base Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK By Published On :: Full Article
base Examining a Flow-Usage Model to Understand MultiMedia-Based Learning By Published On :: Full Article
base Introduction to the Special Section on Game-based Learning: Design and Applications (GbL) By Published On :: Full Article
base Text-Based Collaborative Work and Innovation: Effects of Communication Media Affordances on Divergent and Convergent Thinking in Group-Based Problem-Solving By Published On :: Full Article
base (SNTL #3) Design and Implementation Challenges to an Interactive Social Media Based Learning Environment By Published On :: Full Article
base Reasons for Poor Acceptance of Web-Based Learning using an LMS and VLE in Ghana By Published On :: 2017-05-20 Aim/Purpose: This study investigates the factors that affect the post implementation success of a web-based learning management system at the University of Professional Studies, Accra (UPSA). Background: UPSA implemented an LMS to blend Web-based learning environment with the traditional methods of education to enable working students to acquire education. Methodology: An explanatory sequential mixed method was adopted, under the pragmatic paradigm, to investigate the level of acceptance of web-based learning by students. The effects of perceived usefulness, perceived ease of use, and other social factors were investigated. In all, 4500 final and third-year undergraduate students of UPSA made up the population. A sample size of 870 was used for this study. Contribution: This paper contributes to the body of knowledge by identifying the factors that hinder post-implementation of LMS at the tertiary level in Ghana and adds to the general literature available. Findings: The level of acceptance of LMS seems very low due to poor IT infrastructure, inadequate training, and the relevance of the system to quality lecture delivery. However, students’ intention to use LMS and the usefulness of LMS were perceived to be high, especially among students in higher levels. Recommendations for Practitioners: The authors recommend that IT infrastructure, especially reliable and fast internet connectivity, and adequate training should be provided. Recommendation for Researchers: Further research should be done to confirm if the provision of a more reliable internet system will boost students’ internet proficiency, which in turn will improve their utilisation of the LMS. Impact on Society: Help create awareness of schooling while pursuing a career and also improve interactions between students and lecturers. It will also improve enrolment and possibly reduce the cost of education in the long-run. Future Research: Researchers can look at the possibility of implementing total virtual learning systems at the tertiary level in Ghana. Full Article
base A Cognitive Knowledge-based Framework for Social and Metacognitive Support in Mobile Learning By Published On :: 2017-03-16 Aim/Purpose: This work aims to present a knowledge modeling technique that supports the representation of the student learning process and that is capable of providing a means for self-assessment and evaluating newly acquired knowledge. The objective is to propose a means to address the pedagogical challenges in m-learning by aiding students’ metacognition through a model of a student with the target domain and pedagogy. Background: This research proposes a framework for social and meta-cognitive support to tackle the challenges raised. Two algorithms are introduced: the meta-cognition algorithm for representing the student’s learning process, which is capable of providing a means for self-assessment, and the social group mapping algorithm for classifying students according to social groups. Methodology : Based on the characteristics of knowledge in an m-learning system, the cognitive knowledge base is proposed for knowledge elicitation and representation. The proposed technique allows a proper categorization of students to support collaborative learning in a social platform by utilizing the strength of m-learning in a social context. The social group mapping and metacognition algorithms are presented. Contribution: The proposed model is envisaged to serve as a guide for developers in implementing suitable m-learning applications. Furthermore, educationists and instructors can devise new pedagogical practices based on the possibilities provided by the proposed m-learning framework. Findings: The effectiveness of any knowledge management system is grounded in the technique used in representing the knowledge. The CKB proposed manipulates knowledge as a dynamic concept network, similar to human knowledge processing, thus, providing a rich semantic capability, which provides various relationships between concepts. Recommendations for Practitioners: Educationist and instructors need to develop new pedagogical practices in line with m-learning. Recommendation for Researchers: The design and implementation of an effective m-learning application are challenging due to the reliance on both pedagogical and technological elements. To tackle this challenge, frameworks which describe the conceptual interaction between the various components of pedagogy and technology need to be proposed. Impact on Society: The creation of an educational platform that provides instant access to relevant knowledge. Future Research: In the future, the proposed framework will be evaluated against some set of criteria for its effectiveness in acquiring and presenting knowledge in a real-life scenario. By analyzing real student interaction in m-learning, the algorithms will be tested to show their applicability in eliciting student metacognition and support for social interactivity. Full Article
base PRATO: An Automated Taxonomy-Based Reviewer-Proposal Assignment System By Published On :: 2018-10-20 Aim/Purpose: This paper reports our implementation of a prototype system, namely PRATO (Proposals Reviewers Automated Taxonomy-based Organization), for automatic assignment of proposals to reviewers based on categorized tracks and partial matching of reviewers’ profiles of research interests against proposal keywords. Background: The process of assigning reviewers to proposals tends to be a complicated task as it involves inspecting the matching between a given proposal and a reviewer based on different criteria. The situation becomes worse if one tries to automate this process, especially if a reviewer partially matches the domain of the paper at hand. Hence, a new controlled approach is required to facilitate the matching process. Methodology: Proposals and reviewers are organized into categorized tracks as defined by a tree of hierarchical research domains which correspond to the university’s colleges and departments. In addition, reviewers create their profiles of research interests (keywords) at the time of registration. Initial assignment is based on the matching of categorized sub-tracks of proposal and reviewer. Where the proposal and a reviewer fall under different categories (sub-tracks), assignment is done based on partial matching of proposal content against re-viewers’ research interests. Jaccard similarity coefficient scores are calculated of proposal keywords and reviewers’ profiles of research interest, and the reviewer with highest score is chosen. The system was used to automate the process of proposal-reviewer assignment at the Umm Al-Qura University during the 2017-2018 funding cycle. The list of proposal-reviewer assignments generated by the system was sent to human experts for voting and subsequently to make final assignments accordingly. With expert votes and final decisions as evaluation criteria, data system-expert agreements (in terms of “accept” or “reject”) were collected and analyzed by tallying frequencies and calculating rejection/acceptance ratios to assess the system’s performance. Contribution: This work helped the Deanship of Scientific Research (DSR), a funding agency at Umm Al-Qura University, in managing the process of reviewing proposals submitted for funding. We believe the work can also benefit any organizations or conferences to automate the assignment of papers to the most appropriate reviewers. Findings: Our developed prototype, PRATO, showed a considerable impact on the entire process of reviewing proposals at DSR. It automated the assignment of proposals to reviewers and resulted in 56.7% correct assignments overall. This indicates that PRATO performed considerably well at this early stage of its development. Recommendations for Practitioners: It is important for funding agencies and publishers to automate reviewing process to obtain better reviewing quality in a timely manner. Recommendation for Researchers: This work highlighted a new methodology to tackle the proposal-reviewer assignment task in an automated manner. More evaluation might be needed with consideration of different categories, especially for partially matched candidates. Impact on Society: The new methodology and knowledge about factors influencing the implementation of automated proposal-reviewing systems will help funding agencies and publishers to improve the quality of their internal processes. Future Research: In the future, we plan to examine PRATO’s performance on different classification schemes where specialty areas can be represented in graphs rather than trees. With graph representation, the scope for reviewer selection can be widened to include more general fields of specialty. Moreover, we will try to record the reasons for rejection to identify accurately whether the rejection was due to improper assignment or other reasons. Full Article
base Crisis and Disaster Situations on Social Media Streams: An Ontology-Based Knowledge Harvesting Approach By Published On :: 2019-10-20 Aim/Purpose: Vis-à-vis management of crisis and disaster situations, this paper focuses on important use cases of social media functions, such as information collection & dissemination, disaster event identification & monitoring, collaborative problem-solving mechanism, and decision-making process. With the prolific utilization of disaster-based ontological framework, a strong disambiguation system is realized, which further enhances the searching capabilities of the user request and provides a solution of unambiguous in nature. Background: Even though social media is information-rich, it has created a challenge for deriving a decision in critical crisis-related cases. In order to make the whole process effective and avail quality decision making, sufficiently clear semantics of such information is necessary, which can be supplemented through employing semantic web technologies. Methodology: This paper evolves a disaster ontology-based system availing a framework model for monitoring uses of social media during risk and crisis-related events. The proposed system monitors a discussion thread discovering whether it has reached its peak or decline after its root in the social forum like Twitter. The content in social media can be accessed through two typical ways: Search Application Program Interfaces (APIs) and Streaming APIs. These two kinds of API processes can be used interchangeably. News content may be filtered by time, geographical region, keyword occurrence and availability ratio. With the support of disaster ontology, domain knowledge extraction and comparison against all possible concepts are availed. Besides, the proposed method makes use of SPARQL to disambiguate the query and yield the results which produce high precision. Contribution: The model provides for the collection of crisis-related temporal data and decision making through semantic mapping of entities over concepts in a disaster ontology we developed, thereby disambiguating potential named entities. Results of empirical testing and analysis indicate that the proposed model outperforms similar other models. Findings: Crucial findings of this research lie in three aspects: (1) Twitter streams and conventional news media tend to offer almost similar types of news coverage for a specified event, but the rate of distribution among topics/categories differs. (2) On specific events such as disaster, crisis or any emergency situations, the volume of information that has been accumulated between the two news media stands divergent and filtering the most potential information poses a challenging task. (3) Relational mapping/co-occurrence of terms has been well designed for conventional news media, but due to shortness and sparseness of tweets, there remains a bottleneck for researchers. Recommendations for Practitioners: Though metadata avails collaborative details of news content and it has been conventionally used in many areas like information retrieval, natural language processing, and pattern recognition, there is still a lack of fulfillment in semantic aspects of data. Hence, the pervasive use of ontology is highly suggested that build semantic-oriented metadata for concept-based modeling, information flow searching and knowledge exchange. Recommendation for Researchers: The strong recommendation for researchers is that instead of heavily relying on conventional Information Retrieval (IR) systems, one can focus more on ontology for improving the accuracy rate and thereby reducing ambiguous terms persisting in the result sets. In order to harness the potential information to derive the hidden facts, this research recommends clustering the information from diverse sources rather than pruning a single news source. It is advisable to use a domain ontology to segregate the entities which pose ambiguity over other candidate sets thus strengthening the outcome. Impact on Society: The objective of this research is to provide informative summarization of happenings such as crisis, disaster, emergency and havoc-based situations in the real world. A system is proposed which provides the summarized views of such happenings and corroborates the news by interrelating with one another. Its major task is to monitor the events which are very booming and deemed important from a crowd’s perspective. Future Research: In the future, one shall strive to help to summarize and to visualize the potential information which is ranked high by the model. Full Article
base Improving Webpage Access Predictions Based on Sequence Prediction and PageRank Algorithm By Published On :: 2019-01-20 Aim/Purpose: In this article, we provide a better solution to Webpage access prediction. In particularly, our core proposed approach is to increase accuracy and efficiency by reducing the sequence space with integration of PageRank into CPT+. Background: The problem of predicting the next page on a web site has become significant because of the non-stop growth of Internet in terms of the volume of contents and the mass of users. The webpage prediction is complex because we should consider multiple kinds of information such as the webpage name, the contents of the webpage, the user profile, the time between webpage visits, differences among users, and the time spent on a page or on each part of the page. Therefore, webpage access prediction draws substantial effort of the web mining research community in order to obtain valuable information and improve user experience as well. Methodology: CPT+ is a complex prediction algorithm that dramatically offers more accurate predictions than other state-of-the-art models. The integration of the importance of every particular page on a website (i.e., the PageRank) regarding to its associations with other pages into CPT+ model can improve the performance of the existing model. Contribution: In this paper, we propose an approach to reduce prediction space while improving accuracy through combining CPT+ and PageRank algorithms. Experimental results on several real datasets indicate the space reduced by up to between 15% and 30%. As a result, the run-time is quicker. Furthermore, the prediction accuracy is improved. It is convenient that researchers go on using CPT+ to predict Webpage access. Findings: Our experimental results indicate that PageRank algorithm is a good solution to improve CPT+ prediction. An amount of though approximately 15 % to 30% of redundant data is removed from datasets while improving the accuracy. Recommendations for Practitioners: The result of the article could be used in developing relevant applications such as Webpage and product recommendation systems. Recommendation for Researchers: The paper provides a prediction model that integrates CPT+ and PageRank algorithms to tackle the problem of complexity and accuracy. The model has been experimented against several real datasets in order to show its performance. Impact on Society: Given an improving model to predict Webpage access using in several fields such as e-learning, product recommendation, link prediction, and user behavior prediction, the society can enjoy a better experience and more efficient environment while surfing the Web. Future Research: We intend to further improve the accuracy of webpage access prediction by using the combination of CPT+ and other algorithms. Full Article
base A Cognitive Knowledge-based Model for an Academic Adaptive e-Advising System By Published On :: 2020-10-08 Aim/Purpose: This study describes a conceptual model, based on the principles of concept algebra that can provide intelligent academic advice using adaptive, knowledge-based feedback. The proposed model advises students based on their traits and academic history. The system aims to deliver adaptive advice to students using historical data from previous and current students. This data-driven approach utilizes a cognitive knowledge-based (CKB) model to update the weights (values that indicate the strength of relationships between concepts) that exist between student’s performances and recommended courses. Background: A research study conducted at the Public Authority for Applied Education and Training (PAAET), a higher education institution in Kuwait, indicates that students’ have positive perceptions of the e-Advising system. Most students believe that PAAET’s e-Advising system is effective because it allows them to check their academic status, provides a clear vision of their academic timeline, and is a convenient, user-friendly, and attractive online service. Student advising can be a tedious element of academic life but is necessary to fill the gap between student performance and degree requirements. Higher education institutions have prioritized assisting undecided students with career decisions for decades. An important feature of e-Advising systems is personalized feedback, where tailored advice is provided based on students' characteristics and other external parameters. Previous e-Advising systems provide students with advice without taking into consideration their different attributes and goals. Methodology: This research describes a model for an e-Advising system that enables students to select courses recommended based on their personalities and academic performance. Three algorithms are used to provide students with adaptive course selection advice: the knowledge elicitation algorithm that represents students' personalities and academic information, the knowledge bonding algorithm that combines related concepts or ideas within the knowledge base, and the adaptive e-Advising model that recommends relevant courses. The knowledge elicitation algorithm acquires student and academic characteristics from data provided, while the knowledge bonding algorithm fuses the newly acquired features with existing information in the database. The adaptive e-Advising algorithm provides recommended courses to students based on existing cognitive knowledge to overcome the issues associated with traditional knowledge representation methods. Contribution: The design and implementation of an adaptive e-Advising system are challenging because it relies on both academic and student traits. A model that incorporates the conceptual interaction between the various academic and student-specific components is needed to manage these challenges. While other e-Advising systems provide students with general advice, these earlier models are too rudimentary to take student characteristics (e.g., knowledge level, learning style, performance, demographics) into consideration. For the online systems that have replaced face-to-face academic advising to be effective, they need to take into consideration the dynamic nature of contemporary students and academic settings. Findings: The proposed algorithms can accommodate a highly diverse student body by providing information tailored to each student. The academic and student elements are represented as an Object-Attribute-Relationship (OAR) model. Recommendations for Practitioners: The model proposed here provides insight into the potential relationships between students’ characteristics and their academic standing. Furthermore, this novel e-Advising system provides large quantities of data and a platform through which to query students, which should enable developing more effective, knowledge-based approaches to academic advising. Recommendation for Researchers: The proposed model provides researches with a framework to incorporate various academic and student characteristics to determine the optimal advisory factors that affect a student’s performance. Impact on Society: The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advice to students. The proposed approach can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to learning. Future Research: In future studies, the proposed algorithms will be implemented, and the adaptive e-Advising model will be tested on real-world data and then further improved to cater to specific academic settings. The proposed model will benefit e-Advising system developers in implementing updateable algorithms that can be tested and improved to provide adaptive advisory to students. The approach proposed can provide new insight to advisors on possible relationships between student’s characteristics and current academic settings. Thus, providing a means to develop new curriculums and approaches to course recommendation. Full Article
base The Effect of Rational Based Beliefs and Awareness on Employee Compliance with Information Security Procedures: A Case Study of a Financial Corporation in Israel By Published On :: 2020-07-02 Aim/Purpose: This paper examines the behavior of financial firm employees with regard to information security procedures instituted within their organization. Furthermore, the effect of information security awareness and its importance within a firm is explored. Background: The study focuses on employees’ attitude toward compliance with information security policies (ISP), combined with various norms and personal abilities. Methodology: A self-reported questionnaire was distributed among 202 employees of a large financial Corporation Contribution: As far as we know, this is the first paper to thoroughly explore employees’ awareness of information system procedures, among financial organizations in Israel, and also the first to develop operative recommendations for these organizations aimed at increasing ISP compliance behavior. The main contribution of this study is that it investigates compliance with information security practices among employees of a defined financial corporation operating under rigid regulatory governance, confidentiality and privacy of data, and stringent requirements for compliance with information security procedures. Findings: Our results indicate that employees’ attitudes, normative beliefs and personal capabilities to comply with firm’s ISP, have positive effects on the firm’s ISP compliance. Also, employees’ general awareness of IS, as well as awareness to ISP within the firm, positively affect employees’ ISP compliance. Recommendations for Practitioners: This study can help information security managers identify the motivating factors for employee behavior to maintain information security procedures, properly channel information security resources, and manage appropriate information security behavior. Recommendation for Researchers: Researchers can see that corporate rewards and sanctions have significant effects on employee security behavior, but other motivational factors also reinforce the ISP’s compliance behavior. Distinguishing between types of corporations and organizations is essential to understanding employee compliance with information security procedures. Impact on Society: This study offers another level of understanding of employee behavior with regard to information security in organizations and comprises a significant contribution to the growing knowledge in this area. The research results form an important basis for IS policymakers, culture designers, managers, and those directly responsible for IS in the organization. Future Research: Future work should sample employees from another type of corporation from other fields and should apply qualitative analysis to explore other aspects of behavioral patterns related to the subject matter. Full Article
base IDCUP Algorithm to Classifying Arbitrary Shapes and Densities for Center-based Clustering Performance Analysis By Published On :: 2020-05-04 Aim/Purpose: The clustering techniques are normally considered to determine the significant and meaningful subclasses purposed in datasets. It is an unsupervised type of Machine Learning (ML) where the objective is to form groups from objects based on their similarity and used to determine the implicit relationships between the different features of the data. Cluster Analysis is considered a significant problem area in data exploration when dealing with arbitrary shape problems in different datasets. Clustering on large data sets has the following challenges: (1) clusters with arbitrary shapes; (2) less knowledge discovery process to decide the possible input features; (3) scalability for large data sizes. Density-based clustering has been known as a dominant method for determining the arbitrary-shape clusters. Background: Existing density-based clustering methods commonly cited in the literature have been examined in terms of their behavior with data sets that contain nested clusters of varying density. The existing methods are not enough or ideal for such data sets, because they typically partition the data into clusters that cannot be nested. Methodology: A density-based approach on traditional center-based clustering is introduced that assigns a weight to each cluster. The weights are then utilized in calculating the distances from data vectors to centroids by multiplying the distance by the centroid weight. Contribution: In this paper, we have examined different density-based clustering methods for data sets with nested clusters of varying density. Two such data sets were used to evaluate some of the commonly cited algorithms found in the literature. Nested clusters were found to be challenging for the existing algorithms. In utmost cases, the targeted algorithms either did not detect the largest clusters or simply divided large clusters into non-overlapping regions. But, it may be possible to detect all clusters by doing multiple runs of the algorithm with different inputs and then combining the results. This work considered three challenges of clustering methods. Findings: As a result, a center with a low weight will attract objects from further away than a centroid with higher weight. This allows dense clusters inside larger clusters to be recognized. The methods are tested experimentally using the K-means, DBSCAN, TURN*, and IDCUP algorithms. The experimental results with different data sets showed that IDCUP is more robust and produces better clusters than DBSCAN, TURN*, and K-means. Finally, we compare K-means, DBSCAN, TURN*, and to deal with arbitrary shapes problems at different datasets. IDCUP shows better scalability compared to TURN*. Future Research: As future recommendations of this research, we are concerned with the exploration of further available challenges of the knowledge discovery process in clustering along with complex data sets with more time. A hybrid approach based on density-based and model-based clustering algorithms needs to compare to achieve maximum performance accuracy and avoid the arbitrary shapes related problems including optimization. It is anticipated that the comparable kind of the future suggested process will attain improved performance with analogous precision in identification of clustering shapes. Full Article
base A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model By Published On :: 2022-12-03 Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods. Full Article
base A Novel Telecom Customer Churn Analysis System Based on RFM Model and Feature Importance Ranking By Published On :: 2023-10-03 Aim/Purpose: In this paper, we present an RFM model-based telecom customer churn system for better predicting and analyzing customer churn. Background: In the highly competitive telecom industry, customer churn is an important research topic in customer relationship management (CRM) for telecom companies that want to improve customer retention. Many researchers focus on a telecom customer churn analysis system to find out the customer churn factors for improving prediction accuracy. Methodology: The telecom customer churn analysis system consists of three main parts: customer segmentation, churn prediction, and churn factor identification. To segment the original dataset, we use the RFM model and K-means algorithm with an elbow method. We then use RFM-based feature construction for customer churn prediction, and the XGBoost algorithm with SHAP method to obtain a feature importance ranking. We chose an open-source customer churn dataset that contains 7,043 instances and 21 features. Contribution: We present a novel system for churn analysis in telecom companies, which encompasses customer churn prediction, customer segmentation, and churn factor analysis to enhance business strategies and services. In this system, we leverage customer segmentation techniques for feature construction, which enables the new features to improve the model performance significantly. Our experiments demonstrate that the proposed system outperforms current advanced customer churn prediction methods in the same dataset, with a higher prediction accuracy. The results further demonstrate that this churn analysis system can help telecom companies mine customer value from the features in a dataset, identify the primary factors contributing to customer churn, and propose suitable solution strategies. Findings: Simulation results show that the K-means algorithm gets better results when the original dataset is divided into four groups, so the K value is selected as 4. The XGBoost algorithm achieves 79.3% and 81.05% accuracy on the original dataset and new data with RFM, respectively. Additionally, each cluster has a unique feature importance ranking, allowing for specialized strategies to be provided to each cluster. Overall, our system can help telecom companies implement effective CRM and marketing strategies to reduce customer churn. Recommendations for Practitioners: More accurate churn prediction reduces misjudgment of customer churn. The acquisition of customer churn factors makes the company more convenient to analyze the reasons for churn and formulate relevant conservation strategies. Recommendation for Researchers: The research achieves 81.05% accuracy for customer churn prediction with the Xgboost and RFM algorithms. We believe that more enhancements algorithms can be attempted for data preprocessing for better prediction. Impact on Society: This study proposes a more accurate and competitive customer churn system to help telecom companies conserve the local markets and reduce capital outflows. Future Research: The research is also applicable to other fields, such as education, banking, and so forth. We will make more new attempts based on this system. Full Article
base Antecedents of Business Analytics Adoption and Impacts on Banks’ Performance: The Perspective of the TOE Framework and Resource-Based View By Published On :: 2023-09-18 Aim/Purpose: This study utilized a comprehensive framework to investigate the adoption of Business Analytics (BA) and its effects on performance in commercial banks in Jordan. The framework integrated the Technological-Organizational-Environmental (TOE) model, the Diffusion of Innovation (DOI) theory, and the Resource-Based View (RBV). Background: The recent trend of utilizing data for business operations and decision-making has positively impacted organizations. Business analytics (BA) is a leading technique that generates valuable insights from data. It has gained considerable attention from scholars and practitioners across various industries. However, guidance is lacking for organizations to implement BA effectively specific to their business contexts. This research aims to evaluate factors influencing BA adoption by Jordanian commercial banks and examine how its implementation impacts bank performance. The goal is to provide needed empirical evidence surrounding BA adoption and outcomes in the Jordanian banking sector. Methodology: The study gathered empirical data by conducting an online questionnaire survey with senior and middle managers from 13 commercial banks in Jordan. The participants were purposefully selected, and the questionnaire was designed based on relevant and well-established literature. A total of 307 valid questionnaires were collected and considered for data analysis. Contribution: This study makes a dual contribution to the BA domain. Firstly, it introduces a research model that comprehensively examines the factors that influence the adoption of BA. The proposed model integrates the TOE framework, DOI theory, and RBV theory. Combining these frameworks allows for a comprehensive examination of BA adoption in the banking industry. By analyzing the technological, organizational, and environmental factors through the TOE framework, understanding the diffusion process through the DOI theory, and assessing the role of resources and capabilities through the RBV theory, researchers and practitioners can better understand the complex dynamics involved. This integrated approach enables a more nuanced assessment of the factors that shape BA adoption and its subsequent impact on business performance within the banking industry. Secondly, it uncovers the effects of BA adoption on business performance. These noteworthy findings stem from a rigorous analysis of primary data collected from commercial banks in Jordan. By presenting a holistic model and delving into the implications for business performance, this research offers valuable insights to researchers and practitioners alike in the field of BA. Findings: The findings revealed that various technological (data quality, complexity, compatibility, relative advantage), organizational (top management support, organizational readiness), and environmental (external support) factors are crucial in shaping the decision to adopt BA. Furthermore, the study findings demonstrated a positive relationship between BA adoption and performance outcomes in Jordanian commercial banks. Recommendations for Practitioners: The findings suggest that Jordanian commercial banks should enforce data quality practices, provide clear standards, invest in data quality tools and technologies, and conduct regular data audits. Top management support is crucial for fostering a data-driven decision-making culture. Organizational readiness involves having the necessary resources and skilled personnel, as well as promoting continuous learning and improvement. Highlighting the benefits of BA helps overcome resistance to technological innovation and encourages adoption by demonstrating improved decision-making processes and operational efficiency. Furthermore, external support is crucial for banks to adopt Business Analytics (BA). Banks should partner with experienced vendors to gain expertise and incorporate best practices. Vendors also provide training and technical support to overcome technological barriers. Compatibility is essential for optimal performance, requiring managers to modify workflows and IT infrastructure. Complexity, including data, organizational, and technical complexities, is a major obstacle to BA adoption. Banks should take a holistic approach, focusing on people, processes, and technology, and prioritize data quality and governance. Building a skilled team, fostering a data-driven culture, and investing in technology and infrastructure are essential. Recommendation for Researchers: The integration of the TOE framework, the DOI theory, and the RBV theory can prove to be a powerful approach for comprehensively analyzing the various factors that influence BA adoption within the dynamic banking industry. Furthermore, this combined framework enables us to gain deeper insights into the subsequent impact of BA adoption on overall business performance. Impact on Society: Examining the factors influencing BA adoption in the banking industry and its subsequent impact on business performance can have wide-ranging societal implications. It can promote data-driven decision-making, enhance customer experiences, strengthen fraud detection, foster financial inclusion, contribute to economic growth, and trigger discussions on ethical considerations. Future Research: To further advance future research, there are several avenues to consider. One option is to broaden the scope by including a larger sample size, allowing for a more comprehensive analysis. Another possibility is to investigate the impact of BA adoption on various performance indicators beyond the ones already examined. Additionally, incorporating qualitative research methods would provide a more holistic understanding of the organizational dynamics and challenges associated with the adoption of BA in Jordanian commercial banks. Full Article
base The Implications of Knowledge-Based HRM Practices on Open Innovations for SMEs in the Manufacturing Sector By Published On :: 2023-08-04 Aim/Purpose: The main aim of this study was to investigate the impact of knowledge-based Human Resources Management (HRM) practices on inbound and outbound open innovation in Jordanian small and medium enterprises (SMEs). Background: SMEs in Jordan lack tangible resources. This insufficiency can be remedied by using knowledge as a resource. According to the Knowledge-Based View (KBV) theory, which posits knowledge as the most valuable resource, SMEs can achieve open innovation by implementing knowledge-based HRM practices that enhance the utilization of knowledge and yield competitiveness. Methodology: This study adopted the quantitative method employing descriptive and exploratory approaches. A total of 500 Jordanian manufacturing SMEs were selected from 2,310 manufacturing SMEs registered lists, according to the Jordan Social Security, by using random sampling. The study’s instrument was a questionnaire that was applied to these SMEs. There were 335 responses that were deemed useful for analysis after filtering out the replies with missing values; this corresponded to a response rate of 67%. The paper utilized structural equation modeling and cross-sectional design to test hypotheses in the proposed research model. Contribution: This study advocates the assumption of the role of KBV in improving innovation practices. This study contributes to the existing strategic HRM research by extending the understanding of knowledge-based HRM practices in the context of SMEs. Thus, this study contributes to the understanding of innovation management by demonstrating the role of knowledge-based HRM practices in boosting inbound and outbound OI practices, thereby enhancing innovation as an essential component of firm competitiveness. Findings: The findings revealed the positive impact of four knowledge-based HRM practices on inbound and outbound open innovation in Jordanian manufacturing SMEs. These practices were knowledge-based recruitment and selection, knowledge-based training and development, knowledge-based compensation and reward, as well as knowledge-based performance assessment. Recommendations for Practitioners: This study is expected to help the stakeholders of SMEs to re-shape the traditional HRM practices into knowledge-based practices which improve managerial skills, innovation practices, and the level of the firm’s competitiveness. Recommendation for Researchers: This study serves as a significant contribution to the research field of innovation practices by building a new association between knowledge-based HRM practices and inbound and outbound open innovation. Impact on Society: The study emphasizes the vital role of knowledge-based HRM practices in enhancing the knowledge and social skills of the human capital in SMEs in Jordan, thus improving the country’s social and economic development. Future Research: Future research could build on this study to include service SMEs. It could also employ a longitudinal study over the long run which would allow for a deeper analysis of the relationships of causality, offering a more comprehensive view of the effect of knowledge-based HRM on open innovation. Furthermore, future research could examine the sample of investigation before and after implementing the knowledge-based HRM practices to provide stronger evidence of their influence on inbound and outbound innovation. Full Article
base Factors Influencing User’s Intention to Adopt AI-Based Cybersecurity Systems in the UAE By Published On :: 2023-07-25 Aim/Purpose: The UAE and other Middle Eastern countries suffer from various cybersecurity vulnerabilities that are widespread and go undetected. Still, many UAE government organizations rely on human-centric approaches to combat the growing cybersecurity threats. These approaches are ineffective due to the rapid increase in the amount of data in cyberspace, hence necessitating the employment of intelligent technologies such as AI cybersecurity systems. In this regard, this study investigates factors influencing users’ intention to adopt AI-based cybersecurity systems in the UAE. Background: Even though UAE is ranked among the top countries in embracing emerging technologies such as digital identity, robotic process automation (RPA), intelligent automation, and blockchain technologies, among others, it has experienced sluggish adoption of AI cybersecurity systems. This selectiveness in adopting technology begs the question of what factors could make the UAE embrace or accept new technologies, including AI-based cybersecurity systems. One of the probable reasons for the slow adoption and use of AI in cybersecurity systems in UAE organizations is the employee’s perception and attitudes towards such intelligent technologies. Methodology: The study utilized a quantitative approach whereby web-based questionnaires were used to collect data from 370 participants working in UAE government organizations considering or intending to adopt AI-based cybersecurity systems. The data was analyzed using the PLS-SEM approach. Contribution: The study is based on the Protection Motivation Theory (PMT) framework, widely used in information security research. However, it extends this model by including two more variables, job insecurity and resistance to change, to enhance its predictive/exploratory power. Thus, this research improves PMT and contributes to the body of knowledge on technology acceptance, especially in intelligent cybersecurity technology. Findings: This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. All the hypotheses were accepted. The relationship between the six constructs (perceived vulnerability (PV), perceived severity (PS), perceived response efficacy (PRE), perceived self-efficacy (PSE), job insecurity (JI), and resistance to change (RC)) and the intention to adopt AI cybersecurity systems in the UAE was found to be statistically significant. This paper’s findings provide the basis from which further studies can be conducted while at the same time offering critical insights into the measures that can boost the acceptability and use of cybersecurity systems in the UAE. Recommendations for Practitioners: All practitioners must be able to take steps and strategies that focus on factors that have a significant impact on increasing usage intentions. PSE and PRE were found to be positively related to the intention to adopt AI-based cybersecurity systems, suggesting the need for practitioners to focus on them. The government can enact legislation that emphasizes the simplicity and awareness of the benefits of cybersecurity systems in organizations. Recommendation for Researchers: Further research is needed to include other variables such as facilitating conditions, AI knowledge, social influence, and effort efficacy as well as other frameworks such as UTAUT, to better explain individuals’ behavioral intentions to use cybersecurity systems in the UAE. Impact on Society: This study can help all stakeholders understand what factors can increase users’ interest in investing in the applications that are embedded with security. As a result, they have an impact on economic recovery following the COVID-19 pandemic. Future Research: Future research is expected to investigate additional factors that can influence individuals’ behavioral intention to use cybersecurity systems such as facilitating conditions, AI knowledge, social influence, effort efficacy, as well other variables from UTAUT. International research across nations is also required to build a larger sample size to examine the behavior of users. Full Article
base Medicine Recommender System Based on Semantic and Multi-Criteria Filtering By Published On :: 2023-07-21 Aim/Purpose: This study aims to devise a personalized solution for online healthcare platforms that can alleviate problems arising from information overload and data sparsity by providing personalized healthcare services to patients. The primary focus of this paper is to develop an effective medicine recommendation approach for recommending suitable medications to patients based on their specific medical conditions. Background: With a growing number of people becoming more conscious about their health, there has been a notable increase in the use of online healthcare platforms and e-services as a means of diagnosis. As the internet continues to evolve, these platforms and e-services are expected to play an even more significant role in the future of healthcare. For instance, WebMD and similar platforms offer valuable tools and information to help manage patients’ health, such as searching for medicines based on their medical conditions. Nonetheless, patients often find it arduous and time-consuming to sort through all the available medications to find the ones that match their specific medical conditions. To address this problem, personalized recommender systems have emerged as a practical solution for mitigating the burden of information overload and data sparsity-related issues that are frequently encountered on online healthcare platforms. Methodology: The study utilized a dataset of MC ratings obtained from WebMD, a popular healthcare website. Patients on this website can rate medications based on three criteria, including medication effectiveness, ease of use, and satisfaction, using a scale of 1 to 5. The WebMD MC rating dataset used in this study contains a total of 32,054 ratings provided by 2,136 patients for 845 different medicines. The proposed HSMCCF approach consists of two primary modules: a semantic filtering module and a multi-criteria filtering module. The semantic filtering module is designed to address the issues of data sparsity and new item problems by utilizing a medicine taxonomy that sorts medicines according to medical conditions and makes use of semantic relationships between them. This module identifies the medicines that are most likely to be relevant to patients based on their current medical conditions. The multi-criteria filtering module, on the other hand, enhances the approach’s ability to capture the complexity of patient preferences by considering multiple criteria and preferences through a unique similarity metric that incorporates both distance and structural similarities. This module ensures that patients receive more accurate and personalized medication recommendations. Moreover, a medicine reputation score is employed to ensure that the approach remains effective even when dealing with limited ratings or new items. Overall, the combination of these modules makes the proposed approach more robust and effective in providing personalized medicine recommendations for patients. Contribution: This study addresses the medicine recommendation problem by proposing a novel approach called Hybrid Semantic-based Multi-Criteria Collaborative Filtering (HSMCCF). This approach effectively recommends medications for patients based on their medical conditions and is specifically designed to overcome issues related to data sparsity and new item recommendations that are commonly encountered on online healthcare platforms. The proposed approach addresses data sparsity and new item issues by incorporating a semantic filtering module and a multi-criteria filtering module. The semantic filtering module sorts medicines based on medical conditions and uses semantic relationships to identify relevant ones. The multi-criteria filtering module accurately captures patient preferences and provides precise recommendations using a novel similarity metric. Additionally, a medicine reputation score is also employed to further expand potential neighbors, improving predictive accuracy and coverage, particularly in sparse datasets or new items with few ratings. With the HSMCCF approach, patients can receive more personalized recommendations that are tailored to their unique medical needs and conditions. By leveraging a combination of semantic-based and multi-criteria filtering techniques, the proposed approach can effectively address the challenges associated with medicine recommendations on online healthcare platforms. Findings: The proposed HSMCCF approach demonstrated superior effectiveness compared to benchmark recommendation methods in multi-criteria rating datasets in terms of enhancing both prediction accuracy and coverage while effectively addressing data sparsity and new item challenges. Recommendations for Practitioners: By applying the proposed medicine recommendation approach, practitioners can develop a medicine recommendation system that can be integrated into online healthcare platforms. Patients can then utilize this system to make better-informed decisions regarding the medications that are most suitable for their specific medical conditions. This personalized approach to medication recommendations can ultimately lead to improved patient satisfaction. Recommendation for Researchers: Integrating patient medicine reviews is a promising way for researchers to elevate the proposed medicine recommendation approach. By leveraging patient reviews, the approach can gain a more comprehensive understanding of how certain medications perform for specific medical conditions. Additionally, exploring the relationship between MC-based ratings using an improved aggregation function can potentially enhance the accuracy of medication predictions. This involves analyzing the relationship between different criteria, such as medication effectiveness, ease of use, and satisfaction of the patients, and determining the optimal weighting for each criterion based on patient feedback. A more holistic approach that incorporates patient reviews and an improved aggregation function can enable the proposed medicine recommendation approach to provide more personalized and accurate recommendations to patients. Impact on Society: To mitigate the risk of infection during the COVID-19 pandemic, the promotion of online healthcare services was actively encouraged. This allowed patients to continue accessing care and receiving treatment while adhering to physical distancing guidelines and shielding measures where necessary. As a result, the implementation of personalized healthcare services for patients is expected to be a major disruptive force in healthcare in the coming years. This study proposes a personalized medicine recommendation approach that can effectively address this issue and aid patients in making informed decisions about the medications that are most suitable for their specific medical conditions. Future Research: One way that may enhance the proposed medicine recommendation approach is to incorporate patient medicine reviews. Furthermore, the analysis of MC-based ratings using an improved aggregation function can also potentially enhance the accuracy of medication predictions. Full Article
base Customer Churn Prediction in the Banking Sector Using Machine Learning-Based Classification Models By Published On :: 2023-02-28 Aim/Purpose: Previous research has generally concentrated on identifying the variables that most significantly influence customer churn or has used customer segmentation to identify a subset of potential consumers, excluding its effects on forecast accuracy. Consequently, there are two primary research goals in this work. The initial goal was to examine the impact of customer segmentation on the accuracy of customer churn prediction in the banking sector using machine learning models. The second objective is to experiment, contrast, and assess which machine learning approaches are most effective in predicting customer churn. Background: This paper reviews the theoretical basis of customer churn, and customer segmentation, and suggests using supervised machine-learning techniques for customer attrition prediction. Methodology: In this study, we use different machine learning models such as k-means clustering to segment customers, k-nearest neighbors, logistic regression, decision tree, random forest, and support vector machine to apply to the dataset to predict customer churn. Contribution: The results demonstrate that the dataset performs well with the random forest model, with an accuracy of about 97%, and that, following customer segmentation, the mean accuracy of each model performed well, with logistic regression having the lowest accuracy (87.27%) and random forest having the best (97.25%). Findings: Customer segmentation does not have much impact on the precision of predictions. It is dependent on the dataset and the models we choose. Recommendations for Practitioners: The practitioners can apply the proposed solutions to build a predictive system or apply them in other fields such as education, tourism, marketing, and human resources. Recommendation for Researchers: The research paradigm is also applicable in other areas such as artificial intelligence, machine learning, and churn prediction. Impact on Society: Customer churn will cause the value flowing from customers to enterprises to decrease. If customer churn continues to occur, the enterprise will gradually lose its competitive advantage. Future Research: Build a real-time or near real-time application to provide close information to make good decisions. Furthermore, handle the imbalanced data using new techniques. Full Article
base Unraveling Knowledge-Based Chatbot Adoption Intention in Enhancing Species Literacy By Published On :: 2024-05-07 Aim/Purpose: This research investigated the determinant factors influencing the adoption intentions of Chatsicum, a Knowledge-Based Chatbot (KBC) aimed at enhancing the species literacy of biodiversity students. Background: This research was conducted to bridge the gap between technology, education, and biodiversity conservation. Innovative solutions are needed to empower individuals with knowledge, particularly species knowledge, in preserving the natural world. Methodology: The study employed a quantitative approach using the Partial Least Square Structural Equation Modeling (PLS-SEM) and sampled 145 university students as respondents. The research model combined the Task-Technology Fit (TTF) framework with elements from the Diffusion of Innovation (DOI), including relative advantage, compatibility, complexity, and observability. Also, the model introduced perceived trust as an independent variable. The primary dependent variable under examination was the intention to use the KBC. Contribution: The findings of this research contribute to a deeper understanding of the critical factors affecting the adoption of the KBC in biodiversity education and outreach, as studies in this context are limited. This study provides valuable insights for developers, educators, and policymakers interested in promoting species literacy and leveraging innovative technologies by analyzing the interplay of TTF and DOI constructs alongside perceived trust. Ultimately, this research aims to foster more effective and accessible biodiversity education strategies. Findings: TTF influenced all DOI variables, such as relative advantage, compatibility, observability, and trust positively and complexity negatively. In conclusion, TTF strongly affected usage intention indirectly. However, relative advantage, complexity, and observability insignificantly influenced the intention to use. Meanwhile, compatibility and trust strongly affected the use intention. Recommendations for Practitioners: Developers should prioritize building and maintaining chatbots that are aligned with the tasks, needs, and goals of the target users, as well as establishing trust through the assurance of information accuracy. Educators could develop tailored educational interventions that resonate with the values and preferences of diverse learners and are aligned closely with students’ learning needs, preferences, and curriculum while ensuring seamless integration with the existing educational context. Conservation organizations and policymakers could also utilize the findings of this study to enhance their outreach strategies, as the KBC is intended for students and biodiversity laypeople. Recommendation for Researchers: Researchers should explore the nuances of relationships between TTF and DOI, as well as trust, and consider the potential influence of mediating and moderating variables to advance the field of technology adoption in educational contexts. Researchers could also explore why relative advantage, complexity, and observability did not significantly impact the usage intention and whether specific user segments or contextual factors influence these relationships. Impact on Society: This research has significant societal impacts by improving species literacy, advancing technology in education, and promoting conservation efforts. Species knowledge could raise awareness regarding biodiversity and the importance of conservation, thereby leading to more informed and responsible citizens. Future Research: Future works should address the challenges and opportunities presented by KBCs in the context of species literacy enhancement, for example, interventions or experiments to influence the non-significant factors. Furthermore, longitudinal studies should investigate whether user behavior evolves. Ultimately, examining the correlation between species literacy, specifically when augmented by chatbots, and tangible conservation practices is an imperative domain in the future. It may entail evaluating the extent to which enhanced knowledge leads to concrete measures promoting biodiversity preservation. Full Article
base Learning-Based Models for Building User Profiles for Personalized Information Access By Published On :: 2024-04-30 Aim/Purpose: This study aims to evaluate the success of deep learning in building user profiles for personalized information access. Background: To better express document content and information during the matching phase of the information retrieval (IR) process, deep learning architectures could potentially offer a feasible and optimal alternative to user profile building for personalized information access. Methodology: This study uses deep learning-based models to deduce the domain of the document deemed implicitly relevant by a user that corresponds to their center of interest, and then used predicted domain by the best given architecture with user’s characteristics to predict other centers of interest. Contribution: This study contributes to the literature by considering the difference in vocabulary used to express document content and information needs. Users are integrated into all research phases in order to provide them with relevant information adapted to their context and their preferences meeting their precise needs. To better express document content and information during this phase, deep learning models are employed to learn complex representations of documents and queries. These models can capture hierarchical, sequential, or attention-based patterns in textual data. Findings: The results show that deep learning models were highly effective for building user profiles for personalized information access since they leveraged the power of neural networks in analyzing and understanding complex patterns in user behavior, preferences, and user interactions. Recommendations for Practitioners: Building effective user profiles for personalized information access is an ongoing process that requires a combination of technology, user engagement, and a commitment to privacy and security. Recommendation for Researchers: Researchers involved in building user profiles for personalized information access play a crucial role in advancing the field and developing more innovative deep-based networks solutions by exploring novel data sources, such as biometric data, sentiment analysis, or physiological signals, to enhance user profiles. They can investigate the integration of multimodal data for a more comprehensive understanding of user preferences. Impact on Society: The proposed models can provide companies with an alternative and sophisticated recommendation system to foster progress in building user profiles by analyzing complex user behavior, preferences, and interactions, leading to more effective and dynamic content suggestions. Future Research: The development of user profile evolution models and their integration into a personalized information search system may be confronted with other problems such as the interpretability and transparency of the learning-based models. Developing interpretable machine learning techniques and visualization tools to explain how user profiles are constructed and used for personalized information access seems necessary to us as a future extension of our work. Full Article
base Hybrid encryption of Fernet and initialisation vector with attribute-based encryption: a secure and flexible approach for data protection By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 With the continuous growth and importance of data, the need for strong data protection becomes crucial. Encryption plays a vital role in preserving the confidentiality of data, and attribute-based encryption (ABE) offers a meticulous access control system based on attributes. This study investigates the integration of Fernet encryption with initialisation vector (IV) and ABE, resulting in a hybrid encryption approach that enhances both security and flexibility. By combining the advantages of Fernet encryption and IV-based encryption, the hybrid encryption scheme establishes an effective and robust mechanism for safeguarding data. Fernet encryption, renowned for its simplicity and efficiency, provides authenticated encryption, guaranteeing both the confidentiality and integrity of the data. The incorporation of an initialisation vector (IV) introduces an element of randomness into the encryption process, thereby strengthening the overall security measures. This research paper discusses the advantages and drawbacks of the hybrid encryption of Fernet and IV with ABE. Full Article
base Map reduce-based scalable Lempel-Ziv and application in route prediction By www.inderscience.com Published On :: 2024-06-04T23:20:50-05:00 Prediction of route based on historical trip observation of users is widely employed in location-based services. This work concentrates on building a route prediction system using Lempel-Ziv technique applied to a historical corpus of user travel data. Huge continuous logs of historical GPS traces representing the user's location in past are decomposed into smaller logical units known as trips. User trips are converted into sequences of road network edges using a process known as map matching. Lempel-Ziv is applied on road network edges to build the prediction model that captures the user's travel pattern in the past. A two-phased model is proposed using a map reduce framework without losing accuracy and efficiency. Model is then used to predict the user's end-to-end route given a partial route travelled by the user at any point in time. The objective of the proposed work is to build a Route Prediction system in which model building and prediction both are horizontally scalable. Full Article
base A Cognitive and Logic Based Model for Building Glass-Box Learning Objects By Published On :: Full Article
base Ontology-Driven E-Learning System Based on Roles and Activities for Thai Learning Environment By Published On :: Full Article
base Building a Framework to Support Project-Based Collaborative Learning Experiences in an Asynchronous Learning Network By Published On :: Full Article
base Using a Collaborative Database to Enhance Students’ Knowledge Construction By Published On :: Full Article
base Student Performance and Perceptions in a Web-Based Competitive Computer Simulation By Published On :: Full Article
base Complexity of Social Interactions in Collaborative Learning: The Case of Online Database Environment By Published On :: Full Article
base The Effect of Procrastination on Multi-Drafting in a Web-Based Learning Content Management Environment By Published On :: Full Article
base Comparison of Online Learning Behaviors in School vs. at Home in Terms of Age and Gender Based on Log File Analysis By Published On :: Full Article
base Developing Web-Based Learning Resources in School Education: A User-Centered Approach By Published On :: Full Article
base Examining the Effectiveness of Web-Based Learning Tools in Middle and Secondary School Science Classrooms By Published On :: Full Article
base Teachers for "Smart Classrooms": The Extent of Implementation of an Interactive Whiteboard-based Professional Development Program on Elementary Teachers' Instructional Practices By Published On :: Full Article
base If We Build It, Will They Come? Adoption of Online Video-Based Distance Learning By Published On :: Full Article
base Exploring the Influence of Context on Attitudes toward Web-Based Learning Tools (WBLTs) and Learning Performance By Published On :: Full Article
base On-Line Project-Based Peer Assessed Competitions as an Instructional Strategy in Higher Education By Published On :: Full Article
base Assessing the Effectiveness of Web-Based Tutorials Using Pre- and Post-Test Measurements By Published On :: Full Article
base Does Use of ICT-Based Teaching Encourage Innovative Interactions in the Classroom? Presentation of the CLI-O: Class Learning Interactions – Observation Tool By Published On :: Full Article
base A Promising Practicum Pilot – Exploring Associate Teachers’ Access and Interactions with a Web-based Learning Tool By Published On :: Full Article
base An Assistant for Loading Learning Object Metadata: An Ontology Based Approach By Published On :: Full Article
base A Framework for Assessing the Pedagogical Effectiveness of Wiki-Based Collaborative Writing: Results and Implications By Published On :: Full Article
base An Assessment of Competency-Based Simulations on E-Learners’ Management Skills Enhancements By Published On :: 2015-12-14 There is a growing interest in the assessment of tangible skills and competence. Specifically, there is an increase in the offerings of competency-based assessments, and some academic institutions are offering college credits for individuals who can demonstrate adequate level of competency on such assessments. An increased interest has been placed on competency-based computer simulations that can assist learners to gain tangible skills. While computer simulations and competency-based projects, in general and particularly in management, have demonstrated great value, there are still limited empirical results on their benefits to e-learners. Thus, we have developed a quasi-experimental research, using a survey instrument on pre- and post-tests, to collect the set of 12 management skills from e-learners attending courses that included both competency-based computer simulations and those that didn’t. Our data included a total of 253 participants. Results show that all 12 management skills measures demonstrated very high reliability. Our results also indicate that all 12 skills of the competency-based computer simulations had higher increase than those that didn’t. Analyses on the mean increases indicated an overall statistically significant difference for six of the 12 management skills enhancements between the experimental and control groups. Our findings demonstrate that overall computer simulations and competency-based projects do provide added value in the context of e-learning when it comes to management skills. Full Article