stem

Towards Understanding Information Systems Students’ Experience of Learning Introductory Programming: A Phenomenographic Approach

Aim/Purpose: This study seeks to understand the various ways information systems (IS) students experience introductory programming to inform IS educators on effective pedagogical approaches to teaching programming. Background: Many students who choose to major in information systems (IS), enter university with little or no experience of learning programming. Few studies have dealt with students’ learning to program in the business faculty, who do not necessarily have the computer science goal of programming. It has been shown that undergraduate IS students struggle with programming. Methodology: The qualitative approach was used in this study to determine students’ notions of learning to program and to determine their cognitive processes while learning to program in higher education. A cohort of 47 students, who were majoring in Information Systems within the Bachelor of Commerce degree programme were part of the study. Reflective journals were used to allow students to record their experiences and to study in-depth their insights and experiences of learning to program during the course. Using phenomenographic methods, categories of description that uniquely characterises the various ways IS students experience learning to program were determined. Contribution: This paper provides educators with empirical evidence on IS students’ experiences of learning to program, which play a crucial role in informing IS educators on how they can lend support and modify their pedagogical approach to teach programming to students who do not necessarily need to have the computer science goal of programming. This study contributes additional evidence that suggests more categories of description for IS students within a business degree. It provides valuable pedagogical insights for IS educators, thus contributing to the body of knowledge Findings: The findings of this study reveal six ways in which IS students’ experience the phenomenon, learning to program. These ways, referred to categories of description, formed an outcome space. Recommendations for Practitioners: Use the experiences of students identified in this study to determine approach to teaching and tasks or assessments assigned Recommendation for Researchers: Using phenomenographic methods researchers in IS or IT may determine pedagogical content knowledge in teaching specific aspects of IT or IS. Impact on Society: More business students would be able to program and improve their logical thinking and coding skills. Future Research: Implement the recommendations for practice and evaluate the students’ performance.




stem

Honeybrid method for network security in a software defined network system

This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs.




stem

A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison

This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, while security and privacy concerns have often been overlooked. To address these issues, the authors present a novel internet of things (IoT)-based self-lecture attendance system (SLAS) that leverages smartphones and QR codes. This system effectively addresses security and privacy concerns while providing streamlined attendance tracking. It offers several advantages such as compact size, affordability, scalability, and flexible features for teachers and students. Empirical research conducted in a live lecture setting demonstrates the efficacy and precision of the SLAS system. The authors believe that their system will be valuable for educational institutions aiming to streamline attendance tracking while ensuring security and privacy.




stem

International Journal of Applied Systemic Studies




stem

International Journal of Information Systems and Change Management




stem

International Journal of Business and Systems Research




stem

Mobile wallet payments - a systematic literature review with bibliometric and network visualisation analysis over two decades

The study aims to review the literature on mobile wallet payment and align research trends using a systematic literature review with bibliometric and network visualisation analysis over two decades. It uses bibliometric analysis of the literature research retrieved from the Web of Science database. The study period was from 2001 to 2021, with 1,134 research papers. It also provides the indicators like citation trends, cited reference patterns, authorship patterns, subject areas published on the mobile wallet, top contributing authors, and highly cited research articles using the database. Furthermore, network visualisation analysis, like the co-occurrence of author keywords and keywords plus terms, has also been examined using VOSviewer software. The bibliometric analysis shows that the Republic of China dominates mobile wallet payment, and India is a significant contributor. Furthermore, the constructions of the network map using a co-citation analysis and bibliographic coupling shows an interesting pattern of mobile wallet payment.




stem

Agricultural informatics: emphasising potentiality and proposed model on innovative and emerging Doctor of Education in Agricultural Informatics program for smart agricultural systems

International universities are changing with their style of operation, mode of teaching and learning operations. This change is noticeable rapidly in India and also in international contexts due to healthy and innovative methods, educational strategies, and nomenclature throughout the world. Technologies are changing rapidly, including ICT. Different subjects are developed in the fields of IT and computing with the interaction or applications to other fields, viz. health informatics, bio informatics, agriculture informatics, and so on. Agricultural informatics is an interdisciplinary subject dedicated to combining information technology and information science utilisation in agricultural sciences. The digital agriculture is powered by agriculture informatics practice. For teaching, research and development of any subject educational methods is considered as important and various educational programs are there in this regard viz. Bachelor of Education, Master of Education, PhD in Education, etc. Degrees are also available to deal with the subjects and agricultural informatics should not be an exception of this. In this context, Doctor of Education (EdD or DEd) is an emerging degree having features of skill sets, courses and research work. This paper proposed on EdD program with agricultural informatics specialisation for improving healthy agriculture system. Here, a proposed model core curriculum is also presented.




stem

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




stem

Logical Soft Systems Methodology for Education Programme Development




stem

On the Idea of Organization Transformation: The IS/IT Design Challenge in Systems Thinking




stem

Creation of Anticipatory Information Support for Virtual Organizations between System(S) Theory and System Thinking




stem

Retrofitting Generic Graduate Attributes: A Case-Study of Information Systems Undergraduate Programs




stem

ERP Systems and User Perceptions: An Approach for Implementation Success




stem

Information Systems Development Methodologies and all that Jazz




stem

Making a CASE for Using the Students Choice of Software or Systems Development Tools




stem

Critical Thinking and Reasoning for Information Systems Students




stem

The Performance of Web-based 2-tier Middleware Systems




stem

ISExpertNet: Facilitating Knowledge Sharing in the Information Systems Academic Community




stem

System Analysis Education Using Simulated Case Studies




stem

Towards an Information System Making Transparent Teaching Processes and Applying Informing Science to Education




stem

Understanding Intention to Use Multimedia Information Systems for Learning




stem

Analysis of Information Systems Management (post)Graduate Program: Case Study of Faculty of Economics, University of Ljubljana, Slovenia




stem

A Doctorate Degree Program in Information Systems of a Kind




stem

Teaching System Access Control




stem

Modeling Human Activity Systems for Collaborative Project Development: An IS Development Perspective




stem

Information Systems Field at the Forks: Relish Diversity or Perish




stem

Towards Building Secure Software Systems




stem

Concept and Rule Based Naming System




stem

Effectiveness of Self-selected Teams: A Systems Development Project Experience




stem

The Application of Semantic Enablers in the Context of Content Management Systems 




stem

Information Retrieval Systems: A Perspective on Human Computer Interaction




stem

Video Learning Object Application System: Beyond the Static Reusability




stem

Principals, Agents and Prisoners: An Economical Perspective on Information Systems Development Practice




stem

Practical IT Education. Deepening of Technology, Expansion of Work, and Development into Headwaters: A Systematic Effort to Achieve Higher Levels




stem

Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model




stem

Workflows without Engines: Modeling for Today’s Heterogeneous Information Systems  




stem

Semantics, Ontologies and Information Systems in Education: Concerns and Proposals 




stem

The Cultural Impact of Information Systems – Through the Eyes of Hofstede – A Critical Journey




stem

A Model of Introducing e-Learning System at Vocational College for Business Secretaries




stem

An Information System for a Bauxite Mine




stem

The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town




stem

Intelligent System for Information Security Management: Architecture and Design




stem

Assessment of School Information System Utilization in the UAE Primary Schools




stem

Interweaving Rubrics in Information Systems Program Assessments- Experiences from Action Research at Two Universities




stem

Linking Theory, Practice and System-Level Perception: Using a PBL Approach in an Operating Systems Course




stem

Proposal of an Instructional Design for Teaching the Requirement Process for Designing Information Systems




stem

SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security




stem

Emotion-Aware Education and Research Systems




stem

Usability Issues in Mobile-Wireless Information Systems