stem Towards Understanding Information Systems Students’ Experience of Learning Introductory Programming: A Phenomenographic Approach By Published On :: 2021-07-12 Aim/Purpose: This study seeks to understand the various ways information systems (IS) students experience introductory programming to inform IS educators on effective pedagogical approaches to teaching programming. Background: Many students who choose to major in information systems (IS), enter university with little or no experience of learning programming. Few studies have dealt with students’ learning to program in the business faculty, who do not necessarily have the computer science goal of programming. It has been shown that undergraduate IS students struggle with programming. Methodology: The qualitative approach was used in this study to determine students’ notions of learning to program and to determine their cognitive processes while learning to program in higher education. A cohort of 47 students, who were majoring in Information Systems within the Bachelor of Commerce degree programme were part of the study. Reflective journals were used to allow students to record their experiences and to study in-depth their insights and experiences of learning to program during the course. Using phenomenographic methods, categories of description that uniquely characterises the various ways IS students experience learning to program were determined. Contribution: This paper provides educators with empirical evidence on IS students’ experiences of learning to program, which play a crucial role in informing IS educators on how they can lend support and modify their pedagogical approach to teach programming to students who do not necessarily need to have the computer science goal of programming. This study contributes additional evidence that suggests more categories of description for IS students within a business degree. It provides valuable pedagogical insights for IS educators, thus contributing to the body of knowledge Findings: The findings of this study reveal six ways in which IS students’ experience the phenomenon, learning to program. These ways, referred to categories of description, formed an outcome space. Recommendations for Practitioners: Use the experiences of students identified in this study to determine approach to teaching and tasks or assessments assigned Recommendation for Researchers: Using phenomenographic methods researchers in IS or IT may determine pedagogical content knowledge in teaching specific aspects of IT or IS. Impact on Society: More business students would be able to program and improve their logical thinking and coding skills. Future Research: Implement the recommendations for practice and evaluate the students’ performance. Full Article
stem Honeybrid method for network security in a software defined network system By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs. Full Article
stem A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, while security and privacy concerns have often been overlooked. To address these issues, the authors present a novel internet of things (IoT)-based self-lecture attendance system (SLAS) that leverages smartphones and QR codes. This system effectively addresses security and privacy concerns while providing streamlined attendance tracking. It offers several advantages such as compact size, affordability, scalability, and flexible features for teachers and students. Empirical research conducted in a live lecture setting demonstrates the efficacy and precision of the SLAS system. The authors believe that their system will be valuable for educational institutions aiming to streamline attendance tracking while ensuring security and privacy. Full Article
stem International Journal of Applied Systemic Studies By www.inderscience.com Published On :: Full Article
stem International Journal of Information Systems and Change Management By www.inderscience.com Published On :: Full Article
stem International Journal of Business and Systems Research By www.inderscience.com Published On :: Full Article
stem Mobile wallet payments - a systematic literature review with bibliometric and network visualisation analysis over two decades By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 The study aims to review the literature on mobile wallet payment and align research trends using a systematic literature review with bibliometric and network visualisation analysis over two decades. It uses bibliometric analysis of the literature research retrieved from the Web of Science database. The study period was from 2001 to 2021, with 1,134 research papers. It also provides the indicators like citation trends, cited reference patterns, authorship patterns, subject areas published on the mobile wallet, top contributing authors, and highly cited research articles using the database. Furthermore, network visualisation analysis, like the co-occurrence of author keywords and keywords plus terms, has also been examined using VOSviewer software. The bibliometric analysis shows that the Republic of China dominates mobile wallet payment, and India is a significant contributor. Furthermore, the constructions of the network map using a co-citation analysis and bibliographic coupling shows an interesting pattern of mobile wallet payment. Full Article
stem Agricultural informatics: emphasising potentiality and proposed model on innovative and emerging Doctor of Education in Agricultural Informatics program for smart agricultural systems By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 International universities are changing with their style of operation, mode of teaching and learning operations. This change is noticeable rapidly in India and also in international contexts due to healthy and innovative methods, educational strategies, and nomenclature throughout the world. Technologies are changing rapidly, including ICT. Different subjects are developed in the fields of IT and computing with the interaction or applications to other fields, viz. health informatics, bio informatics, agriculture informatics, and so on. Agricultural informatics is an interdisciplinary subject dedicated to combining information technology and information science utilisation in agricultural sciences. The digital agriculture is powered by agriculture informatics practice. For teaching, research and development of any subject educational methods is considered as important and various educational programs are there in this regard viz. Bachelor of Education, Master of Education, PhD in Education, etc. Degrees are also available to deal with the subjects and agricultural informatics should not be an exception of this. In this context, Doctor of Education (EdD or DEd) is an emerging degree having features of skill sets, courses and research work. This paper proposed on EdD program with agricultural informatics specialisation for improving healthy agriculture system. Here, a proposed model core curriculum is also presented. Full Article
stem LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks By www.inderscience.com Published On :: 2024-10-15T23:20:50-05:00 A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%. Full Article
stem Logical Soft Systems Methodology for Education Programme Development By Published On :: Full Article
stem On the Idea of Organization Transformation: The IS/IT Design Challenge in Systems Thinking By Published On :: Full Article
stem Creation of Anticipatory Information Support for Virtual Organizations between System(S) Theory and System Thinking By Published On :: Full Article
stem Retrofitting Generic Graduate Attributes: A Case-Study of Information Systems Undergraduate Programs By Published On :: Full Article
stem ERP Systems and User Perceptions: An Approach for Implementation Success By Published On :: Full Article
stem Making a CASE for Using the Students Choice of Software or Systems Development Tools By Published On :: Full Article
stem Critical Thinking and Reasoning for Information Systems Students By Published On :: Full Article
stem ISExpertNet: Facilitating Knowledge Sharing in the Information Systems Academic Community By Published On :: Full Article
stem Towards an Information System Making Transparent Teaching Processes and Applying Informing Science to Education By Published On :: Full Article
stem Understanding Intention to Use Multimedia Information Systems for Learning By Published On :: Full Article
stem Analysis of Information Systems Management (post)Graduate Program: Case Study of Faculty of Economics, University of Ljubljana, Slovenia By Published On :: Full Article
stem Modeling Human Activity Systems for Collaborative Project Development: An IS Development Perspective By Published On :: Full Article
stem Information Systems Field at the Forks: Relish Diversity or Perish By Published On :: Full Article
stem Effectiveness of Self-selected Teams: A Systems Development Project Experience By Published On :: Full Article
stem The Application of Semantic Enablers in the Context of Content Management Systems By Published On :: Full Article
stem Information Retrieval Systems: A Perspective on Human Computer Interaction By Published On :: Full Article
stem Video Learning Object Application System: Beyond the Static Reusability By Published On :: Full Article
stem Principals, Agents and Prisoners: An Economical Perspective on Information Systems Development Practice By Published On :: Full Article
stem Practical IT Education. Deepening of Technology, Expansion of Work, and Development into Headwaters: A Systematic Effort to Achieve Higher Levels By Published On :: Full Article
stem Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model By Published On :: Full Article
stem Workflows without Engines: Modeling for Today’s Heterogeneous Information Systems By Published On :: Full Article
stem Semantics, Ontologies and Information Systems in Education: Concerns and Proposals By Published On :: Full Article
stem The Cultural Impact of Information Systems – Through the Eyes of Hofstede – A Critical Journey By Published On :: Full Article
stem A Model of Introducing e-Learning System at Vocational College for Business Secretaries By Published On :: Full Article
stem The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town By Published On :: Full Article
stem Intelligent System for Information Security Management: Architecture and Design By Published On :: Full Article
stem Assessment of School Information System Utilization in the UAE Primary Schools By Published On :: Full Article
stem Interweaving Rubrics in Information Systems Program Assessments- Experiences from Action Research at Two Universities By Published On :: Full Article
stem Linking Theory, Practice and System-Level Perception: Using a PBL Approach in an Operating Systems Course By Published On :: Full Article
stem Proposal of an Instructional Design for Teaching the Requirement Process for Designing Information Systems By Published On :: Full Article
stem SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security By Published On :: Full Article