red chilies, 649 images of curly red chilies, and 628 images of cayenne peppers. These chili leaf images were then processed using augmentation techniques. The results of image data augmentation were categorized based on leaf characteristics (such as oval, lancet, elliptical, serrated leaf edges, and flat leaf edges). Subsequently, training and validation utilized three models from meta-learning techniques. The final stage involved model evaluation using 2-way and 3-way classification, as well as 5-shot and 10-shot learning scenarios to select the dataset with the best performance. Contribution: Improving classification accuracy, with a focus on ensuring high-quality data, allows for more precise identification and classification of chili varieties. Enhancing model training through an emphasis on data quality ensures that the models receive reliable and representative input, leading to improved generalization and performance in identifying chili varieties. Findings: With small collections of datasets, the authors have used data augmentation and meta-learning techniques to overcome the challenges of limited data and variations in growing conditions. Recommendations for Practitioners: By leveraging the knowledge and adaptability gained from meta-learning, accurate identification of chili varieties can be achieved even with limited data and variations in growing conditions. The use of meta-learning techniques in chili variety identification can greatly improve the accuracy and reliability of the identification process. Recommendation for Researchers: Using meta-learning techniques, such as transfer learning and parameter optimization, researchers can overcome challenges related to limited data and variations in growing conditions in chili variety identification. Impact on Society: The findings from this research can help identify superior chili seeds, thereby motivating farmers to cultivate high-quality chilies and achieve bountiful harvests. Future Research: We intend to verify our approach on a more extensive array of datasets and explore the implementation of more resilient regularization techniques, going beyond image augmentation, within the meta-learning techniques. Furthermore, our goal is to expand our research to encompass the automatic learning of parameters during training and tackle issues associated with noisy labels. Building on the insights gained from our observed outcomes, a future objective is to enhance the refinement of model-agnostic meta-learning techniques that can effectively adapt to intricate task distributions with substantial domain gaps between tasks. To realize this aim, our proposal involves devising model-agnostic meta-learning techniques specifically designed for multi-modal scenarios.




q

Continued Usage Intention of Mobile Learning (M-Learning) in Iraqi Universities Under an Unstable Environment: Integrating the ECM and UTAUT2 Models

Aim/Purpose: This study examines the adoption and continued use of m-learning in Iraqi universities amidst an unstable environment by extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) and Expectation-Confirmation Model (ECM) models. The primary goal is to address the specific challenges and opportunities in Iraq’s higher education institutions (HEIs) due to geopolitical instability and understand their impact on student acceptance, satisfaction, and continued m-learning usage. Background: The research builds on the growing importance of m-learning, especially in HEIs, and recognizes the unique challenges faced by institutions in Iraq, given the region’s instability. It identifies gaps in existing models and proposes extensions, introducing the variable “civil conflicts” to account for the volatile context. The study aims to contribute to a deeper understanding of m-learning acceptance in conflict-affected regions and provide insights for improving m-learning initiatives in Iraqi HEIs. Methodology: To achieve its objectives, this research employed a quantitative survey to collect data from 399 students in five Iraqi universities. PLS-SEM is used for the analysis of quantitative data, testing the extended UTAUT2 and ECM models. Contribution: The study’s findings are expected to contribute to the development of a nuanced understanding of m-learning adoption and continued usage in conflict-affected regions, particularly in the Iraqi HEI context. Findings: The study’s findings may inform strategies to enhance the effectiveness of m-learning initiatives in Iraqi HEIs and offer insights into how education can be supported in regions characterized by instability. Recommendations for Practitioners: Educators and policymakers can benefit from the research by making informed decisions to support education continuity and quality, particularly in conflict-affected areas. Recommendation for Researchers: Researchers can build upon this study by further exploring the adoption and usage of m-learning in unstable environments and evaluating the effectiveness of the proposed model extensions. Impact on Society: The research has the potential to positively impact society by improving access to quality education in regions affected by conflict and instability. Future Research: Future research can expand upon this study by examining the extended model’s applicability in different conflict-affected regions and assessing the long-term impact of m-learning initiatives on students’ educational outcomes.




q

To be intelligent or not to be? That is the question - reflection and insights about big knowledge systems: definition, model and semantics

This paper aims to share the author's vision on possible research directions for big knowledge-based AI. A renewed definition of big knowledge (BK) and big knowledge systems (BKS) is first introduced. Then the first BKS model, called cloud knowledge social intelligence (CKEI) is provided with a hierarchy of knowledge as a service (KAAS). At last, a new semantics, the big-and-broad step axiomatic structural operational semantics (BBASOS) for applications on BKS is introduced and discussed with a practical distributed BKS model knowledge graph network KGN and a mini example.




q

Scoping and Sequencing Educational Resources and Speech Acts: A Unified Design Framework for Learning Objects and Educational Discourse




q

Interactive QuickTime: Developing and Evaluating Multimedia Learning Objects to Enhance Both Face-To-Face and Distance E-Learning Environments