tom Combining Summative and Formative Evaluation Using Automated Assessment By Published On :: 2019-04-18 Aim/Purpose: Providing both formative and summative assessment that allows students to learn from their mistakes is difficult in large classes. This paper describes an automated assessment system suitable for courses with even 100 or more students. Background: Assessment is a vital part of any course of study. Ideally students should be given formative assessment with feedback during the course so students and tutors can identify weaknesses and focus on what needs improvement before summative assessment, which results in a grade. This paper describes and automated assessment system that lessens the burden of providing formative assessment in large classes. Methodology: We used Checkpoint, a web-based automated assessment system, to grade assignments in a number of different computer science courses. Contribution: The students come from diverse backgrounds, with a wide range of ages, previous qualifications and technical skills, and our approach allows the students to work at their own pace according to their individual needs, submitting their solutions as many times as they wish up to a deadline, using feedback provided by the system to help identify and correct their mistakes before trying again. Findings: Use of automated assessment allows us to achieve the goals of both summative and formative assessment: we allow students to learn from their mistakes without incurring a penalty, while at the same time awarding them a grade to validate their efforts. The students have an overwhelmingly positive view about our use of automated assessment, and their comments support our views on the assessment process. Recommendations for Practitioners: Because of the increasing number of students in today’s courses, we recommend using automated assessment wherever possible. Full Article
tom Implications of Updating Digital Literacy – A Case Study in an Optometric Curriculum By Published On :: 2019-04-08 Aim/Purpose: The aim of this project was to explore a method to enable an updated under-standing of digital literacy to be implemented in curricula in an environment of an existing, but outdated, understanding of digital literacy. . Background: The changing healthcare environment increasingly emphasizes the importance of digital literacy skills; therefore academics in the optometry discipline at Deakin University sought to better understand where digital literacy skills were taught in their program, and whether delivery was implicit or explicit. Methodology: This case study describes a systematic review of the optometric curriculum to first identify where and what digital literacy skills are currently being addressed in the curriculum, identify the gaps, and develop a strategy to address the gaps. Contribution: The main outcome of this work is the development of a spiraling curriculum to support the development of digital literacy skills required in later units of the program and for clinical practice post-graduation. Findings: Although the definition of digital literacy may be outdated, the digital literacy capabilities being addressed in the curriculum had grown as digital technology use by staff and students had expanded. This, together with the realization that students were not as digitally capable as expected, indicated that teaching digital literacy skills needed to be made overt throughout the curriculum. Recommendations for Practitioners: The process developed through this case study provides a strong foundation for course teams, curriculum developers and educational designers to efficiently analyze digital literacy expectations in existing, accredited health-related curricula and improve the curricula by more overtly embedding digital literacy teaching into it. Impact on Society: Graduates of the amended program of study are expected to be better prepared to undertake their future careers in a digitally enhanced and disrupted environment. Future Research: The framework will be used to explore digital literacy teaching practices in other disciplines. A systematic evaluation will be undertaken to identify the benefits and short comings of using the framework. The elements that make up the new definition of digital literacy need to be better articulated to allow curriculum developers to be better informed as to how to interpret the framework in their context. Full Article
tom A Knowledge Integration Methodology for Developing Customized Maintenance Documents By Published On :: Full Article
tom The Generalized Requirement Approach for Requirement Validation with Automatically Generated Program Code By Published On :: Full Article
tom The Application of a Knowledge Management Framework to Automotive Original Component Manufacturers By Published On :: 2017-12-15 Aim/Purpose: This paper aims to present an example of the application of a Knowledge Man-agement (KM) framework to automotive original component manufacturers (OEMs). The objective is to explore KM according to the four pillars of a selected KM framework. Background: This research demonstrates how a framework, namely the George Washington University’s Four Pillar Framework, can be used to determine the KM status of the automotive OEM industry, where knowledge is complex and can influence the complexity of the KM system (KMS) used. Methodology: An empirical study was undertaken using a questionnaire to gather quantitative data. There were 38 respondents from the National Association of Automotive Component and Allied Manufacturers (NAACAM) and suppliers from three major automotive OEMs. The respondents were required to be familiar with the company’s KMS. Contribution: Currently there is a limited body of research available on the KM implementation frameworks for the automotive industry. This study presents a novel approach to the use of a KM framework to reveal the status of KM in automotive OEMs. At the time of writing, the relationship between the four pillars and the complexity of KMS had not yet been determined. Findings: The results indicate that there is a need to improve KM in the automotive OEM industry. According to the relationships investigated, the four pillars, namely leadership, organization, technology and learning, are considered important for KM, regardless of the level of KMS complexity, Recommendations for Practitioners: Automotive OEMs need to ensure that the KM aspects are established and should be periodically evaluated by using a KM framework such as the George Washington University’s Four Pillar Framework to identify KM weaknesses. Recommendation for Researchers: The establishment and upkeep of a successful KM environment is challenging due to the complexity involved with various influencing aspects. To ensure that all aspects are considered in KM environments, comprehensive KM frameworks, such as the George Washington University’s Four Pillar Framework, need to be applied. Impact on Society: The status of KM management and accessibility of knowledge in organizations needs to be periodically examined, in order to improve supplier and OEM knowledge sharing. Future Research: Although the framework used provides a process for KM status determination, this study could be extended by investigating a methodology that includes KMS best practice and tools. This study could be repeated at a national and international level to provide an indication of KM practice within the entire automotive industry. Full Article
tom An Empirical Examination of Customers’ Mobile Phone Experience and Awareness of Mobile Banking Services in Mobile Banking in Saudi Arabia By Published On :: 2017-11-29 Aim/Purpose: This work aims to understand why a disparity between the popularity of smart phones and the limited adoption of m-banking exists. Accordingly, this study investigates factors that affect a person’s decision to adopt m-banking services. Such an investigation seeks to determine if and to what extent customers’ mobile phone experience as well as their awareness of m-banking services influence their intention to use such services? Background: This study developed a conceptual model to determine the influence that users’ mobile phone experience as well as users’ awareness of m-banking services had on users’ behavioral intention to use m-banking in Saudi Arabia. Methodology: The quantitative method used to collect data was a survey questionnaire tech-nique. A questionnaire with non-structured (close-ended) questions was formulated. A random sample, targeting banking customers in Saudi Arabia, was selected. This study collected data using a cross-sectional survey. Of those surveyed, 389 provided valid responses eligible for data analysis. SPSS v.22 was used to analyze the data. Contribution: This study produced helpful results and a new m-banking conceptual model. The developed conceptual model focused integrally on users’ awareness and experience as antecedents of m-banking adoption and highlighted the im-portance of differentiating between measuring the users’ characteristics in adopting e-banking in general and m-banking services in particular. In addition, this type of model has the ability to synthesize new control variables as well as to study technology acceptance in developing countries. This study, based on an extended UTAUT model, set out to discover what factors might affect customers’ intentions to use m-banking in Saudi Arabia. Findings: The results show that service awareness has a direct effect on performance and effort expectancy, but not on perceived risk. Moreover, mobile phone experience fails to impact the relationships in the same hypothesized direction. As anticipated, performance expectancy, effort expectancy, and perceived risk have direct and significant effects on behavioral intentions to use m-banking. However, customer awareness fails to impact the relationships of performance expectancy, effort expectancy, and perceived risk on behavioral intentions to use m-banking. Recommendations for Practitioners: Banks should target customers by distributing useful information and applying measures to increase acceptance. Banks need to introduce something imaginative to convince bank customers to abandon existing service channels and adopt m-banking services. Banks should make m-banking services the easiest service for conducting bank transactions and/or help customers conduct transactions that they cannot do any other way. Recommendation for Researchers: Other factors, such as trust, culture, and/or credibility should be investigated along with user’s awareness and experience factors in m-banking services. There is a need to focus on a specific type of m-banking. Thus, it may be fruitful to study the adoption of different systems of m-banking services. Impact on Society: This study suggests that m-banking services should be designed and built based on a deep understanding of customers’ needs using extensive testing to assure that applications and sites function well in a mobile setting. Future Research: Future researchers should apply the conceptual model developed in this study in different settings, different countries, and to different technologies. Full Article
tom PRATO: An Automated Taxonomy-Based Reviewer-Proposal Assignment System By Published On :: 2018-10-20 Aim/Purpose: This paper reports our implementation of a prototype system, namely PRATO (Proposals Reviewers Automated Taxonomy-based Organization), for automatic assignment of proposals to reviewers based on categorized tracks and partial matching of reviewers’ profiles of research interests against proposal keywords. Background: The process of assigning reviewers to proposals tends to be a complicated task as it involves inspecting the matching between a given proposal and a reviewer based on different criteria. The situation becomes worse if one tries to automate this process, especially if a reviewer partially matches the domain of the paper at hand. Hence, a new controlled approach is required to facilitate the matching process. Methodology: Proposals and reviewers are organized into categorized tracks as defined by a tree of hierarchical research domains which correspond to the university’s colleges and departments. In addition, reviewers create their profiles of research interests (keywords) at the time of registration. Initial assignment is based on the matching of categorized sub-tracks of proposal and reviewer. Where the proposal and a reviewer fall under different categories (sub-tracks), assignment is done based on partial matching of proposal content against re-viewers’ research interests. Jaccard similarity coefficient scores are calculated of proposal keywords and reviewers’ profiles of research interest, and the reviewer with highest score is chosen. The system was used to automate the process of proposal-reviewer assignment at the Umm Al-Qura University during the 2017-2018 funding cycle. The list of proposal-reviewer assignments generated by the system was sent to human experts for voting and subsequently to make final assignments accordingly. With expert votes and final decisions as evaluation criteria, data system-expert agreements (in terms of “accept” or “reject”) were collected and analyzed by tallying frequencies and calculating rejection/acceptance ratios to assess the system’s performance. Contribution: This work helped the Deanship of Scientific Research (DSR), a funding agency at Umm Al-Qura University, in managing the process of reviewing proposals submitted for funding. We believe the work can also benefit any organizations or conferences to automate the assignment of papers to the most appropriate reviewers. Findings: Our developed prototype, PRATO, showed a considerable impact on the entire process of reviewing proposals at DSR. It automated the assignment of proposals to reviewers and resulted in 56.7% correct assignments overall. This indicates that PRATO performed considerably well at this early stage of its development. Recommendations for Practitioners: It is important for funding agencies and publishers to automate reviewing process to obtain better reviewing quality in a timely manner. Recommendation for Researchers: This work highlighted a new methodology to tackle the proposal-reviewer assignment task in an automated manner. More evaluation might be needed with consideration of different categories, especially for partially matched candidates. Impact on Society: The new methodology and knowledge about factors influencing the implementation of automated proposal-reviewing systems will help funding agencies and publishers to improve the quality of their internal processes. Future Research: In the future, we plan to examine PRATO’s performance on different classification schemes where specialty areas can be represented in graphs rather than trees. With graph representation, the scope for reviewer selection can be widened to include more general fields of specialty. Moreover, we will try to record the reasons for rejection to identify accurately whether the rejection was due to improper assignment or other reasons. Full Article
tom Automatic Generation of Temporal Data Provenance From Biodiversity Information Systems By Published On :: 2022-07-26 Aim/Purpose: Although the significance of data provenance has been recognized in a variety of sectors, there is currently no standardized technique or approach for gathering data provenance. The present automated technique mostly employs workflow-based strategies. Unfortunately, the majority of current information systems do not embrace the strategy, particularly biodiversity information systems in which data is acquired by a variety of persons using a wide range of equipment, tools, and protocols. Background: This article presents an automated technique for producing temporal data provenance that is independent of biodiversity information systems. The approach is dependent on the changes in contextual information of data items. By mapping the modifications to a schema, a standardized representation of data provenance may be created. Consequently, temporal information may be automatically inferred. Methodology: The research methodology consists of three main activities: database event detection, event-schema mapping, and temporal information inference. First, a list of events will be detected from databases. After that, the detected events will be mapped to an ontology, so a common representation of data provenance will be obtained. Based on the derived data provenance, rule-based reasoning will be automatically used to infer temporal information. Consequently, a temporal provenance will be produced. Contribution: This paper provides a new method for generating data provenance automatically without interfering with the existing biodiversity information system. In addition to this, it does not mandate that any information system adheres to any particular form. Ontology and the rule-based system as the core components of the solution have been confirmed to be highly valuable in biodiversity science. Findings: Detaching the solution from any biodiversity information system provides scalability in the implementation. Based on the evaluation of a typical biodiversity information system for species traits of plants, a high number of temporal information can be generated to the highest degree possible. Using rules to encode different types of knowledge provides high flexibility to generate temporal information, enabling different temporal-based analyses and reasoning. Recommendations for Practitioners: The strategy is based on the contextual information of data items, yet most information systems simply save the most recent ones. As a result, in order for the solution to function properly, database snapshots must be stored on a frequent basis. Furthermore, a more practical technique for recording changes in contextual information would be preferable. Recommendation for Researchers: The capability to uniformly represent events using a schema has paved the way for automatic inference of temporal information. Therefore, a richer representation of temporal information should be investigated further. Also, this work demonstrates that rule-based inference provides flexibility to encode different types of knowledge from experts. Consequently, a variety of temporal-based data analyses and reasoning can be performed. Therefore, it will be better to investigate multiple domain-oriented knowledge using the solution. Impact on Society: Using a typical information system to store and manage biodiversity data has not prohibited us from generating data provenance. Since there is no restriction on the type of information system, our solution has a high potential to be widely adopted. Future Research: The data analysis of this work was limited to species traits data. However, there are other types of biodiversity data, including genetic composition, species population, and community composition. In the future, this work will be expanded to cover all those types of biodiversity data. The ultimate goal is to have a standard methodology or strategy for collecting provenance from any biodiversity data regardless of how the data was stored or managed. Full Article
tom A Novel Telecom Customer Churn Analysis System Based on RFM Model and Feature Importance Ranking By Published On :: 2023-10-03 Aim/Purpose: In this paper, we present an RFM model-based telecom customer churn system for better predicting and analyzing customer churn. Background: In the highly competitive telecom industry, customer churn is an important research topic in customer relationship management (CRM) for telecom companies that want to improve customer retention. Many researchers focus on a telecom customer churn analysis system to find out the customer churn factors for improving prediction accuracy. Methodology: The telecom customer churn analysis system consists of three main parts: customer segmentation, churn prediction, and churn factor identification. To segment the original dataset, we use the RFM model and K-means algorithm with an elbow method. We then use RFM-based feature construction for customer churn prediction, and the XGBoost algorithm with SHAP method to obtain a feature importance ranking. We chose an open-source customer churn dataset that contains 7,043 instances and 21 features. Contribution: We present a novel system for churn analysis in telecom companies, which encompasses customer churn prediction, customer segmentation, and churn factor analysis to enhance business strategies and services. In this system, we leverage customer segmentation techniques for feature construction, which enables the new features to improve the model performance significantly. Our experiments demonstrate that the proposed system outperforms current advanced customer churn prediction methods in the same dataset, with a higher prediction accuracy. The results further demonstrate that this churn analysis system can help telecom companies mine customer value from the features in a dataset, identify the primary factors contributing to customer churn, and propose suitable solution strategies. Findings: Simulation results show that the K-means algorithm gets better results when the original dataset is divided into four groups, so the K value is selected as 4. The XGBoost algorithm achieves 79.3% and 81.05% accuracy on the original dataset and new data with RFM, respectively. Additionally, each cluster has a unique feature importance ranking, allowing for specialized strategies to be provided to each cluster. Overall, our system can help telecom companies implement effective CRM and marketing strategies to reduce customer churn. Recommendations for Practitioners: More accurate churn prediction reduces misjudgment of customer churn. The acquisition of customer churn factors makes the company more convenient to analyze the reasons for churn and formulate relevant conservation strategies. Recommendation for Researchers: The research achieves 81.05% accuracy for customer churn prediction with the Xgboost and RFM algorithms. We believe that more enhancements algorithms can be attempted for data preprocessing for better prediction. Impact on Society: This study proposes a more accurate and competitive customer churn system to help telecom companies conserve the local markets and reduce capital outflows. Future Research: The research is also applicable to other fields, such as education, banking, and so forth. We will make more new attempts based on this system. Full Article
tom A New Model for Collecting, Storing, and Analyzing Big Data on Customer Feedback in the Tourism Industry By Published On :: 2023-05-07 Aim/Purpose: In this study, the research proposes and experiments with a new model of collecting, storing, and analyzing big data on customer feedback in the tourism industry. The research focused on the Vietnam market. Background: Big Data describes large databases that have been “silently” built by businesses, which include product information, customer information, customer feedback, etc. This information is valuable, and the volume increases rapidly over time, but businesses often pay little attention or store it discretely, not centrally, thereby wasting an extremely large resource and partly causing limitations for business analysis as well as data. Methodology: The study conducted an experiment by collecting customer feedback data in the field of tourism, especially tourism in Vietnam, from 2007 to 2022. After that, the research proceeded to store and mine latent topics based on the data collected using the Topic Model. The study applied cloud computing technology to build a collection and storage model to solve difficulties, including scalability, system stability, and system cost optimization, as well as ease of access to technology. Contribution: The research has four main contributions: (1) Building a model for Big Data collection, storage, and analysis; (2) Experimenting with the solution by collecting customer feedback data from huge platforms such as Booking.com, Agoda.com, and Phuot.vn based on cloud computing, focusing mainly on tourism Vietnam; (3) A Data Lake that stores customer feedback and discussion in the field of tourism was built, supporting researchers in the field of natural language processing; (4) Experimental research on the latent topic mining model from the collected Big Data based on the topic model. Findings: Experimental results show that the Data Lake has helped users easily extract information, thereby supporting administrators in making quick and timely decisions. Next, PySpark big data processing technology and cloud computing help speed up processing, save costs, and make model building easier when moving to SaaS. Finally, the topic model helps identify customer discussion trends and identify latent topics that customers are interested in so business owners have a better picture of their potential customers and business. Recommendations for Practitioners: Empirical results show that facilities are the factor that customers in the Vietnamese market complain about the most in the tourism/hospitality sector. This information also recommends that practitioners reduce their expectations about facilities because the overall level of physical facilities in the Vietnamese market is still weak and cannot be compared with other countries in the world. However, this is also information to support administrators in planning to upgrade facilities in the long term. Recommendation for Researchers: The value of Data Lake has been proven by research. The study also formed a model for big data collection, storage, and analysis. Researchers can use the same model for other fields or use the model and algorithm proposed by this study to collect and store big data in other platforms and areas. Impact on Society: Collecting, storing, and analyzing big data in the tourism sector helps government strategists to identify tourism trends and communication crises. Based on that information, government managers will be able to make decisions and strategies to develop regional tourism, propose price levels, and support innovative programs. That is the great social value that this research brings. Future Research: With each different platform or website, the study had to build a query scenario and choose a different technology approach, which limits the ability of the solution’s scalability to multiple platforms. Research will continue to build and standardize query scenarios and processing technologies to make scalability to other platforms easier. Full Article
tom How Students’ Information Sensitivity, Privacy Trade-Offs, and Stages of Customer Journey Affect Consent to Utilize Personal Data By Published On :: 2023-04-05 Aim/Purpose: This study aimed to increase our understanding of how the stages of the customer purchase journey, privacy trade-offs, and information sensitivity of different business service sectors affect consumers’ privacy concerns. Background: The study investigated young consumers’ willingness to provide consent to use their personal data at different phases of the customer journey. This study also examined their readiness to provide consent if they receive personal benefits, and how information sensitivity varied between different individuals and business sectors. Methodology: Data was collected by a quantitative survey (n=309) and analyzed with R using the Bayesian linear mixed effect modeling approach. The sample consisted of university students in Finland, who represented a group of young and digitally native consumers. The questionnaire was designed for this study and included constructs with primarily Likert-scale items. Contribution: The study contributed to data privacy and consent management research in information sensitivity, privacy trade-off, and the customer journey. The study underlined the need for a stronger user experience focus and contextuality. Findings: The results showed that readiness to disclose personal data varied at different phases of the customer journey as privacy concerns did not decrease in a linear fashion throughout the purchase process. Perceived benefits affected the willingness to provide consent for data usage, but concerned consumers would be less trade-off oriented. Self-benefit was the most relevant reason for sharing, while customization was the least. There is a connection between the information sensitivity of different business sector information and privacy concerns. No support for gender differences was found, but age affected benefits and business sector variables. Recommendations for Practitioners: The study recommends approaching consumers’ data privacy concerns from a customer journey perspective while trying to motivate consumers to share their personal data with relevant perceived benefits. The self-benefit was the most relevant benefit for willingness to provide consent, while customization was the least. Recommendation for Researchers: The study shows that individual preference for privacy was a major factor directly and via interaction for all three models. This study also showed that consumers’ subjective decision-making in privacy issues is both a situational and a contextual factor. Impact on Society: This study could encourage policymakers and societies to develop guidelines on how to develop privacy practices and consent management to be more user centric as individuals are increasingly concerned about their online privacy. Future Research: This study encourages examining consumers’ motivational factors to provide digital consent for companies with experimental research settings. This study also calls to explore perceived benefits in all age groups from the perspective of different information in various business sectors. This study shows that privacy concern is a contextual and situational factor. Full Article
tom Customer Churn Prediction in the Banking Sector Using Machine Learning-Based Classification Models By Published On :: 2023-02-28 Aim/Purpose: Previous research has generally concentrated on identifying the variables that most significantly influence customer churn or has used customer segmentation to identify a subset of potential consumers, excluding its effects on forecast accuracy. Consequently, there are two primary research goals in this work. The initial goal was to examine the impact of customer segmentation on the accuracy of customer churn prediction in the banking sector using machine learning models. The second objective is to experiment, contrast, and assess which machine learning approaches are most effective in predicting customer churn. Background: This paper reviews the theoretical basis of customer churn, and customer segmentation, and suggests using supervised machine-learning techniques for customer attrition prediction. Methodology: In this study, we use different machine learning models such as k-means clustering to segment customers, k-nearest neighbors, logistic regression, decision tree, random forest, and support vector machine to apply to the dataset to predict customer churn. Contribution: The results demonstrate that the dataset performs well with the random forest model, with an accuracy of about 97%, and that, following customer segmentation, the mean accuracy of each model performed well, with logistic regression having the lowest accuracy (87.27%) and random forest having the best (97.25%). Findings: Customer segmentation does not have much impact on the precision of predictions. It is dependent on the dataset and the models we choose. Recommendations for Practitioners: The practitioners can apply the proposed solutions to build a predictive system or apply them in other fields such as education, tourism, marketing, and human resources. Recommendation for Researchers: The research paradigm is also applicable in other areas such as artificial intelligence, machine learning, and churn prediction. Impact on Society: Customer churn will cause the value flowing from customers to enterprises to decrease. If customer churn continues to occur, the enterprise will gradually lose its competitive advantage. Future Research: Build a real-time or near real-time application to provide close information to make good decisions. Furthermore, handle the imbalanced data using new techniques. Full Article
tom Investigating the Determinants of Online Shopping Repurchase Intention in Generation Z Customers in India: An Exploratory Study By Published On :: 2024-11-11 Aim/Purpose: This study investigates the factors that affect the repurchase intentions of Generation Z consumers in India’s online shopping industry, focusing on combining the Expectation-Confirmation Model (ECM) and Extended Technology Acceptance Model (E-TAM). The aim is to understand the intricate behaviors that shape technology adoption and sustained usage, which are essential for retaining customers in e-commerce. Background: Social media and other online platforms have significantly influenced daily life and become essential communication tools owing to technological advancements. Online shopping is no exception, offering a range of product choices, information, and convenience compared with traditional commerce. Indian retailers recognize this trend as an opportunity to promote their brands through e-shopping platforms, leading to increased competition. Generation Z comprises 32% of the world’s population and is a significant emerging customer base in India. Numerous studies have been conducted to study customers’ repurchase intention in the online shopping domain, but few studies have explicitly focused on Generation Z as a customer base. This study aims to comprehensively understand the topic and investigate the variables that impact consumers’ online repurchase intention by examining their post-adoption behavioral processes. Methodology: The study employed a quantitative research design with structural equation modeling using AMOS to analyze responses from 410 participants. This method thoroughly examined hypotheses regarding factors affecting repurchase intention (security, ease of use, privacy, and internet self-efficacy) and the mediating role of e-satisfaction. Contribution: This study makes a unique contribution to the field of e-commerce by focusing on Generation Z in India, a rapidly growing demographic in the e-commerce industry. The results on the mediating role of e-satisfaction have significant implications for e-retailers seeking to enhance customer retention strategies and gain a competitive edge in the market. Findings: The research findings underscore the significant influence of security, ease of use, and internet self-efficacy on repurchase intentions, with e-satisfaction playing a pivotal role as a mediating factor. Notably, while privacy concerns did not directly impact repurchase intentions, they displayed considerable influence when mediated by e-satisfaction, highlighting the intricate interplay between these variables in the context of online shopping, which is the unique finding of this study. Recommendations for Practitioners: This study has several significant implications for practitioners. Effectively addressing computer-related individual differences, such as computer self-efficacy, is crucial for boosting online customers’ repurchase intention. For instance, if an e-retailer intends to target Generation Z customers, they should collaborate with IT professionals and develop various computer literacy programs on online streaming platforms, such as YouTube. These programs will enhance target customers’ confidence in online shopping portals and increase their online repeat purchases. Additionally, practitioners should strive to improve the online shopping experience by making the portal user-friendly. Generation Z is accustomed to a fast Internet experience, so they prefer that the process of completing online transactions is swift with fewer clicks. The search for products, payments, and redress should not be tedious. Furthermore, the primary objective of the e-retailer should be to satisfy customers, as satisfied customers repeat their purchases and increase overall profitability. Recommendation for Researchers: The current study was conducted in the Delhi-NCR region of India, and its findings could serve as a basis for future research. For instance, the scale devised in this study could be utilized to examine the impact of cash-on-delivery as a payment method on purchase intention across the country. Alternatively, a comparative analysis could be conducted to compare cash-on-delivery effects in various countries. Impact on Society: The study’s findings enable stakeholders in the online shopping industry to comprehend the post-adoption behavior of Generation Z users and augment existing literature by establishing a correlation between determinants that impact repurchase intention and e-satisfaction, which serves as a mediator. Future Research: This study examines the factors that impact the propensity of Generation Z shoppers to engage in repeat online purchases. This study focuses on India, where the Generation Y (millennial) customer base is also substantial within the online shopping market. Future research could compare the shopping habits of Generation Z and Generation Y customers, as the latter may place greater importance on privacy and security. Additional studies could broaden the scope of this research and explore the comparative viewpoints of both generations. Also, it would be advantageous to conduct in-depth interviews and longitudinal studies to acquire a more in-depth comprehension of the evolving digitalization of shopping. Full Article
tom Investigating Intention to Invest in Online Peer-to-Peer Lending Platforms Among the Bottom 40 Group in Malaysia By Published On :: 2024-09-20 Aim/Purpose: This study investigates the intention to invest in online peer-to-peer (P2P) lending platforms among the bottom 40% (B40) Malaysian households by income. Background: The B40 group citizens earn less than USD 1,096.00 (i.e., RM 4,850.00) in monthly household income, thereby possessing relatively small capital investments suitable for online P2P lending. Methodology: Drawing on the technology acceptance model (TAM), this research developed and tested the relevant hypotheses with data collected from 216 respondents. The partial least square structural equation modelling (PLS-SEM) technique was employed to analyse the collected data. Contribution: This study contributes to the body of knowledge on financial inclusion by demonstrating the relevance of modified TAM in explaining the intention to invest in online P2P lending platforms among investors with lower disposable income (i.e., the B40 group in Malaysia). Findings: The findings revealed that information quality, perceived risk, and perceived ease of use are relevant to B40 investment intention in P2P online lending platforms. However, contrary to expectations, trust and financial literacy are insignificant predictors of B40 investment intention. Recommendations for Practitioners: The P2P lending platform operators could enhance financial inclusion among the B40 group by ensuring borrowers provide sufficient, relevant, and reliable information with adequate security measures to minimise risk exposure. The financial regulators should also conduct periodic audits to ensure that the operators commit to enhancing information quality, platform security, and usability. Recommendation for Researchers: The intention to invest in online P2P lending platforms among the B40 group could be enhanced by improving information quality and user experience, addressing perceived risks, reassessing trust-building strategies and financial literacy initiatives, and adopting holistic, interdisciplinary approaches. These findings suggest targeted strategies to enhance financial inclusion and investment participation among B40 investors. Impact on Society: The study’s findings hold significant implications for financial regulators and institutions, such as the Securities Commission Malaysia, Bank Negara Malaysia, commercial and investment banks, and insurance companies. By focusing on these key determinants, policymakers can design targeted interventions to improve the accessibility and attractiveness of P2P lending platforms for B40 investors. Enhanced information quality and ease of use can be mandated through regulatory frameworks, while effective risk communication and mitigation strategies can be developed to build investor confidence. These measures can collectively promote financial growth and inclusion, supporting broader economic development goals. Future Research: Future research could expand the sample size to consider older B40 individuals across different countries and use a longitudinal survey to assess the actual investment decision of the B40 investors. Full Article
tom The Influence of Ads’ Perceived Intrusiveness in Geo-Fencing and Geo-Conquesting on Purchase Intention: The Mediating Role of Customers’ Attitudes By Published On :: 2024-05-29 Aim/Purpose: This study focuses on two targeting strategies of out-store Location-Based Mobile Advertising (LBMA): the geo-fencing strategy (i.e., targeting customers who are near the focal store) and the geo-conquesting strategy (i.e., targeting those who are near competitors’ stores to visit the focal store). To the authors’ knowledge, no previous studies have compared the perceived intrusiveness of advertisements (ads) in geo-fencing and geo-conquesting settings, despite the accumulating literature on out-store LBMA. Hence, the aim of this study is to determine which targeting strategy is more effective in terms of reducing the perception of ads’ intrusiveness and increasing positive customers’ attitudes and purchase intention. Background: The intrusive nature of LBMA is perceived negatively by some customers, impacting their attitudes toward the ad, purchase intention, and even their perception of the brand. Therefore, identifying the targeting strategy under which ads are perceived as less intrusive is essential. Additionally, brick-and-mortar clothing stores in Jordan are facing challenges due to the rise of online shopping and increased competition from nearby stores. Thus, examining geo-fencing and geo-conquesting might tackle these challenges and encourage local clothing retailers to adopt these strategies. Methodology: A quantitative method was used in this study. A between-subjects experimental design was used to collect the data using a scenario-based survey distributed to Jordanians aged 18 to 45. A total of 531 responses were collected. After excluding those who do not belong to the targeted age group and those who did not pass the manipulation check, 406 responses were analyzed using the Statistical Package for the Social Sciences (SPSS) software version 28 and the Analysis of Moment Structures (AMOS) software version 26 to conduct Structural Equation Modeling (SEM). Contribution: This work offers valuable contributions by investigating the impact of the perceived intrusiveness of ads on purchase intention in the contexts of geo-fencing and geo-conquesting, which has not been studied before. Additionally, it fills a gap by examining this phenomenon in Jordan, a developing country in which attitudes toward LBMA have not been previously explored. Findings: The results revealed that location-based mobile ads sent under a geo-fencing strategy are perceived as less intrusive than those sent under a geo-conquesting strategy. In addition, customers’ attitudes fully mediate the relationship between intrusiveness and purchase intention only under the geo-fencing strategy. Ultimately, neither of the strategies is more effective in terms of increasing positive customer attitudes and purchase intentions in the context of clothing retail stores in Jordan. Recommendations for Practitioners: Clothing retailers in Jordan should consider adopting geo-fencing and geo-conquesting strategies to boost purchase intentions and tackle industry challenges. Additionally, to increase purchase intentions with geo-fencing, practitioners should focus on fostering positive customer attitudes toward ads, as simply perceiving them as less intrusive is not sufficient to drive purchase intention without the mediating effect of positive attitudes. Recommendation for Researchers: This research is crucial for academics and researchers as geolocation technology and LBMA are expected to advance significantly in the future. Researchers can investigate this topic through a randomized field experiment, followed by a research questionnaire to collect data from a real-world setting. Impact on Society: Utilizing LBMA is essential for local clothing retail stores that are trying to effectively reach and connect with their customers because searching the Internet for local goods and services is done primarily on mobile devices. Indeed, this study revealed that customers in both settings (i.e., geo-fencing and geo-conquesting) reported a high intention to visit the promoting store and to purchase from the advertised product category. Future Research: Future research can apply this topic to different industries and cultural contexts, as the results may vary across industries and regions. Moreover, future research could build on this study by investigating additional constructs, such as product category involvement, customization, and content type of the message (e.g., informative, entertaining). Full Article
tom Automatic pectoral muscles and artefacts removal in mammogram images for improved breast cancer diagnosis By www.inderscience.com Published On :: 2024-11-08T23:20:50-05:00 Breast cancer is leading cause of mortality among women compared to other types of cancers. Hence, early breast cancer diagnosis is crucial to the success of treatment. Various pathological and imaging tests are available for the diagnosis of breast cancer. However, it may introduce errors during detection and interpretation, leading to false-negative and false-positive results due to lack of pre-processing of it. To overcome this issue, we proposed a effective image pre-processing technique-based on Otsu's thresholding and single-seeded region growing (SSRG) to remove artefacts and segment the pectoral muscle from breast mammograms. To validate the proposed method, a publicly available MIAS dataset was utilised. The experimental finding showed that proposed technique improved 18% breast cancer detection accuracy compared to existing methods. The proposed methodology works efficiently for artefact removal and pectoral segmentation at different shapes and nonlinear patterns. Full Article
tom On large automata processing: towards a high level distributed graph language By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 Large graphs or automata have their data that cannot fit in a single machine, or may take unreasonable time to be processed. We implement with MapReduce and Giraph two algorithms for intersecting and minimising large and distributed automata. We provide some comparative analysis, and the experiment results are depicted in figures. Our work experimentally validates our propositions as long as it shows that our choice, in comparison with MapReduce one, is not only more suitable for graph-oriented algorithms, but also speeds the executions up. This work is one of the first steps of a long-term goal that consists in a high level distributed graph processing language. Full Article
tom Data as a potential path for the automotive aftersales business to remain active through and after the decarbonisation By www.inderscience.com Published On :: 2024-04-30T23:20:50-05:00 This study aims to identify and understand the perspectives of automotive aftersales stakeholders regarding current challenges posed by decarbonisation strategies. It examines potential responses that the automotive aftersales business could undertake to address these challenges. Semi-structured interviews were undertaken with automotive industry experts from Europe and Latin America. This paper focuses primarily on impacts of decarbonisation upon automotive aftersales and the potential role of data in that business. Results show that investment in technology will be a condition for businesses that want to remain active in the industry. Furthermore, experts agree that incumbent manufacturers are not filling the technology gap that the energy transition is creating in the automotive sector, a consequence of which will be the entrance of new players from other sectors. The current aftersales businesses will potentially lose bargaining control. Moreover, policy makers are seen as unreliable leaders of the transition agenda. Full Article
tom Customer acceptance of unmanned stores with a focus on grocery retail By www.inderscience.com Published On :: 2024-04-30T23:20:50-05:00 Unmanned stores are one of the latest conceptual developments in retail and have received much attention, especially in the context of COVID-19-related social restrictions and the associated changes in consumer behaviour. The concept considers the latest technological developments and promises to offer various benefits to consumers and retailers based on artificial intelligence and automation. Using a German sample, this paper aims to evaluate consumers' acceptance of and intention to use the most prominent innovative solutions in unmanned stores. A modified technology acceptance model (TAM) as a theoretical framework was applied to the study. The results of the structural equation modelling make two contributions to the existing literature: First, the acceptance criteria for unmanned stores have not been analysed previously. Second, the modified TAM could be confirmed in this study. We provide empirical evidence suggesting that significant numbers of consumers accept unmanned stores, especially if the stores are strategically located and when individuals have a high innovation affinity. Full Article
tom An Integrated Approach for Automatic Aggregation of Learning Knowledge Objects By Published On :: Full Article
tom An Ontology to Automate Learning Scenarios? An Approach to its Knowledge Domain By Published On :: Full Article
tom 5-7 Year Old Children's Conceptions of Behaving Artifacts and the Influence of Constructing Their Behavior on the Development of Theory of Mind (ToM) and Theory of Artificial Mind (ToAM) By Published On :: 2015-12-14 Nowadays, we are surrounded by artifacts that are capable of adaptive behavior, such as electric pots, boiler timers, automatic doors, and robots. The literature concerning human beings’ conceptions of “traditional” artifacts is vast, however, little is known about our conceptions of behaving artifacts, nor of the influence of the interaction with such artifacts on cognitive development, especially among children. Since these artifacts are provided with an artificial “mind,” it is of interest to assess whether and how children develop a Theory of Artificial Mind (ToAM) which is distinct from their Theory of Mind (ToM). The study examined a new theoretical scheme named ToAM (Theory of Artificial Mind) by means of qualitative and quantitative methodology among twenty four 5-7 year old children from central Israel. It also examined the effects of interacting with behaving artifacts (constructing versus observing the robot’s behavior) using the “RoboGan” interface on children’s development of ToAM and their ToM and looked for conceptions that evolve among children while interacting with behaving artifacts which are indicative of the acquisition of ToAM. In the quantitative analysis it was found that the interaction with behaving artifacts, whether as observers or constructors and for both age groups, brought into awareness children’s ToM as well as influenced their ability to understand that robots can behave independently and based on external and environmental conditions. In the qualitative analysis it was found that participating in the intervention influenced the children’s ToAM for both constructors and for the younger observer. Engaging in building the robot’s behavior influenced the children’s ability to explain several of the robots’ behaviors, their understanding of the robot’s script-based behavior and rule-based behavior and the children’s metacognitive development. The theoretical and practical importance of the study is discussed. Full Article
tom Plagiarism Management: Challenges, Procedure, and Workflow Automation By Published On :: 2018-11-24 Aim/Purpose: This paper presents some of the issues that academia faces in both the detection of plagiarism and the aftermath. The focus is on the latter, how academics and educational institutions around the world can address the challenges that follow the identification of an incident. The scope is to identify the need for and describe specific strategies to efficiently manage plagiarism incidents. Background: Plagiarism is possibly one of the major academic misconduct offences. Yet, only a portion of Higher Education Institutes (HEIs) appear to have well developed policies and procedures aimed at dealing with this issue or to follow these when required. Students who plagiarize and are not caught pose challenges for academia. Students who are caught pose equal challenges. Methodology: Following a literature review that identifies and describes the extent and the seriousness of the problem, procedures and strategies to address the issue are recommended, based on the literature and best practices. Contribution: The paper alerts academics regarding the need for the establishment of rigorous and standardized procedures to address the challenges that follow the identification of a plagiarism incident. It then describes how to streamline the process to improve consistency and reduce the errors and the effort required by academic staff. Recommendations for Practitioners: To ensure that what is expected to happen takes place, HEIs should structure the process of managing suspected plagiarism cases. Operationalization, workflow automation, diagrams that map the processes involved, clear in-formation and examples to support and help academics make informed and consistent decisions, templates to communicate with the offenders, and data-bases to record incidents for future reference are strongly recommended. Future research: This paper provides a good basis for further research that will examine the plagiarism policy, the procedures, and the outcome of employing the procedures within the faculties of a single HEI, or an empirical comparison of these across a group of HEIs. Impact on Society: Considering its potential consequences, educational institutions should strive to prevent, detect, and deter plagiarism – and any type of student misconduct. Inaction can be harmful, as it is likely that some students will not gain the appropriate knowledge that their chosen profession requires, which could put in danger both their wellbeing and the people they will later serve in their careers. Full Article
tom Risk of Misinforming and Message Customization in Customer Related Management By Published On :: 2015-08-17 This paper discusses applications of the measures of the risk of misinforming and the role of the warranty of misinforming in the context of the informing component of Customer Related Management (CRM) issues. This study consists of two parts. Firstly, we propose an approach for customers’ grouping based on their attitude toward assessing product's properties and their expertise on the terminology/domain of the seller’s message describing the product. Also we discuss what the most appropriate personal/group warranty is for each of these group/clusters. Full Article
tom Aggregated to Pipelined Structure Based Streaming SSN for 1-ms Superpixel Segmentation System in Factory Automation By search.ieice.org Published On :: Yuan LI,Tingting HU,Ryuji FUCHIKAMI,Takeshi IKENAGA, Vol.E107-D, No.11, pp.1396-14071 millisecond (1-ms) vision systems are gaining increasing attention in diverse fields like factory automation and robotics, as the ultra-low delay ensures seamless and timely responses. Superpixel segmentation is a pivotal preprocessing to reduce the number of image primitives for subsequent processing. Recently, there has been a growing emphasis on leveraging deep network-based algorithms to pursue superior performance and better integration into other deep network tasks. Superpixel Sampling Network (SSN) employs a deep network for feature generation and employs differentiable SLIC for superpixel generation. SSN achieves high performance with a small number of parameters. However, implementing SSN on FPGAs for ultra-low delay faces challenges due to the final layer’s aggregation of intermediate results. To address this limitation, this paper proposes an aggregated to pipelined structure for FPGA implementation. The final layer is decomposed into individual final layers for each intermediate result. This architectural adjustment eliminates the need for memory to store intermediate results. Concurrently, the proposed structure leverages decomposed layers to facilitate a pipelined structure with pixel streaming input to achieve ultra-low latency. To cooperate with the pipelined structure, layer-partitioned memory architecture is proposed. Each final layer has dedicated memory for storing superpixel center information, allowing values to be read and calculated from memory without conflicts. Calculation results of each final layer are accumulated, and the result of each pixel is obtained as the stream reaches the last layer. Evaluation results demonstrate that boundary recall and under-segmentation error remain comparable to SSN, with an average label consistency improvement of 0.035 over SSN. From a hardware performance perspective, the proposed system processes 1000 FPS images with a delay of 0.947 ms/frame. Publication Date: 2024/11/01 Full Article
tom TALK: Automated Data Augmentation via Wikidata Relationships By ebiquity.umbc.edu Published On :: Sun, 20 Oct 2019 21:31:04 +0000 Automated Data Augmentation via Wikidata Relationships Oyesh Singh, UMBC10:30-11:30 Monday, 21 October 2019, ITE 346 With the increase in complexity of machine learning models, there is more need for data than ever. In order to fill this gap of annotated data-scarce situation, we look towards the ocean of free data present in Wikipedia and other […] The post TALK: Automated Data Augmentation via Wikidata Relationships appeared first on UMBC ebiquity. Full Article AI Machine Learning meetings NLP
tom Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach By ebiquity.umbc.edu Published On :: Sat, 04 Jan 2020 01:57:55 +0000 Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach We introduce the reinforcement quantum annealing (RQA) scheme in which an intelligent agent interacts with a quantum annealer that plays the stochastic environment role of learning automata and tries to iteratively find better Ising Hamiltonians for the given problem of interest. As a proof-of-concept, we propose a […] The post Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach appeared first on UMBC ebiquity. Full Article Paper quantum computing SAT
tom Paper: Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata By ebiquity.umbc.edu Published On :: Sun, 24 May 2020 15:20:21 +0000 Results using the reinforcement learning technique on two SAT benchmarks using a D-Wave 2000Q quantum processor showed significantly better solutions with fewer samples compared to the best-known quantum annealing techniques. The post Paper: Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata appeared first on UMBC ebiquity. Full Article AI Machine Learning Paper quantum computing SAT
tom paper: Automating GDPR Compliance using Policy Integrated Blockchain By ebiquity.umbc.edu Published On :: Sat, 30 May 2020 15:14:51 +0000 A new paper describing a system integrating a GDPR Ontology with blockchain to support checking data operations for compliance. The post paper: Automating GDPR Compliance using Policy Integrated Blockchain appeared first on UMBC ebiquity. Full Article Blockchain cloud computing Ontologies Privacy Semantic Web
tom Programming-based formal languages and automata theory: design, implement, validate, and prove By www.computingreviews.com Published On :: Thu, 24 Oct 2024 12:00:00 PST This rather difficult read introduces the programming language FSM and the programming platform DrRacket. The author asserts that it is a convenient platform to design and prove an automata-based software Full Article
tom Artificial intelligence to automate the systematic review of scientific literature from Computing By www.computingreviews.com Published On :: Thu, 07 Nov 2024 12:00:00 PST The study shows that artificial intelligence (AI) has become highly important in contemporary computing because of its capacity to efficiently tackle intricate jobs that were typically carried out by people. The authors provide scientific literature that analyzes and Full Article
tom Zendaya, Tom Holland in cast for Christopher Nolan's next movie By www.philstar.com Published On :: Wed, 13 Nov 2024 18:42:00 +0800 Celebrity couple Tom Holland and Zendaya are the highlight names in the cast for Academy Award-winning director Christopher Nolan's next movie. Full Article
tom ASRock Phantom Gaming X870E NOVA WiFi Review and more @ NT Compatible By www.majorgeeks.com Published On :: Tue, 05 Nov 2024 02:29:07 -0500 ... Full Article
tom Desktop Slideshow Customization: How To Keep Your Backgrounds Fresh By www.majorgeeks.com Published On :: Mon, 11 Nov 2024 08:54:36 -0500 ... Full Article
tom Report: The #1 Computer Brand for Customer Satisfaction By clark.com Published On :: Wed, 29 Sep 2021 14:00:00 +0000 If you’re in the market for a laptop or desktop PC, you know that pretty much all of them come with impressive features. But which brands stand out from the rest? The American Customer Satisfaction Index (ACSI) Household Appliance and Electronics Study 2024 rates the best computer brands and types of devices according to customer […] The post Report: The #1 Computer Brand for Customer Satisfaction appeared first on Clark Howard. Full Article Mobile & Electronics
tom How to customize main front page-OpenScholar 3.0 By community.openscholar.harvard.edu Published On :: Thu, 31 Jul 2014 19:44:15 +0000 Tags: openscholar Full Article
tom Electric taxi project: Sindh senior minister meets automaker representatives By tribune.com.pk Published On :: Thu, 12 Sep 24 09:36:57 +0500 Sharjeel Memon meets GAC and Dewan Motors to discuss electric taxi options, assuring full govt cooperation. Full Article Pakistan
tom All Aboard Tommy Hilfiger's Star-Studded Spring 2025 Ready-to-Wear Show at NYFW! By tribune.com.pk Published On :: Mon, 09 Sep 24 10:36:46 +0500 Tommy Hilfiger set sail on a decommissioned ferry and delivered a show that was all style and swagger! Full Article T.Edit
tom Payment details of Tom Cruise’s Olympics stunt revealed By tribune.com.pk Published On :: Thu, 12 Sep 24 09:21:04 +0500 Casey Wasserman, LA28 President and Chair, discloses amount Cruise charged for his 15-minute performance Full Article Life & Style
tom WordPress. How to add custom link to menu By www.templatemonster.com Published On :: Thu, 02 Jan 2020 07:36:07 +0000 This tutorial shows how to add a custom link to the menu in WordPress. The post WordPress. How to add custom link to menu appeared first on Template Monster Help. Full Article WordPress Tutorials custom link menu WordPress
tom Shopify. How to add icon into Custom block By www.templatemonster.com Published On :: Fri, 03 Jan 2020 09:10:31 +0000 The following tutorial is going to show you how to add an icon into Custom block in Shopify. The post Shopify. How to add icon into Custom block appeared first on Template Monster Help. Full Article Shopify Tutorials block icon Shopify
tom Margot Robbie, Tom Ackerley showcase happiness after ‘long time' desire comes true By www.geo.tv Published On :: Wed, 13 Nov 2024 16:24:00 +0500 Margot Robbie, Tom Ackerley showcase happiness after ‘long time' desire comes trueMargot Robbie and Tom Ackerley are “settling” into their roles after becoming parents for the first time.A source who is close to the couple candidly shared with People how the... Full Article
tom How to install a bottom braket on your BMX Bike (Video ENG) By www.kunstform.org Published On :: 2013-02-12 15:43:48 It will happen in the course of time, that's your bottom bracket broke down. If you do not know exactly how you should install a new bearing, then you look at this video! Basically, the bottom bracket differ in "loose ball" and "sealed bearing". The loose ball bottom bracket are installed in many cheap beginners bikes. The bearings in turn differ in different sizes. Starting with the largest outer diameter are US-BB, MID-BB, SPAN-BB and EURO-BB. The EURO-BB you recognize the screw thread and are rarely built on a BMX frame. This is important, first you have to check if you have a 19mm or a 22mm axle crank! Full Article
tom Game of HORST - Felix Prangenberg vs. Tom Weikert By www.kunstform.org Published On :: 2019-04-17 16:55:34 Felix Prangenberg definitely has media attention. 3 new videos in 3 days ain't too bad... This time Felix (currently street rider of the year) appears in the current episode of Game of HORST and competes against the newcomer of the year Tom Weikert. We are already curious about who will make it. Because there's a little more tension as you thought, as Felix has helped Tom as a kind of mentor to geht his wethepeople deal. So will they duel fiercely, or will we see a soft-washed bro Game of HORST? Just find out now! Enjoy the video, your kunstform BMX Shop Team! Video: Freedombmx Related links: all Signature Parts of Felix Prangenberg freedombmx Full Article
tom Custom BMX Configurator v2 - Save your configurations By www.kunstform.org Published On :: 2019-06-27 10:34:50 You want to create a new Custom BMX, but you have no plan, what color should it be? Are you unsure whether the new handlebar and the fork in green color match your current BMX bike? Then try it out with our new Custom BMX Configurator! We have already added a share button, so you can show your dream BMX to your friends. As of now, you can also save your configured Custom BMX via short link. Simply click on "SAVE", then on "COPY LINK" to save the short link on your device. You are then able to view your configured BMX from any device, make changes to it and save a new configuration again. Custom BMX Configurator Please note: products can not currently be selected. However, we are working to provide this functionality as soon as possible. Then you can configure your dream BMX online, order it and get it sent home preassembled. Full Article
tom Tom Venzke & Elias Bauer – Welcome to the Family! By www.kunstform.org Published On :: 2020-05-25 09:59:46 Our Bros Tom Venzke & Elias Bauer from Berlin are now officially part of the kunstform BMX Shop Team 2020/21. Due to Corona there is currently no Welcome to the Team Edit. So that nobody has to go empty-handed here, you can now treat yourself with an Insta Mix by Elias & Tom. There is only one thing left to say: Welcome to the team! Have fun with the video, your kunstform BMX Shop Team! Video: freedombmx Related links: all products of kunstform freedombmx Youtube Channel Full Article
tom Tom Venzke By www.kunstform.org Published On :: 2020-07-21 21:06:35 Tom Venzke is Street! BMX Since: 2012 BMX Discipline: BMX Street Hometown: Zepernick Residence: Zepernick Sponsors: kunstform BMX Shop Homespots: Skatepark Bernau, Sidewalks Favorite Spots: everywhere if my bros are there Favorite thing beside BMX: having fun with friends Instagram: @tom_venzke Full Article
tom [UK] New store opening in Bristol tomorrow By brickset.com Published On :: Wed, 06 Nov 2024 22:00:00 GMT The UK's latest brand store, at Cribbs Causeway shopping centre near Bristol, opens at 10am tomorrow. It's a bit of a mystery why the location was chosen for a new store when it's so close to the branch in the centre of the city, particularly as there are other parts of the country crying out for one, but at least it's much easier to get to by car, being just off the M5, junction 17. Those visiting the store on or before the 10th of November will receive 40528 LEGO Brand Retail Store on purchases over £120. The shop, which is near Boots on the upper floor of the centre, hosted a press/AFOL event this evening at which our Bristol-based correspondent Emily took the photos of the inside that you'll find after the break. Continue reading »© 2024 Brickset.com. Republication prohibited without prior permission. Full Article