Search results

1 – 10 of 11
Article
Publication date: 9 November 2023

Shard, Devesh Kumar and Sapna Koul

This study aims to gain insights into how students perceive online examination practices and evaluation, as well as identify the key factors that impact their intentions toward…

Abstract

Purpose

This study aims to gain insights into how students perceive online examination practices and evaluation, as well as identify the key factors that impact their intentions toward online exams.

Design/methodology/approach

This empirical study conducted in India utilized an online survey method between May 24 and June 14, 2022. The data were collected from 712 undergraduate and postgraduate students through a Google Docs questionnaire. Descriptive analysis, exploratory factor analysis (EFA), regression and reliability analysis were conducted to analyze the data.

Findings

There are many studies related to the adoption of online learning. However, there are limited studies that explore the adoption and acceptance of online examinations and evaluations. This paper intends to fill this gap and tries to highlight important factors influencing online examination usage by the students. Five important factors emerged in the study include “pedagogy, validity, reliability,” “practicality,” “security,” “facilitating condition” and “intention,” The study concludes that taking tests online is preferred for several reasons, including the perceived increased dependability of grades and the decreased cost, time and effort associated with taking exams.

Research limitations/implications

This research explores students' perceptions of learning management systems (LMS)-based online exams and provides insights for students to better prepare and adapt. It assists policymakers in developing fair assessment policies and improving LMS platforms. The study contributes to the theoretical understanding of e-learning and calls for further research to enhance the effectiveness of online exams. It identifies gaps in existing literature and recommends larger sample sizes, broader representation, longitudinal data collection and conversational methods for future research.

Originality/value

This study shows increasing research on e-learning and online examinations, mostly using quantitative methods. The important variables for understanding students' perceptions of online exams are “pedagogy, validity, reliability,” “practicality,” “security,” “facilitating condition” and “intention.” Concerns raised include validity, fairness and security. Electronic exams are more suitable for formative evaluation, and validity, reliability, security and adaptability are key pillars for successful online testing.

Details

The International Journal of Information and Learning Technology, vol. 41 no. 1
Type: Research Article
ISSN: 2056-4880

Keywords

Open Access
Article
Publication date: 29 September 2023

Antara Mahanta Barua and Sruti Sruba Bharali

The purpose of the case study is to investigate the perception of computer science learners at Krishna Kanta Handiqui State Open University (KKHSOU) regarding the use of…

Abstract

Purpose

The purpose of the case study is to investigate the perception of computer science learners at Krishna Kanta Handiqui State Open University (KKHSOU) regarding the use of gamification and to identify the challenges in implementing gamified teaching-learning processes in open and distance learning (ODL) institutions.

Design/methodology/approach

The case study was carried out by observing the views of the learners on the use of gamification in distance learning and studying the participation level of computer science learners before and after the gamification environment was added to a specific topic through the learning management system (LMS). The pre-game and post-game effects on learners' participation against various factors using t-tests were also investigated in this study.

Findings

The study reveals that gamification had a positive and highly significant influence on the learners' participation and engagement in the e-content provided via the LMS. The post-gamification mean score (5.62) was higher than the pre-gamification mean score (2.36), and the overall paired t-test (5.301) value was significant at the 1% level of significance. Some of the challenges faced during the study were communication with the learner, lack of technical skills of the learner, duration of study, etc.

Originality/value

This study will help in understanding the perception and effect of gamification on computer science learners in ODL mode in India. The study succeeded in demonstrating that the use of gamified elements results in increased learner participation.

Details

Asian Association of Open Universities Journal, vol. 18 no. 3
Type: Research Article
ISSN: 1858-3431

Keywords

Article
Publication date: 22 August 2022

Neerja Kashive and Sayali Mohite

This study aims to look at the integration of gamification in an e-learning model based on the technology acceptance model. The data was collected from respondents residing in…

Abstract

Purpose

This study aims to look at the integration of gamification in an e-learning model based on the technology acceptance model. The data was collected from respondents residing in India and elements of gamification (achievement, immersion and social) and personal characteristics of learners (self-efficacy, computer anxiety and enjoyment) and their impact on perceived ease of use (PEOU) and perceived usefulness (PU) were tested.

Design/methodology/approach

The data were collected from students and professionals who have ever played games during learning while using an e-learning module. Structural equation modeling using smart partial least square was used to create a model.

Findings

The findings showed that enjoyment affected both PEOU and PU and attitude toward e-learning. Achievement and social elements impacted attitude and the immersion element moderated the relation between enjoyment and PEOU and PU. These finally impact attitude and satisfaction, leading to higher intention to use e-learning platforms.

Research limitations/implications

Because this study is very specific to the Indian context, a broad generalization requires further exploration in other cultural contexts. The absence of this exploration is one of the limitations of this study.

Originality/value

This study tested the GAMEFULQUEST suggested by Högberg et al. (2019) based on self-determination theory and its impact on the overall e-learning experience. The moderation of immersion has come out to be significant and achievement and social elements impacted attitude.

Article
Publication date: 17 May 2022

Renata Pereira Oliveira, Igor Leão Santos, Cristina Gomes de Souza, Augusto da Cunha Reis and Wallice Medeiros de Souza

COVID-19 played a crucial role in the development and enlargement of learning via electronic media. Still, the recent fourth industrial revolution [Industry 4.0 (I4.0)] paved the…

391

Abstract

Purpose

COVID-19 played a crucial role in the development and enlargement of learning via electronic media. Still, the recent fourth industrial revolution [Industry 4.0 (I4.0)] paved the road toward Education 4.0. In this regard, several research challenges arise, involving the preparation of gamification strategies in online learning environments. In this sense, this paper aims to investigate the relationship between technologies of I4.0 and gamification practices in online learning around the world. Specifically, to categorize the studies of the scientific literature in the area into knowledge domains and the mention of I4.0 technologies and to verify the relationship of these technologies with the different educational levels.

Design/methodology/approach

The preferred reporting items for systematic reviews and meta-analysis protocol was used as a research method with 130 papers included for full content analysis and obtained from the Web of Science.

Findings

The leading I4.0 technologies mentioned in the analyzed papers were simulation, Internet of Things and augmented/virtual reality, in this order. Although there are more mentioned technologies, the domain of knowledge to be applied and the educational level interfere in choosing these pillars. With this, the main findings of this relationship were exposed in a singular, modern, active, realist, technological framework to demonstrate how I4.0 relates to the practice of gamification in online educational environments.

Originality/value

To the best of the authors’ knowledge, this is the first study that brings together the relationship of gamification applied in e-learning with I4.0 technologies.

Details

Interactive Technology and Smart Education, vol. 20 no. 4
Type: Research Article
ISSN: 1741-5659

Keywords

Article
Publication date: 12 January 2024

Upasna A. Agarwal, Rupashree Baral and Mansi Rastogi

Work–family conflict (WFC) is rife among construction professionals, leading to a significant negative impact on their work engagement. Building on an extant body of research…

Abstract

Purpose

Work–family conflict (WFC) is rife among construction professionals, leading to a significant negative impact on their work engagement. Building on an extant body of research, this study provides nuanced insights into the link between WFC, work–life balance (WLB) and work engagement and identifies the boundary conditions of these relationships.

Design/methodology/approach

Data were collected from 257 dyads of construction professionals and their immediate supervisors from a sample of five construction firms based in India using an online survey.

Findings

The results found that WLB mediates the relationship between WFC and work engagement, and the relationship is controlled by professionals' gender and perceptions of psychological contract breach (PCB). An important finding is that PCB accentuates the negative influence of WFC on work engagement via WLB. The study also reveals that the negative impact of WFC on WLB is stronger for women.

Practical implications

The findings are relevant for construction firms since they are primarily dominated by men and continue to struggle to attract more women professionals. The study insights provide avenues to expand existing research on the relationship between WFC and work engagement and offer managerial implications for improving construction professionals' work engagement in the high-pressure context of the construction industry.

Originality/value

The study significantly advances the underdeveloped literature on work–family interface, especially in the unique work settings of the construction industry, by establishing WFC as a predictor and revealing how engagement at work is affected. It highlights the importance of boundary conditions such as gender and PCB. It is one of the first to assess the relationship between WFC, WLB, PCB and work engagement among construction professionals in India.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 6 September 2022

Ibrahim Arpaci and Ersin Ateş

Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and…

Abstract

Purpose

Cybercrimes increase day by day in parallel to cyber-attacks and cyber-threats. Due to such an increase, required cybersecurity precautions against all kinds of cyber-attacks and cyber-threats should be taken by both organizations and individuals. This study aims to develop a reliable and valid measurement tool to measure cybercrime awareness levels of individuals.

Design/methodology/approach

In this study, a scale named as Cybercrime Awareness Scale (CAS) has been developed and psychometric properties of the scale have been tested by two separate studies.

Findings

The first study included a total of 500 respondents (294 female and 206 male). In the first study, factor structure of the proposed scale has been determined through an exploratory factor analysis. The results revealed a three-factor structure (i.e. information systems crimes, personal data crimes, and privacy and security). Cronbach's alpha reliability coefficients for the subdimensions were 0.95, 0.92, and 0.90, respectively. The sample of the second study consisted of 494 respondents (281 female and 213 male). The confirmatory-factor-analysis results revealed that three-factor structure is valid and optimal model. Further, the proposed scale demonstrated moderate concurrent validity results in relation to the Digital Data Security Awareness Scale.

Originality/value

Findings indicated that the CAS is a valid and reliable measurement tool to measure individuals' cybercrime awareness level. This study makes a novel contribution to the existing cybersecurity literature by providing the CAS, which is developed by following rigorous methodological standards.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-01-2022-0023/

Details

Online Information Review, vol. 47 no. 4
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 28 September 2023

Sigi Goode and Amir Riaz

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context…

Abstract

Purpose

It is becoming easier for end-users to modify their information system, sometimes against the wishes of management or the original manufacturer. In the mobile device context, “modding”, “jailbreaking” or “rooting” allows a mobile phone user to select operating software and network providers other than those mandated by the original provider. Prior studies have theorised that modders and non-modders possess different perspectives on the relationship between them and their device provider. However, these differences have not been empirically demonstrated in prior work. This paper aims to test theoretical pathways to explain the behavioural relationship effects of security within the modding context.

Design/methodology/approach

This study models four relationship conceptualisations from prior research. The study tests this model using a survey of 464 mobile device users to compare the user attitudes of modders and non-modders.

Findings

Modder and non-modder relationships differ. Both groups value security, but in different ways: modder relationships are governed by satisfaction and commitment, while non-modder relationships are governed more by trust.

Originality/value

To the best of the authors’ knowledge, this is the first study to empirically demonstrate the relationship differences between IS modifiers and non-modifiers. Most published work has focused on IS that are unmodified. Incorporating device modification may improve behavioural understanding of end-users.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 28 October 2022

Babayo Sule, Usman Sambo and Muhammad Yusuf

This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.

Abstract

Purpose

This study aims to examine the threats posed by cybercrimes toward the quest for achieving a reliable digital economy and to identify practical strategies for countering the crime.

Design/methodology/approach

A qualitative phenomenological paradigm was used as the methodology. Both primary and secondary sources were consulted for data collection. A thematic analytical interpretation was used for data analysis.

Findings

This study discovered that Nigeria is a leverage environment for using digital economy as a means of diversifying the economy owing to population bulge, and an increase patronage of internet and digital space but the threats of cyberfraudsters is ostracising a substantial number from using it which is decreasing the performance of the digital economy.

Research limitations/implications

The research is limited by the scarcity of resources to widen the horizon of the study particularly the fieldwork and the rampant incidences of cybercrime in Nigeria which poses a difficult task for studying the phenomenon. In addition, this study is constrained by the confidentiality in releasing data owing to the sensitivity of the subject of study and its relationship to national security.

Practical implications

This study presents some suggestions that are plausible in countering the crimes and enhancing the digital economy in Nigeria through effective surveillance, massive information and communication technology (ICT) awareness creation for users and severe penitent sanctions for cybercriminals will help in securing digital spaces.

Social implications

This study has social implications including the suggestion for simplifying digital transactions that will save time, increases economic activities and passive multiple stream income for Nigerians and ease of doing business with less risk of robbery and other cumbersome tasks.

Originality/value

This study has originality value because after the survey of the existing literature, a field work is conducted to have the views of experts on the subject of study which adds value to the subject and originality of the findings.

Details

Journal of Financial Crime, vol. 30 no. 6
Type: Research Article
ISSN: 1359-0790

Keywords

Article
Publication date: 1 December 2023

Andreas Skalkos, Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…

Abstract

Purpose

Search engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as about search engines keeping track of their search preferences. Various search engines have been introduced to address these concerns, claiming that they protect users’ privacy. The authors call these search engines privacy-preserving search engines (PPSEs). This paper aims to investigate the factors that motivate search engine users to use PPSEs.

Design/methodology/approach

This study adopted protection motivation theory (PMT) and associated its constructs with subjective norms to build a comprehensive research model. The authors tested the research model using survey data from 830 search engine users worldwide.

Findings

The results confirm the interpretive power of PMT in privacy-related decision-making and show that users are more inclined to take protective measures when they consider that data abuse is a more severe risk and that they are more vulnerable to data abuse. Furthermore, the results highlight the importance of subjective norms in predicting and determining PPSE use. Because subjective norms refer to perceived social influences from important others to engage or refrain from protective behavior, the authors reveal that the recommendation from people that users consider important motivates them to take protective measures and use PPSE.

Research limitations/implications

Despite its interesting results, this research also has some limitations. First, because the survey was conducted online, the study environment was less controlled. Participants may have been disrupted or affected, for example, by the presence of others or background noise during the session. Second, some of the survey items could possibly be misinterpreted by the respondents in the study questionnaire, as they did not have access to clarifications that a researcher could possibly provide. Third, another limitation refers to the use of the Amazon Turk tool. According Paolacci and Chandler (2014) in comparison to the US population, the MTurk workers are more educated, younger and less religiously and politically diverse. Fourth, another limitation of this study could be that Actual Use of PPSE is self-reported by the participants. This could cause bias because it is argued that internet users’ statements may be in contrast with their actions in real life or in an experimental scenario (Berendt et al., 2005, Jensen et al., 2005); Moreover, some limitations of this study emerge from the use of PMT as the background theory of the study. PMT identifies the main factors that affect protection motivation, but other environmental and cognitive factors can also have a significant role in determining the way an individual’s attitude is formed. As Rogers (1975) argued, PMT as proposed does not attempt to specify all of the possible factors in a fear appeal that may affect persuasion, but rather a systematic exposition of a limited set of components and cognitive mediational processes that may account for a significant portion of the variance in acceptance by users. In addition, as Tanner et al. (1991) argue, the ‘PMT’s assumption that the subjects have not already developed a coping mechanism is one of its limitations. Finally, another limitation is that the sample does not include users from China, which is the second most populated country. Unfortunately, DuckDuckGo has been blocked in China, so it has not been feasible to include users from China in this study.

Practical implications

The proposed model and, specifically, the subjective norms construct proved to be successful in predicting PPSE use. This study demonstrates the need for PPSE to exhibit and advertise the technology and measures they use to protect users’ privacy. This will contribute to the effort to persuade internet users to use these tools.

Social implications

This study sought to explore the privacy attitudes of search engine users using PMT and its constructs’ association with subjective norms. It used the PMT to elucidate users’ perceptions that motivate them to privacy adoption behavior, as well as how these perceptions influence the type of search engine they use. This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSE. At the same time, this study contributes to search engine vendors by revealing that users’ need to be persuaded not only about their policy toward privacy but also by considering and implementing new strategies of diffusion that could enhance the use of the PPSE.

Originality/value

This research is a first step toward gaining a better understanding of the processes that drive people’s motivation to, or not to, protect their privacy online by means of using PPSEs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 17 May 2022

Maryam Nasser AL-Nuaimi

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and…

1044

Abstract

Purpose

A research line has emerged that is concerned with investigating human factors in information systems and cyber-security in organizations using various behavioural and socio-cognitive theories. This study aims to explore human and contextual factors influencing cyber security behaviour in organizations while drawing implications for cyber-security in higher education institutions.

Design/methodology/approach

A systematic literature review has been implemented. The reviewed studies have revealed various human and contextual factors that influence cyber-security behaviour in organizations, notably higher education institutions.

Research limitations/implications

This review study offers practical implications for constructing and keeping a robust cyber-security organizational culture in higher education institutions for the sustainable development goals of cyber-security training and education.

Originality/value

The value of the current review arises in that it presents a comprehensive account of human factors affecting cyber-security in organizations, a topic that is rarely investigated in previous related literature. Furthermore, the current review sheds light on cyber-security in higher education from the weakest link perspective. Simultaneously, the study contributes to relevant literature by gaining insight into human factors and socio-technological controls related to cyber-security in higher education institutions.

Details

Global Knowledge, Memory and Communication, vol. 73 no. 1/2
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 10 of 11