Search results

1 – 10 of 225
Article
Publication date: 13 September 2022

Haixiao Dai, Phong Lam Nguyen and Cat Kutay

Digital learning systems are crucial for education and data collected can analyse students learning performances to improve support. The purpose of this study is to design and…

Abstract

Purpose

Digital learning systems are crucial for education and data collected can analyse students learning performances to improve support. The purpose of this study is to design and build an asynchronous hardware and software system that can store data on a local device until able to share. It was developed for staff and students at university who are using the limited internet access in areas such as remote Northern Territory. This system can asynchronously link the users’ devices and the central server at the university using unstable internet.

Design/methodology/approach

A Learning Box has been build based on minicomputer and a web learning management system (LMS). This study presents different options to create such a system and discusses various approaches for data syncing. The structure of the final setup is a Moodle (Modular Object Oriented Developmental Learning Environment) LMS on a Raspberry Pi which provides a Wi-Fi hotspot. The authors worked with lecturers from X University who work in remote Northern Territory regions to test this and provide feedback. This study also considered suitable data collection and techniques that can be used to analyse the available data to support learning analysis by the staff. This research focuses on building an asynchronous hardware and software system that can store data on a local device until able to share. It was developed for staff and students at university who are using the limited internet access in areas such as remote Northern Territory. This system can asynchronously link the users’ devices and the central server at the university using unstable internet. Digital learning systems are crucial for education, and data collected can analyse students learning performances to improve support.

Findings

The resultant system has been tested in various scenarios to ensure it is robust when students’ submissions are collected. Furthermore, issues around student familiarity and ability to use online systems have been considered due to early feedback.

Research limitations/implications

Monitoring asynchronous collaborative learning systems through analytics can assist students learning in their own time. Learning Hubs can be easily set up and maintained using micro-computers now easily available. A phone interface is sufficient for learning when video and audio submissions are supported in the LMS.

Practical implications

This study shows digital learning can be implemented in an offline environment by using a Raspberry Pi as LMS server. Offline collaborative learning in remote communities can be achieved by applying asynchronized data syncing techniques. Also asynchronized data syncing can be reliably achieved by using change logs and incremental syncing technique.

Social implications

Focus on audio and video submission allows engagement in higher education by students with lower literacy but higher practice skills. Curriculum that clearly supports the level of learning required for a job needs to be developed, and the assumption that literacy is part of the skilled job in the workplace needs to be removed.

Originality/value

To the best of the authors’ knowledge, this is the first remote asynchronous collaborative LMS environment that has been implemented. This provides the hardware and software for opportunities to share learning remotely. Material to support low literacy students is also included.

Details

Interactive Technology and Smart Education, vol. 21 no. 1
Type: Research Article
ISSN: 1741-5659

Keywords

Book part
Publication date: 20 November 2023

Halah Nasseif

The use of technology in Saudi Arabian higher education is constantly evolving. With the support of the 2030 Saudi vision, many research studies have started covering learning…

Abstract

The use of technology in Saudi Arabian higher education is constantly evolving. With the support of the 2030 Saudi vision, many research studies have started covering learning analytics and Big Data in the Saudi Arabian higher education. Examining learning analytics in higher education institutions promise transforming the learning experience to maximize students' learning potential. With the thousands of students' transactions recorded in various learning management systems (LMS) in Saudi educational institutions, the need to explore and research learning analytics in Saudi Arabia has caught the interest of scholars and researchers regionally and internationally. This chapter explores a Saudi private university in Jeddah, Saudi Arabia, and examines its rich learning analytics and discovers the knowledge behind it. More than 300,000 records of LMS analytical data were collected from a consecutive 4-year historic data. Romero, Ventura, and Garcia (2008) educational data mining process was applied to collect and analyze the analytical reports. Statistical and trend analysis were applied to examine and interpret the collected data. The study has also collected lecturers' testimonies to support the collected analytical data. The study revealed a transformative pedagogy that impact course instructional design and students' engagement.

Article
Publication date: 21 February 2024

Azra Rafique, Kanwal Ameen and Alia Arshad

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the…

Abstract

Purpose

This study aims to explore the evidence-based usage patterns of higher education commission (HEC) subscribed e-journal databases in the university digital library used by the scholarly community and the academics’ online searching behaviour at a higher education institution in Pakistan.

Design/methodology/approach

The study used an explanatory sequential mixed methods approach. Raw transaction log data were collected for quantitative analysis, and the interview technique was used for qualitative data collection and thematic analysis.

Findings

Log analysis revealed that HEC subscribed databases were used significantly, and among those, scholarly databases covering various subjects were more frequently used than subject-specific society-based databases. Furthermore, the users frequently accessed the needed e-journal articles through search engines like Google and Google Scholar, considering them sources of free material instead of the HEC subscribed databases.

Practical implications

It provides practical implications for examining the evidence-based use patterns of e-journal databases. It suggests the need for improving the access management of HEC databases, keeping in view the usage statistics and the demands of the scholars. The study may also help create market venues for the publishers of scholarly databases by offering attractive and economical packages for researchers of various disciplines in developing and underdeveloped countries. The study results also guide the information professionals to arrange orientation and information literacy programs to improve the searching behaviour of their less frequent users and enhance the utilization of these subscribed databases.

Originality/value

The study is part of a PhD project and, to the best of the authors’ knowledge, is the first such work in the context of a developing country like Pakistan.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

Article
Publication date: 14 September 2022

Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J. and Sanjay Nakharu Prasad Kumar

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…

Abstract

Purpose

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.

Design/methodology/approach

This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.

Findings

The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.

Originality/value

The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 10 January 2024

Artur Strzelecki and Andrej Miklosik

The landscape of search engine usage has evolved since the last known data were used to calculate click-through rate (CTR) values. The objective was to provide a replicable method…

63

Abstract

Purpose

The landscape of search engine usage has evolved since the last known data were used to calculate click-through rate (CTR) values. The objective was to provide a replicable method for accessing data from the Google search engine using programmatic access and calculating CTR values from the retrieved data to show how the CTRs have changed since the last studies were published.

Design/methodology/approach

In this study, the authors present the estimated CTR values in organic search results based on actual clicks and impressions data, and establish a protocol for collecting this data using Google programmatic access. For this study, the authors collected data on 416,386 clicks, 31,648,226 impressions and 8,861,416 daily queries.

Findings

The results show that CTRs have decreased from previously reported values in both academic research and industry benchmarks. The estimates indicate that the top-ranked result in Google's organic search results features a CTR of 9.28%, followed by 5.82 and 3.11% for positions two and three, respectively. The authors also demonstrate that CTRs vary across various types of devices. On desktop devices, the CTR decreases steadily with each lower ranking position. On smartphones, the CTR starts high but decreases rapidly, with an unprecedented increase from position 13 onwards. Tablets have the lowest and most variable CTR values.

Practical implications

The theoretical implications include the generation of a current dataset on search engine results and user behavior, made available to the research community, creation of a unique methodology for generating new datasets and presenting the updated information on CTR trends. The managerial implications include the establishment of the need for businesses to focus on optimizing other forms of Google search results in addition to organic text results, and the possibility of application of this study's methodology to determine CTRs for their own websites.

Originality/value

This study provides a novel method to access real CTR data and estimates current CTRs for top organic Google search results, categorized by device.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 29 November 2023

Hui Shi, Drew Hwang, Dazhi Chong and Gongjun Yan

Today’s in-demand skills may not be needed tomorrow. As companies are adopting a new group of technologies, they are in huge need of information technology (IT) professionals who…

25

Abstract

Purpose

Today’s in-demand skills may not be needed tomorrow. As companies are adopting a new group of technologies, they are in huge need of information technology (IT) professionals who can fill various IT positions with a mixture of technical and problem-solving skills. This study aims to adopt a sematic analysis approach to explore how the US Information Systems (IS) programs meet the challenges of emerging IT topics.

Design/methodology/approach

This study considers the application of a hybrid semantic analysis approach to the analysis of IS higher education programs in the USA. It proposes a semantic analysis framework and a semantic analysis algorithm to analyze and evaluate the context of the IS programs. To be more specific, the study uses digital transformation as a case study to examine the readiness of the IS programs in the USA to meet the challenges of digital transformation. First, this study developed a knowledge pool of 15 principles and 98 keywords from an extensive literature review on digital transformation. Second, this study collects 4,093 IS courses from 315 IS programs in the USA and 493,216 scientific publication records from the Web of Science Core Collection.

Findings

Using the knowledge pool and two collected data sets, the semantic analysis algorithm was implemented to compute a semantic similarity score (DxScore) between an IS course’s context and digital transformation. To present the credibility of the research results of this paper, the state ranking using the similarity scores and the state employment ranking were compared. The research results can be used by IS educators in the future in the process of updating the IS curricula. Regarding IT professionals in the industry, the results can provide insights into the training of their current/future employees.

Originality/value

This study explores the status of the IS programs in the USA by proposing a semantic analysis framework, using digital transformation as a case study to illustrate the application of the proposed semantic analysis framework, and developing a knowledge pool, a corpus and a course information collection.

Details

Information Discovery and Delivery, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-6247

Keywords

Content available
Book part
Publication date: 20 November 2023

Abstract

Details

Active and Transformative Learning in STEAM Disciplines
Type: Book
ISBN: 978-1-83753-619-1

Article
Publication date: 26 January 2024

Merly Thomas and Meshram B.B.

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…

Abstract

Purpose

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.

Design/methodology/approach

This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.

Findings

The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.

Originality/value

The introduced detection approach effectively detects DoS attacks available on the internet.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 9 April 2024

Pia Borlund, Nils Pharo and Ying-Hsang Liu

The PICCH research project contributes to opening a dialogue between cultural heritage archives and users. Hence, the users are identified and their information needs, the search…

Abstract

Purpose

The PICCH research project contributes to opening a dialogue between cultural heritage archives and users. Hence, the users are identified and their information needs, the search strategies they apply and the search challenges they experience are uncovered.

Design/methodology/approach

A combination of questionnaires and interviews is used for collection of data. Questionnaire data were collected from users of three different audiovisual archives. Semi-structured interviews were conducted with two user groups: (1) scholars searching information for research projects and (2) archivists who perform their own scholarly work and search information on behalf of others.

Findings

The questionnaire results show that the archive users mainly have an academic background. Hence, scholars and archivists constitute the target group for in-depth interviews. The interviews reveal that their information needs are multi-faceted and match the information need typology by Ingwersen. The scholars mainly apply collection-specific search strategies but have in common primarily doing keyword searching, which they typically plan in advance. The archivists do less planning owing to their knowledge of the collections. All interviewees demonstrate domain knowledge, archival intelligence and artefactual literacy in their use and mastering of the archives. The search challenges they experience can be characterised as search system complexity challenges, material challenges and metadata challenges.

Originality/value

The paper provides a rare insight into the complexity of the search situation of cultural heritage archives, and the users’ multi-facetted information needs and hence contributes to the dialogue between the archives and the users.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 10 July 2023

Anne Friedrich, Anne Lange and Ralf Elbert

This study identifies and characterizes configurations of generic business models for logistics service providers (LSPs) in the context of industrial additive manufacturing (AM)…

Abstract

Purpose

This study identifies and characterizes configurations of generic business models for logistics service providers (LSPs) in the context of industrial additive manufacturing (AM). A literature-based framework of the AM service supply chain (SC) is developed to embed the generic configurations in their SC context.

Design/methodology/approach

Following an exploratory research design, 17 interviews were conducted with LSPs, LSPs' potential partners and customers for industrial AM services.

Findings

Six generic configurations are identified, the LSP as a Manufacturer, Landlord, Logistician, Connector, Agent and Consultant. The authors outline how these configurations differ in the required locations, partners and targeted customer segments.

Practical implications

The current discussion of reshoring and shorter, decentralized AM SCs confronts LSPs with novel challenges. This study offers guidance for managers of LSPs for designing business models for industrial AM and raises awareness for LSPs' resource and SC implications.

Originality/value

This study contributes to the scarce literature on AM business models for LSPs with in-depth empirical insights. Based on the six identified configurations, this study sets the ground for theorizing about the business models, in particular, the value creation, value proposition and mechanisms for value capture of the business models. In addition, this study suggests how the generic configurations fit the features of specific types of LSPs.

Details

The International Journal of Logistics Management, vol. 35 no. 2
Type: Research Article
ISSN: 0957-4093

Keywords

1 – 10 of 225