tory

Building the Hydra Together: Enhancing Repository Provision through Multi-Institution Collaboration

In 2008 the University of Hull, Stanford University and University of Virginia decided to collaborate with Fedora Commons (now DuraSpace) on the Hydra project. This project has sought to define and develop repository-enabled solutions for the management of multiple digital content management needs that are multi-purpose and multi-functional in such a way as to allow their use across multiple institutions. This article describes the evolution of Hydra as a project, but most importantly as a community that can sustain the outcomes from Hydra and develop them further. The data modelling and technical implementation are touched on in this context, and examples of the Hydra heads in development or production are highlighted. Finally, the benefits of working together, and having worked together, are explored as a key element in establishing a sustainable open source solution.




tory

Kindura: Repository services for researchers based on hybrid clouds

The paper describes the investigations and outcomes of the JISC-funded Kindura project, which is piloting the use of hybrid cloud infrastructure to provide repository-focused services to researchers. The hybrid cloud services integrate external commercial cloud services with internal IT infrastructure, which has been adapted to provide cloud-like interfaces. The system provides services to manage and process research outputs, primarily focusing on research data. These services include both repository services, based on use of the Fedora Commons repository, as well as common services such as preservation operations that are provided by cloud compute services. Kindura is piloting the use of the DuraCloud2, open source software developed by DuraSpace, to provide a common interface to interact with cloud storage and compute providers. A storage broker integrates with DuraCloud to optimise the usage of available resources, taking into account such factors as cost, reliability, security and performance. The development is focused on the requirements of target groups of researchers.




tory

Chempound - a Web 2.0-inspired repository for physical science data

Chempound is a new generation repository architecture based on RDF, semantic dictionaries and linked data. It has been developed to hold any type of chemical object expressible in CML and is exemplified by crystallographic experiments and computational chemistry calculations. In both examples, the repository can hold >50k entries which can be searched by SPARQL endpoints and pre-indexing of key fields. The Chempound architecture is general and adaptable to other fields of data-rich science.




tory

Repository as a Service (RaaS)

In his oft-quoted seminal paper ‘Institutional Repositories: Essential Infrastructure For Scholarship In The Digital Age’ Clifford Lynch (2003) described the Institutional Repository as “a set of services that a university offers to the members of its community for the management and dissemination of digital materials created by the institution and its community members.” This paper seeks instead to define the repository service at a more primitive level, without the specialism of being an ‘Institutional Repository’, and looks at how it can viewed as providing a service within appropriate boundaries, and what that could mean for the future development of repositories, our expectations of what repositories should be, and how they could fit into the set of services required to deliver an Institutional Repository service as describe by Lynch.




tory

DAR: A Modern Institutional Repository with a Scalability Twist

The Digital Assets Repository (DAR) is an Institutional Repository developed at the Bibliotheca Alexandrina to manage the full lifecycle of a digital asset: its creation and ingestion, its metadata management, storage and archival in addition to the necessary mechanisms for publishing and dissemination. DAR was designed with a focus on integrating DAR with different sources of digital objects and metadata in addition to integration with applications built on top of the repository. As a modern repository, the system architecture demonstrates a modular design relying on components that are best of the breed, a flexible content model for digital objects based on current standards and heavily relying on RDF triples to define relations. In this paper we will demonstrate the building blocks of DAR as an example of a modern repository, discussing how the system addresses the challenges that face an institution in consolidating its assets and a focus on solving scalability issues.




tory

Performance improvement in inventory classification using the expectation-maximisation algorithm

Multi-criteria inventory classification (MCIC) is popularly used to aid managers in categorising the inventory. Researchers have used numerous mathematical models and approaches, but few resorted to unsupervised machine-learning techniques to address MCIC. This study uses the expectation-maximisation (EM) algorithm to estimate the parameters of the Gaussian mixture model (GMM), a popular unsupervised machine learning algorithm, for ABC inventory classification. The EM-GMM algorithm is sensitive to initialisation, which in turn affects the results. To address this issue, two different initialisation procedures have been proposed for the EM-GMM algorithm. Inventory classification outcomes from 14 existing MCIC models have been given as inputs to study the significance of the two proposed initialisation procedures of the EM-GMM algorithm. The effectiveness of these initialisation procedures corresponding to various inputs has been analysed toward inventory management performance measures, i.e., fill rate, total relevant cost, and inventory turnover ratio.




tory

Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia




tory

Creation of Anticipatory Information Support for Virtual Organizations between System(S) Theory and System Thinking




tory

Use of a Class Exercise to Maximize Student Interest in an Introductory MIS Course




tory

Suggested Topics for an IS Introductory Course in Java




tory

Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior




tory

Befriending Computer Programming: A Proposed Approach to Teaching Introductory Programming




tory

An Exploratory Survey in Collaborative Software in a Graduate Course in Automatic Identification and Data Capture




tory

Informing through User-Centered Exploratory Search and Human-Computer Interaction Strategies




tory

Design, Development, and Implementation of an Open Source Learning Object Repository (OSLOR)




tory

Using a Learner-Centered Approach to Teach ICT in Secondary Schools: An Exploratory Study




tory

A Conceptual Model for Learning to Program in Introductory Programming Courses




tory

The Need to Balance the Blend: Online versus Face-to-Face Teaching in an Introductory Accounting Subject




tory

Challenges in Adopting Open Innovation Strategies in SMEs: An Exploratory Study in Portugal




tory

Towards the Realization of the ICT Education Living Lab – The TechTeachers.co.za Success Story

This paper presents the success story of the intuitive vision of an Information and Communication Technology (ICT) high school educator in South Africa. The growth and evolution of a Community of Practice towards a full-fledged living lab is investigated. A grounded theory study analyses the living lab concept and highlights some of the current challenges secondary high school ICT education face within the South African educational landscape. Some of the concepts, ideas, best practices, and lessons learned in the establishment and running of two web based technologies to support secondary school ICT subjects is discussed. The researchers present a motivation for the use of living labs to address some of the issues identified and highlights how the existing platforms fits into bigger design.




tory

Usability and Pedagogical Assessment of an Algorithm Learning Tool: A Case Study for an Introductory Programming Course for High School

An algorithm learning tool was developed for an introductory computer science class in a specialized science and technology high school in Japan. The tool presents lessons and simple visualizations that aim to facilitate teaching and learning of fundamental algorithms. Written tests and an evaluation questionnaire were designed and implemented along with the learning tool among the participants. The tool’s effect on the learning performance of the students was examined. The differences of the two types of visualizations offered by the tool, one with more input and control options and the other with fewer options, were analyzed. Based on the evaluation questionnaire, the scales with which the tool can be assessed according to its usability and pedagogical effectiveness were identified. After using the algorithm learning tool there was an increase in the posttest scores of the students, and those who used the visualization with more input and control options had higher scores compared to those who used the one with limited options. The learning objectives used to evaluate the tool correlated with the test performance of the students. Properties comprised of learning objectives, algorithm visualization characteristics, and interface assessment are proposed to be incorporated in evaluating an algorithm learning tool for novice learners.




tory

Training Librarians for 21st Century Repository Services: Emerging Trends

The paper reviewed the emerging roles of the 21st century librarians, charged with the responsibility to manage repository services across libraries in present-day information technology environment. Librarians need to be trained and empowered with requisite skills and knowledge needed for successful management of the ICT driven repository initiatives that the 21st century demands. Literature was reviewed on the roles and responsibilities of librarians, training needs and opportunities, career path and recruitment of librarians, and community support necessary for effective and efficient implementation and management of repository initiatives. This entails the ability to comprehend trends and change patterns which are essential for providing research focused and user-friendly models in open repository services that are based on thorough analytical understanding of the challenges of emerging trends. To achieve this requires the training and retraining of librarians to reposition them as information specialists in their career path. The role of the library as an integral part of its social environment is to educate the community about the existence of an open repository by building partnership with community-oriented research centres through seminars, workshops, symposium, training, and awareness programmes. The study recommends that librarians should strategize and collaborate with researchers to make open repository an essential research tool.




tory

How to Program a Chatbot – An Introductory Project and Student Perceptions

Aim/Purpose: One of the most fascinating developments in computer user interfaces in recent years is the rise of “chatbots”. Yet extent information system (IS) curriculum lacks teaching resources on chatbots programming.. Background: To better prepare students for this new technological development and to enhance the IS curriculum, we introduce a project that teaches students how to program simple chatbots, including a transactional chatbot and a conversational chatbot. Methodology: We demonstrated a project that teaches students how to program two types of simple chatbots: a transactional chatbot and a conversational chatbot. We also conducted a survey to examine students’ perceptions on their learning experience. Findings: Our survey on students’ perception of the project finds that learning chatbots is deemed very useful because chatbot programming projects have enabled the students to understand the subject better. We also found that social influence has positively motivated the students to learn chatbot programming. Though most of the students have no prior experiences programming chatbots, their self-efficacy towards chatbot programming remained high after working through the programming project. Despite the difficult tasks, over 71% of respondents agree to various degrees that chatbot programming is fun. Though most students agree that chatbot programming is not easy to learn, more than 70% of respondents indicated that they will use or learn chatbots in the near future. The overwhelmingly positive responses are impressive given that this is the first time for the students to program and learn chatbots. Recommendations for Practitioners: In this article, we introduced a step by step project on teaching chatbot programming in an information systems class. Following the project instructions, students can get their first intelligent chatbots up and running in a few hours using Slack. This article describes the project in detail as well as students’ perceptions. Recommendations for Researchers: We used UTAUT model to measure students’ perception of the projects. This study could be of value to researchers studying students’ technology learning and adoption behaviors. Impact on Society: To our best knowledge, pedagogical resources that teach IS students how to program chatbots, especially the introductory level materials, are limited. We hope this teaching case could be of value for IS educators when introducing IS students to the wonderful field of chatbot programming. Future Research: For future work, we plan to expand the teaching resources to cover more advanced chatbot programming projects, such as on how to make chatbot more human-like.




tory

Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study

Aim/Purpose. The problem statement in the proposed study focuses on that, despite the growing recognition that teenagers need to undergo security awareness training, little is known about the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. Background. This study was guided by the research question: What are the impacts security training experts believe implementing a mandatory gamified security aware-ness training curriculum in public middle schools will have on the long-term security behaviors of students in Texas? The study gathers opinions from experts on the impacts of security awareness training on students. Methodology. Our research used semi-structured interviews with twelve experts chosen through the use of purposive sampling. The population for the study consisted of experts in the fields of security awareness training for and teaching middle school-aged children. Candidates were recruited through the Cyber-Texas Foundation and snowball sampling techniques. Contribution. The research contributed to the body of knowledge by using interviews to explore the impacts of security awareness training on middle school students based on the opinions and views of the teachers and instructors who work with middle school students. Findings. The findings of this study demonstrate that middle school is an ideal time to provide cybersecurity training and will impact student behaviors by making them more conscious of cyber threats and preparing them to be more tech-savvy professionals. The research also showed that well-designed cybersecurity games with real-world application combined with traditional teaching techniques can help students develop positive habits. The research also suggests that teachers possess the skills to teach cybersecurity classes and the classes can be integrated into the current school day without the need for any significant changes to existing daily schedules. Recommendations for Practitioners. A well-design gamification-based curriculum implemented in Texas Middle Schools, combined with traditional teaching techniques and repeated over an extended time period, will impact students’ behaviors by making them more able to recognize and respond to cyber risks and will transform them into more secure and tech-savvy members of society. Recommendations for Researchers. The research shows middle school instructors and technology experts believe the implementation of a security awareness training program in middle schools is both possible and practical, while also beneficial to the students. The recommendation is to encourage researchers to explore ways to build curricula and games capable of appealing to students and implementing the instruction into school programs. Impact on Society. Demonstrating that training provided in middle school will make lasting impacts and improvements to student behaviors benefits children and their families in the short-term and workplaces in the long-term. The development of a more security-conscious workforce can reduce the significant number of data breaches and cyber attacks resulting from the poor security habits of companies’ users. Future Research. Future research that will add significant value to the body of knowledge includes testing the effectiveness of habit-shaping games to determine whether existing long-term games maintain student interest. Qualitative studies could interview parents of teenagers using habit-shaping games to determine the effectiveness of the applications. Another qualitative study could interview teachers to determine how teachers’ ages affect their comfort level teaching technology classes. Both studies could provide valuable insights into how to implement security awareness training in schools.




tory

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




tory

Designing a Self-Assessment Item Repository: An Authentic Project in Higher Education




tory

Clickers in the Laboratory: Student Thoughts and Views




tory

Analysis of Explanatory and Predictive Architectures and the Relevance in Explaining the Adoption of IT in SMEs




tory

Analogical Thinking for Generation of Innovative Ideas: An Exploratory Study of Influential Factors

Analogical thinking is one of the most effective tools to generate innovative ideas. It enables us to develop new ideas by transferring information from well-known domains and utilizing them in a novel domain. However, using analogical thinking does not always yield appropriate ideas, and there is a lack of consensus among researchers regarding the evaluation methods for assessing new ideas. Here, we define the appropriateness of generated ideas as having high structural and low superficial similarities with their source ideas. This study investigates the relationship between thinking process and the appropriateness of ideas generated through analogical thinking. We conducted four workshops with 22 students in order to collect the data. All generated ideas were assessed based on the definition of appropriateness in this study. The results show that participants who deliberate more before reaching the creative leap stage and those who are engaged in more trial and error for deciding the final domain of a new idea have a greater possibility of generating appropriate ideas. The findings suggest new strategies of designing workshops to enhance the appropriateness of new ideas.




tory

An Exploratory Study on the DevOps IT Alignment Model

Aim/Purpose: Based on business-IT alignment, this study addresses the understudied practice of DevOps. Background: Although organizations continue to implement DevOps practices, few studies explore connections with prior theory. This study contributes to this need by developing the DevOps strategic IT alignment model. Methodology: The sample included 57 firms from the current Forbes Global 2000 and the Fortune 500 lists. The authors employed partial least squares structural equation modeling (PLS-SEM) to evaluate the DevOps IT alignment model. Contribution: The proposed model builds a foundation for further investigation into the influence of theory on DevOps using quantitative research methods. It also contributes to a reliable and valid DevOps instrument for future exploration. Findings: Continuous integration of software and knowledge sharing increases the level of IT subunit alignment in large organizations that foster DevOps. Furthermore, practicing DevOps positively influences the level of business-IT alignment. Recommendations for Practitioners: Organizations that cultivate DevOps experience greater levels of business-IT alignment through stronger knowledge sharing and continuous integration of applications. Thus, managers should identify how to develop closer bonds between subunits with dissimilar skillsets in their organizations. Recommendation for Researchers: Researchers should explore how theories interact, help, and/or do not support blossoming practices like DevOps. Impact on Society: Stronger bonds increase knowledge sharing between interdepartmental colleagues. Lower hierarchical levels of an organization as well as higher managerial levels benefit from cross-domain IT knowledge. Future Research: It is important to explore how different types of knowledge in diverse disciplines requires unique cross-discipline bonds to form and whether these relationships have connections with the contingency theory and quality management.




tory

BITCOIN: An Exploratory Study Investigating Adoption in South Africa

Aim/Purpose: This paper identified and explored the factors influencing Bitcoin adoption and use in South Africa. Background: Since its introduction in 2008, the value and popularity of Bitcoin has risen exponentially. Captivating the eyes of the world, from regulators to economists, Bitcoin promises to revolutionize the digital currency space. Despite being over 10 years old, the concept of cryptocurrency is fairly new in South Africa, a developing country. South African’s interest in Bitcoin continues to grow with the country constantly ranking within the top 10 in online searches for “Bitcoin” and “cryptocurrency” on Google. The primary objective of this research was to identify adoption factors amongst South African citizens, an area that has not received much research focus in the past. In addition to this, the study aimed to identify how Bitcoin is primarily used in South Africa. Methodology: A survey-based questionnaire was utilized to obtain responses from adopters of Bitcoin in South Africa. The quantitative survey was completed by 204 respondents. Contribution: This research contributes to the body of knowledge relating to Bitcoin adoption, specifically from a developing country. Adoption factors are identified that can be utilized by businesses that intend to adopt cryptocurrency, to strategically prepare for the potential risks or opportunities brought about by Bitcoin and cryptocurrency in general. Findings: The findings of this study indicate that while perceived usefulness, perceived ease of use, subjective norms, and facilitating conditions positively influence intention to adopt Bitcoin, trust was the only construct that is statistically significant and hence is the greatest driver of adoption in South Africa. In terms of its primary use in South Africa, the study revealed that Bitcoin is used as a speculative instrument for short-term trading in South Africa followed by being used as a long-term investment in the crypto-asset class. No respondent indicated that they utilize Bitcoin as a payment method in South Africa. Recommendations for Practitioners: When developing crypto-based investment products, custodians of assets must ensure that a minimum-security protocol is followed to safeguard these assets. This will enhance the trust that potential investors and customers have in their systems and products. Recommendation for Researchers: This study focused on adoption factors for South African citizens. Future studies should be conducted to identify adoption factors by businesses in South Africa. Impact on Society: Bitcoin offers an alternate trading instrument and investment option, with the possibility of large gains over a relatively short period. Bitcoin also presents the possibility of cross-border transactions at a significantly lower cost compared to traditional cross-border transfers of funds. Future Research: Studies should be conducted to explore the factors influencing the adoption of altcoins to determine if the technological differences influence the adoption of one currency over the other. Research should also be conducted comparing the taxation of cryptocurrency in various countries around the world.




tory

Investigating the Determinants of Online Shopping Repurchase Intention in Generation Z Customers in India: An Exploratory Study

Aim/Purpose: This study investigates the factors that affect the repurchase intentions of Generation Z consumers in India’s online shopping industry, focusing on combining the Expectation-Confirmation Model (ECM) and Extended Technology Acceptance Model (E-TAM). The aim is to understand the intricate behaviors that shape technology adoption and sustained usage, which are essential for retaining customers in e-commerce. Background: Social media and other online platforms have significantly influenced daily life and become essential communication tools owing to technological advancements. Online shopping is no exception, offering a range of product choices, information, and convenience compared with traditional commerce. Indian retailers recognize this trend as an opportunity to promote their brands through e-shopping platforms, leading to increased competition. Generation Z comprises 32% of the world’s population and is a significant emerging customer base in India. Numerous studies have been conducted to study customers’ repurchase intention in the online shopping domain, but few studies have explicitly focused on Generation Z as a customer base. This study aims to comprehensively understand the topic and investigate the variables that impact consumers’ online repurchase intention by examining their post-adoption behavioral processes. Methodology: The study employed a quantitative research design with structural equation modeling using AMOS to analyze responses from 410 participants. This method thoroughly examined hypotheses regarding factors affecting repurchase intention (security, ease of use, privacy, and internet self-efficacy) and the mediating role of e-satisfaction. Contribution: This study makes a unique contribution to the field of e-commerce by focusing on Generation Z in India, a rapidly growing demographic in the e-commerce industry. The results on the mediating role of e-satisfaction have significant implications for e-retailers seeking to enhance customer retention strategies and gain a competitive edge in the market. Findings: The research findings underscore the significant influence of security, ease of use, and internet self-efficacy on repurchase intentions, with e-satisfaction playing a pivotal role as a mediating factor. Notably, while privacy concerns did not directly impact repurchase intentions, they displayed considerable influence when mediated by e-satisfaction, highlighting the intricate interplay between these variables in the context of online shopping, which is the unique finding of this study. Recommendations for Practitioners: This study has several significant implications for practitioners. Effectively addressing computer-related individual differences, such as computer self-efficacy, is crucial for boosting online customers’ repurchase intention. For instance, if an e-retailer intends to target Generation Z customers, they should collaborate with IT professionals and develop various computer literacy programs on online streaming platforms, such as YouTube. These programs will enhance target customers’ confidence in online shopping portals and increase their online repeat purchases. Additionally, practitioners should strive to improve the online shopping experience by making the portal user-friendly. Generation Z is accustomed to a fast Internet experience, so they prefer that the process of completing online transactions is swift with fewer clicks. The search for products, payments, and redress should not be tedious. Furthermore, the primary objective of the e-retailer should be to satisfy customers, as satisfied customers repeat their purchases and increase overall profitability. Recommendation for Researchers: The current study was conducted in the Delhi-NCR region of India, and its findings could serve as a basis for future research. For instance, the scale devised in this study could be utilized to examine the impact of cash-on-delivery as a payment method on purchase intention across the country. Alternatively, a comparative analysis could be conducted to compare cash-on-delivery effects in various countries. Impact on Society: The study’s findings enable stakeholders in the online shopping industry to comprehend the post-adoption behavior of Generation Z users and augment existing literature by establishing a correlation between determinants that impact repurchase intention and e-satisfaction, which serves as a mediator. Future Research: This study examines the factors that impact the propensity of Generation Z shoppers to engage in repeat online purchases. This study focuses on India, where the Generation Y (millennial) customer base is also substantial within the online shopping market. Future research could compare the shopping habits of Generation Z and Generation Y customers, as the latter may place greater importance on privacy and security. Additional studies could broaden the scope of this research and explore the comparative viewpoints of both generations. Also, it would be advantageous to conduct in-depth interviews and longitudinal studies to acquire a more in-depth comprehension of the evolving digitalization of shopping.




tory

A New Learning Object Repository for Language Learning: Methods and Possible Outcomes




tory

Repository 2.0: Social Dynamics to Support Community Building in Learning Object Repositories




tory

Ontology of Learning Objects Repository for Pedagogical Knowledge Sharing




tory

An Approach toward a Software Factory for the Development of Educational Materials under the Paradigm of WBE




tory

Analyzing Associations between the Different Ratings Dimensions of the MERLOT Repository




tory

ICT Use: Educational Technology and Library and Information Science Students' Perspectives – An Exploratory Studyew Article

This study seeks to explore what factors influence students’ ICT use and web technology competence. The objectives of this study are the following: (a) To what extent do certain elements of Rogers’ (2003) Diffusion of Innovations Theory (DOI) explain students’ ICT use, (b) To what extent do personality characteristics derived from the Big Five approach explain students’ ICT use, and (c) To what extent does motivation explain students’ ICT use. The research was conducted in Israel during the second semester of the academic year 2013-14, and included two groups of participants: a group of Educational Technology students (ET) and a group of Library and Information Science students (LIS). Findings add another dimension to the importance of Rogers’ DOI theory in the fields of Educational Technology and Library and Information Science. Further, findings confirm that personality characteristics as well as motivation affect ICT use. If instructors would like to enhance students’ ICT use, they should be aware of individual differences between students, and they should present to students the advantages and usefulness of ICT, thus increasing their motivation to use ICT, in the hopes that they will become innovators or early adopters.




tory

Students’ Perceptions on MOOCs: An Exploratory Study

MOOCs are open, online courses that use information technologies to enhance the learning experience and attract various people from the entire world. The current study uses the Technology Acceptance Model (TAM), as well as personal characteristics such as learning strategies, cognitive appraisal, and Kuhlthau’s (1991) model of information seeking as theoretical bases for defining factors that may influence students adopting MOOCs in their learning process, as well as describe their feelings during the learning process. The study was conducted in Israel during the 2014 academic year, and used both quantitative and qualitative techniques and involved 102 students who participated in a MOOC as part of the requirements in an offline course. They were requested to keep study diaries. The quantitative analysis revealed that perceived usefulness (PU) and perceived ease of use (PEOU) have a major influence on the intention to enroll in a MOOC. PEOU can be increased by improving the current MOOC platforms. PU can also be improved by providing content that suits the students’ needs. The qualitative analysis showed mood changes over time; the feelings of uncertainty were replaced by expressions of confidence. We found that students have different needs and expectations. Therefore, the MOOC’s platforms should provide multiple options to accommodate these needs.




tory

Let’s Tell a Story Together

Aim/Purpose: The teaching solution presented in this paper was implemented to overcome the common problems encountered by authors during years of practice of applied business studies teaching. Background: In our school, we have deep multicultural environments where both teachers and students are coming from different countries and cultures. The typical problems encountered with students include: not reading the case studies, language problems, different backgrounds and cultures, a different understanding of leadership in teamwork related to various management traditions, lack of student participation, and engagement in teamwork. Methodology : The above problems were solved on the basis of the novelty use of several tools usually used separately: a combination of case studies with visualization and current representation of knowledge related to the case study. The visualization context is provided by “rich picture” (as a part of SSM methodology) to create a shared understanding among students. Another ingredient of the proposed solution is based on Pacific storytelling tradition and the Pacific methodology of solving problems. Contribution: It was suggested the new delivery model strengthening advantages of case studies. Findings: Studies and surveys made from 2009 to the present are promising. There is a visible improvement in students’ grades and observed changes in students’ behavior toward more active in-class participation. Recommendations for Practitioners: This paper focuses on implementation and technical aspects of the presented method. However, the application of the presented method needs robust and time-consuming preparation of the teacher before the class. Recommendation for Researchers: The current results show that the proposed method has the potential to improve students’ experience in applied business courses. The project is ongoing and will undergo progressive changes while collecting new experiences. The method may be applied to other types of courses. By focusing on the storytelling and rich picture, we avoid technological bias when we teach business problem-solving. We focus instead on teaching students the social-organizational interactions influencing the problem solution. Impact on Society: Implementing of cultural sensitivity into the teaching process. Making teaching process more attractive for multicultural students. Future Research: Reducing teacher overload when using the method presented by the development of computerized tools. This is undergoing through utilizing Unreal Engine. Also, it is planned to enhance our team by artists and designers related to computer games.




tory

An Exploratory Study of Online Equity: Differential Levels of Technological Access and Technological Efficacy Among Underserved and Underrepresented Student Populations in Higher Education

Aim/Purpose: This study aims to explore levels of Technological Access (ownership, access to, and usage of computer devices as well as access to Internet services) and levels of Technological Efficacy (technology related skills) as they pertain to underserved (UNS) and underrepresented (UNR) students. Background: There exists a positive correlation between technology related access, technology related competence, and academic outcomes. An increasing emphasis on expanding online education at the author’s institution, consistent with nationwide trends, means that it is unlikely that just an increase in online offerings alone will result in an improvement in the educational attainment of students, especially if such students lack access to technology and the technology related skills needed to take advantage of online learning. Most studies on levels of Technological Access and Technological Efficacy have dealt with either K-12 or minority populations with limited research on UNS and UNR populations who form the majority of students at the author’s institution. Methodology: This study used a cross-sectional survey research design to investigate the research questions. A web survey was sent to all students at the university except first semester new and first semester transfer students from various disciplines (n = 535). Descriptive and inferential statistics were used to analyze the survey data. Contribution: This research provides insight on a population (UNS and UNR) that is expanding in higher education. However, there is limited information related to levels of Technological Access and Technological Efficacy for this group. This paper is timely and relevant as adequate access to technology and technological competence is critical for success in the expanding field of online learning, and the research findings can be used to guide and inform subsequent actions vital to bridging any educational equity gap that might exist. Findings: A critical subset of the sample who were first generation, low income, and non-White (FGLINW) had significantly lower levels of Technological Access. In addition, nearly half of the survey sample used smartphones to access online courses. Technological Efficacy scores were significantly lower for students who dropped out of or never enrolled in an online course. Transfer students had significantly higher Technological Efficacy scores while independent students (determined by tax status for federal financial aid purposes) reflected higher Technological Efficacy, but at a marginally lower level of significance. Recommendations for Practitioners: Higher education administrators and educators should take into consideration the gaps in technology related access and skills to devise institutional interventions as well as formulate pedagogical approaches that account for such gaps in educational equity. This will help ensure pathways to sustained student success given the rapidly growing landscape of online education. Recommendation for Researchers: Similar studies need to be conducted in other institutions serving UNS and UNR students in order to bolster findings and increase awareness. Impact on Society: The digital divide with respect to Technological Access and Technological Efficacy that impacts UNS and UNR student populations must be addressed to better prepare such groups for both academic and subsequent professional success. Addressing such gaps will not only help disadvantaged students maximize their educational opportunities but will also prepare them to navigate the challenges of an increasingly technology driven society. Future Research: Given that it is more challenging to write papers and complete projects using a smartphone, is there a homework gap for UNS and UNR students that may impact their academic success? What is the impact of differing levels of Technological Efficacy on specific academic outcomes of UNS and UNR students?




tory

Computer Self-Efficacy: A Practical Indicator of Student Computer Competency in Introductory IS Courses




tory

Fourier Analysis: Creating A “Virtual Laboratory” Using Computer Simulation




tory

A Groupware-based Peer Review Process: An Exploratory Case Study




tory

Communicating Culture: An Exploratory Study of the Key Concepts in Maori Culture on Maori Web Sites




tory

Modular Inference Trees for Expository Reports




tory

A Model for Mandatory Use of Software Technologies: An Integrative Approach by Applying Multiple Levels of Abstraction of Informing Science




tory

Communicating Transdisciplinary Characteristics In Global Regulatory Affairs: An Example From Health Professions Education

Aim/Purpose: This paper describes the regulatory affairs discipline as a useful case in the study of both inter- and transdisciplinary science and dynamics related to communication across multiple boundaries. We will 1) outline the process that led to the development of transnational competencies for regulatory affairs graduate education, 2) discuss how the process highlights the transdisciplinary character of regulatory affairs, 3) provide implications for how to communicate the influence of this characterization to future healthcare professionals, and 4) draw conclusions regarding how our lessons-learned might inform other programs of study. Background: In the past few decades, the regulatory affairs profession has become more internationalized. This prompted the need for new competencies grounded in the transnational and cross-disciplinary contexts in which these professionals are required to operate. Methodology: A convenience sample of experienced regulatory affairs professionals from multiple disciplines contributed to the development of transnational competencies for a master’s program in regulatory affairs using a transdisciplinary framework. Contribution: An applied exemplar in which to understand how transdisciplinary characteristics can be communicated and applied in higher education. Recommendations for Practitioners: This paper recommends how competencies developed from a regulatory affairs program can serve as exemplars for other applied transdisciplinary higher education programs. Impact on Society: This framework provides a seldom-used reflective approach to regulatory affairs education that utilizes cross-disciplinary theory to inform competence-based formation of professionals.




tory

The Predatory Journal: Victimizer or Victim?

Aim/Purpose: Labeling a journal as “predatory” can do great damage to the journal and the individuals that have contributed to it. This paper considers whether the predatory classification has outlived its usefulness and what might replace it. Background: With the advent of open access publishing, the term “predatory” has increasingly been used to identify academic journals, conferences, and publishers whose practices are driven by profit or self-interest rather than the advancement of science. Absent clear standards for determining what is predatory and what is not, concerns have been raised about the misuse of the label. Methodology: Mixed methods: A brief review of the literature, some illustrative case studies, and conceptual analysis. Contribution: The paper provides recommendations for reducing the impact of illegitimate journals. Findings: Current predatory classifications are being assigned with little or no systematic research and virtually no accountability. The predatory/not predatory distinction does not accommodate alternative journal missions. Recommendations for Researchers: The distinction between legitimate and illegitimate journals requires consideration of each journal’s mission. To serve as a useful guide, a process akin to that used for accrediting institutions needs to be put in place. Impact on Society: Avoiding unnecessary damage to the careers of researchers starting out. Future Research: Refining the initial classification scheme proposed in the paper.




tory

Development and Validation of a Noise in Decision Inventory for Organizational Settings

Aim/Purpose: The aim of the present paper is to present a Noise Decision (ND) scale. First, it reports the development and validation of the instrument aimed at examining organizational factors that have an influence on decision-making and the level of noise. Second, it validates this rating scale by testing its discriminant and convergent validity with other measures to assess decision-making qualities. Background: According to the literature, the concept of noise is the unwanted variability present in judgments. The notion of noise concerns the systematic influence to which individuals are exposed in their environment. The literature in the field has found that noise reduction improves the perception of work performance. Methodology: The first study involves the development of a scale (composed of 36 items) consisting of semi-structured interviews, item development, and principal component analysis. The second study involves validation and convergent validity of this scale. In the first study, there were 43 employees from three medium-sized Italian multinationals. For the second study, a sample of 867 subjects was analysed. Contribution: This paper introduces the first scale aimed at assessing noise within individuals and, in the organizational context, within employees and employers. Findings: Results show that the estimated internal reliability for each of the ND subscales and also the correlations between the subscales were relatively low, suggesting that ND correctly measures the analyzed components. Furthermore, the validation of the psychometric qualities of the ND allowed for the assertion that the influence of noise is present in the decision-making process within the context of work environments, validating the initial hypotheses. Recommendation for Researchers: This paper aims to improve theory and research on decision-making; for example, by providing a possible implementation for scales for evaluating decision-making skills. Furthermore, detecting and limiting noise with a systematic method could improve both the quality of decisions and the quality of thought processes. Future Research: Given the measurement of ND, the study can be a starting point for future research on this topic. Since there is no literature about this construct, it would be necessary to spend more time researching, so that the topic becomes clearer. System noise has been tested by some researchers with a “noise audit,” which means giving the same problem to different people and measuring the differences in their responses. Repeating this kind of audit in conjunction with the ND in a specific work environment could be helpful to detect but also measure the influence of noise.