ac Transactions on Data Privacy 13:2 (2020) By www.tdp.cat Published On :: Sunday, 31 August 2020 00:39:00 GMT Transactions on Data Privacy, Volume 13 Issue 2 (2020) has been published. Full Article
ac Transactions on Data Privacy 13:3 (2020) By www.tdp.cat Published On :: Wednesday, 30 August 2020 08:05:00 GMT Transactions on Data Privacy, Volume 13 Issue 3 (2020) has been published. Full Article
ac Transactions on Data Privacy 14:1 (2021) By www.tdp.cat Published On :: Wednesday, 28 April 2021 15:43:00 GMT Transactions on Data Privacy, Volume 14 Issue 1 (2021) has been published. Full Article
ac Transactions on Data Privacy 14:2 (2021) By www.tdp.cat Published On :: Tuesday, 31 August 2021 22:32:00 GMT Transactions on Data Privacy, Volume 14 Issue 2 (2021) has been published. Full Article
ac Transactions on Data Privacy 14:3 (2021) By www.tdp.cat Published On :: Sunday, 19 December 2021 07:27:00 GMT Transactions on Data Privacy, Volume 14 Issue 3 (2021) has been published. Full Article
ac Transactions on Data Privacy 15:1 (2022) By www.tdp.cat Published On :: Friday, 29 April 2022 23:55:00 GMT Transactions on Data Privacy, Volume 15 Issue 1 (2022) has been published. Full Article
ac Transactions on Data Privacy 15:2 (2022) By www.tdp.cat Published On :: Wednesday, 31 August 2022 23:07:00 GMT Transactions on Data Privacy, Volume 15 Issue 2 (2022) has been published. Full Article
ac Transactions on Data Privacy 15:3 (2022) By www.tdp.cat Published On :: Friday, 23 December 2022 15:52:00 GMT Transactions on Data Privacy, Volume 15 Issue 3 (2022) has been published. Full Article
ac Transactions on Data Privacy 16:1 (2023) By www.tdp.cat Published On :: Monday, 31 January 2023 23:24:00 GMT Transactions on Data Privacy, Volume 16 Issue 1 (2023) has been published. Full Article
ac Transactions on Data Privacy 16:3 (2023) By www.tdp.cat Published On :: Tuesday, 4 July 2023 10:43:00 GMT Transactions on Data Privacy, Volume 16 Issue 3 (2023) has been published. Full Article
ac Transactions on Data Privacy 17:1 (2024) By www.tdp.cat Published On :: Transactions on Data Privacy, Volume 17 Issue 1 (2024) has been published. Full Article
ac Transactions on Data Privacy 17:2 (2024) By www.tdp.cat Published On :: Friday, 31 May 2024 23:41:00 GMT Transactions on Data Privacy, Volume 17 Issue 2 (2024) has been published. Full Article
ac Transactions on Data Privacy 17:3 (2024) By www.tdp.cat Published On :: Monday, 30 September 2024 00:00:00 GMT Transactions on Data Privacy, Volume 17 Issue 3 (2024) has been published. Full Article
ac Predicting Innovation: Why Facebook/WhatsApp Merger Flunked By script-ed.org Published On :: Thu, 01 Apr 2021 14:02:51 +0000 By Hasan Basri Cifci[1] In the world of 2014, the Commission of Facebook/WhatsApp merger case[2] concluded that integration and interoperation of Facebook and WhatsApp were unfeasible. However, Facebook integrated its three subsidiaries (WhatsApp, Instagram, and Facebook) under its brand in Full Article Blog
ac Banques, assurances et entreprises du CAC 40 : leurs bᅵnᅵfices explosent By www.politique.net Published On :: Fri, 26 Aug 2022 18:26:00 GMT La crise ? Quelle crise ? Alors que le gouvernement prᅵpare l'opinion ᅵ une longue pᅵriode d'inflation et de hausse des prix de l'ᅵnergie en raison de la guerre en Ukraine, tout ne va pas si mal sur le plan... Full Article
ac Exploring the impact of TPACK on Education 5.0 during the times of COVID-19: a case of Zimbabwean universities By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
ac The Impact of Physics Open Educational Resources (OER) on the Professional Development of Bhutanese Secondary School Physics Teachers By ijedict.dec.uwi.edu Published On :: Sat, 31 Aug 2024 09:44:41 -0400 Full Article Refereed Articles
ac Enabling smart city technologies: impact of smart city-ICTs on e-Govt. services and society welfare using UTAUT model By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Smart cities research is growing all over the world seeking to understand the effect of smart cities from different angles, domains and countries. The aim of this study is to analyse how the smart city ICTs (e.g., big data analytics, AI, IoT, cloud computing, smart grids, wireless communication, intelligent transportation system, smart building, e-governance, smart health, smart education and cyber security) are related to government. services and society welfare from the perspective of China. This research confirmed a positive correlation of smart city ICTs to e-Govt. Services (e-GS). On the other hand, the research showed a positive influence of smart city ICTs on society's welfare. These findings about smart cities and ICTs inform us how the thought paradigm to smart technologies can cause the improvement of e-GS through economic development, job creation and social welfare. The study offers different applications of the theoretical perspectives and the management perspective which are significant to building a society during recent technologised era. Full Article
ac An intelligent approach to classify and detection of image forgery attack (scaling and cropping) using transfer learning By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 Image forgery detection techniques refer to the process of detecting manipulated or altered images, which can be used for various purposes, including malicious intent or misinformation. Image forgery detection is a crucial task in digital image forensics, where researchers have developed various techniques to detect image forgery. These techniques can be broadly categorised into active, passive, machine learning-based and hybrid. Active approaches involve embedding digital watermarks or signatures into the image during the creation process, which can later be used to detect any tampering. On the other hand, passive approaches rely on analysing the statistical properties of the image to detect any inconsistencies or irregularities that may indicate forgery. In this paper for the detection of scaling and cropping attack a deep learning method has been proposed using ResNet. The proposed method (Res-Net-Adam-Adam) is able to achieve highest amount of accuracy of 99.14% (0.9914) while detecting fake and real images. Full Article
ac Machine learning and deep learning techniques for detecting and mitigating cyber threats in IoT-enabled smart grids: a comprehensive review By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 The confluence of the internet of things (IoT) with smart grids has ushered in a paradigm shift in energy management, promising unparalleled efficiency, economic robustness and unwavering reliability. However, this integrative evolution has concurrently amplified the grid's susceptibility to cyber intrusions, casting shadows on its foundational security and structural integrity. Machine learning (ML) and deep learning (DL) emerge as beacons in this landscape, offering robust methodologies to navigate the intricate cybersecurity labyrinth of IoT-infused smart grids. While ML excels at sifting through voluminous data to identify and classify looming threats, DL delves deeper, crafting sophisticated models equipped to counteract avant-garde cyber offensives. Both of these techniques are united in their objective of leveraging intricate data patterns to provide real-time, actionable security intelligence. Yet, despite the revolutionary potential of ML and DL, the battle against the ceaselessly morphing cyber threat landscape is relentless. The pursuit of an impervious smart grid continues to be a collective odyssey. In this review, we embark on a scholarly exploration of ML and DL's indispensable contributions to enhancing cybersecurity in IoT-centric smart grids. We meticulously dissect predominant cyber threats, critically assess extant security paradigms, and spotlight research frontiers yearning for deeper inquiry and innovation. Full Article
ac Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
ac Modern health solution: acceptance and adoption of telemedicine among Indian women By www.inderscience.com Published On :: 2024-09-05T23:20:50-05:00 Access to quality healthcare is a fundamental right but unfortunately, India suffers from gender disparities in healthcare access. Telemedicine has the potential to improve access to healthcare services for women by eliminating traditional barriers. Therefore, our research aims to investigate the factors influencing the adoption of telemedicine among Indian women. This study has collected 442 responses and analysed them through structural equation modelling. The result indicates a strong and positive connection between the willingness to adopt telemedicine services and factors like performance expectancy, perceived benefits, e-health literacy, and perceived reliability. Notably, perceived reliability emerges as the most impactful predictor, closely followed by perceived benefits, while factors like effort expectancy and user resistance show no significant influence. This underscores the pivotal role of reliability and perceived benefits in shaping women's inclination toward adopting telemedicine. The study provides practical insights for telemedicine providers and policymakers to customise strategies and policies for effective promotion. Full Article
ac Trends and development of workplace mindfulness for two decades: a bibliometric analysis By www.inderscience.com Published On :: 2024-09-05T23:20:50-05:00 This systematic literature study employed bibliometric analysis to identify workplace mindfulness-related methods and practices in literature published from 2000 to 2020 by leading nations, institutions, journals, authors, and keywords. We also assessed the impact of workplace mindfulness research papers. Scopus analysis tools provided a literature report for 638 Scopus articles used in the study. Using VOSviewer, leading nations, institutions, articles, authors, journals, and keyword co-occurrence network maps were constructed. PRISMA was used to identify 56 publications to recognise workplace mindfulness literature's significant achievements. The research's main contribution is a deep review of neurological mindfulness and psychological measuring tools as workplace mindfulness tool categories. The study is the first to use the PRISMA technique to capture the essential contributions of workplace mindfulness papers from 2000 to 2020. Full Article
ac Does brand association, brand attachment, and brand identification mediate the relationship between consumers' willingness to pay premium prices and social media marketing efforts? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 This study investigates the effects of social media marketing efforts (SMME) on smartphone brand identification, attachment, association, and willingness to pay premium prices. A survey of 320 smartphone users who followed official social media handles managed by smartphone companies was conducted for this purpose. PLS-SEM was used to analyse the collected data. The findings demonstrated importance of SMME dimensions. According to the study's findings, the smartphone brand's SMMEs had significant impact on brand identification, brand association, and brand attachment. The results revealed that SMMEs had significant impact on willingness to pay the premium price. The findings also show that brand identification, attachment, and association mediated the relationship between SMMEs and willingness to pay a premium price. The findings of this study will be useful in developing social media marketing strategies for smartphones. This study demonstrates the use of social media marketing to promote mobile phones, particularly in emerging markets. Full Article
ac Impacts of social media usage on consumers' engagement in social commerce: the roles of trust and cultural distance By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The prevalence of social media transforms e-business into social commerce and facilitates consumers' engagement in cross-cultural social commerce. However, social commerce operations encounter unpredictable challenges in cross-cultural business environment. It is vital to further investigate how contextual elements affect consumers' trust and their engagement when they are exposed to the complexity of cross-cultural business environment. The stimuli-organism-response paradigm is employed to examine how the two dimensions of social media usage influence consumers' engagement in cross-cultural social commerce. The current study surveyed 2,058 samples from 135 countries, and the regression analysis results illustrate the mechanism whereby informational and socialising usage of social media positively influences consumers' engagement in social commerce through consumers' trust toward social commerce websites. Additionally, the associations between two aspects of social media usage and consumers' trust towards social commerce are negatively moderated by cultural distance. Both theoretical and practical implications are also discussed. Full Article
ac Factors affecting the intention to continue to visit the virtual world metaverse By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 A metaverse is a virtual shared space connected to the real world, an alternative reality that enables economic activities, exchanges, and transactions as well as formation of relationships between user avatars and non-player characters (NPCs). Initial experiences of the metaverse were not very satisfactory; new virtual world metaverses may or may not survive as information services or platforms. The purpose of this empirical study is to identify the characteristics of a virtual world metaverse and their effects on intention to continue usage of the platform. Considering the metaverse as a new type of user experience and a powerful mode of communication, we examine the mediating role of these characteristics according to Pine and Gilmore's (1998) experience economy theory, which enriches our understanding of the factors affecting the success of a metaverse. In addition, since social interaction is important in metaverses, we extend Pine and Gilmore's experience economy model by including Schmitt's (2011) relate experience for better understanding. Full Article
ac An effective differential privacy protection method of location data based on perturbation loss constraint By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Differential privacy is usually applied to location privacy protection scenarios, which confuses real data by adding interference noise to location points to achieve the purpose of protecting privacy. However, this method can result in a significant amount of redundant noisy data and impact the accuracy of the location. Considering the security and practicability of location data, an effective differential privacy protection method of location data based on perturbation loss constraint is proposed. After applying the Laplace mechanism under the condition of differential privacy to perturb the location data, the Savitzky-Golay filtering technology is used to correct the data with noise, and the data with large deviation and low availability is optimised. The introduction of Savitzky-Golay filtering mechanism in differential privacy can reduce the error caused by noise data while protecting user privacy. The experiments results indicate that the scheme improves the practicability of location data and is feasible. Full Article
ac Smart approach to constraint programming: intelligent backtracking using artificial intelligence By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 Constrained programming is the concept used to select possible alternatives from an incredibly diverse range of candidates. This paper proposes an AI-assisted Backtracking Scheme (AI-BS) by integrating the generic backtracking algorithm with Artificial Intelligence (AI). The detailed study observes that the extreme dual ray associated with the infeasible linear program can be automatically extracted from minimum unfeasible sets. Constraints are used in artificial intelligence to list all possible values for a group of variables in a given universe. To put it another way, a solution is a way of assigning a value to each variable that these values satisfy all constraints. Furthermore, this helps the study reach a decreased search area for smart backtracking without paying high costs. The evaluation results exhibit that the IB-BC algorithm-based smart electricity schedule controller performs better electricity bill during the scheduled periods than comparison approaches such as binary backtracking and binary particle swarm optimiser. Full Article
ac Emotion recognition method for multimedia teaching classroom based on convolutional neural network By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and CliqueNet are used as the basic expression emotion recognition methods, and the two recognition models are fused while the attention module CBAM is added. Simulation results show that the designed classroom face expression emotion recognition model based on V-CNet has high recognition accuracy, and the recognition accuracy on the test set reaches 93.11%, which can be applied to actual teaching scenarios and improve the quality of classroom teaching. Full Article
ac QoS-based handover approach for 5G mobile communication system By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 5G mobile communication systems are an in-depth fusion of multi-radio access technologies characterised with frequent handover between cells. Handover management is a particularly challenging issue for 5G networks development. In this article, a novel optimised handover framework is proposed to find the optimal network to connect with a good quality of service in accordance with the user's preferences. This framework is based on an extension of IEEE 802.21 standard with new components and new service primitives for seamless handover. Moreover, the proposed vertical handover process is based on an adaptive heuristic model aimed at achieving an optimised network during the decision-making stage. Simulation results demonstrate that, compared to other existing works, the proposed framework is capable of selecting the best network candidate accurately based on the quality-of-service requirements of the application, network conditions, mobile terminal conditions and user preferences. It significantly reduces the handover delay, handover blocking probability and packet loss rate. Full Article
ac Access controllable multi-blockchain platform for enterprise R&D data management By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In the era of big data, enterprises have accumulated a large amount of research and development data. Effective management of their precipitated data and safe sharing of data can improve the collaboration efficiency of research and development personnel, which has become the top priority of enterprise development. This paper proposes to use blockchain technology to assist the collaboration efficiency of enterprise R&D personnel. Firstly, the multi-chain blockchain platform is used to realise the data sharing of internal data of enterprise R&D data department, project internal data and enterprise data centre, and then the process of construction of multi-chain structure and data sharing is analysed. Finally, searchable encryption was introduced to achieve data retrieval and secure sharing, improving the collaboration efficiency of enterprise research and development personnel and maximising the value of data assets. Through the experimental verification, the multi-chain structure improves the collaboration efficiency of researchers and data security sharing. Full Article
ac Design of intelligent financial sharing platform driven by consensus mechanism under mobile edge computing and accounting transformation By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 The intelligent financial sharing platform in the online realm is capable of collecting, storing, processing, analysing and sharing financial data through the integration of AI and big data processing technologies. However, as data volume grows exponentially, the cost of financial data storage and processing increases, and the asset accounting and financial profit data sharing analysis structure in financial sharing platforms is inadequate. To address the issue of data security sharing in the intelligent financial digital sharing platform, this paper proposes a data-sharing framework based on blockchain and edge computing. Building upon this framework, a non-separable task distribution algorithm based on data sharing is developed, which employs multiple nodes for cooperative data storage, reducing the pressure on the central server for data storage and solving the problem of non-separable task distribution. Multiple sets of comparative experiments confirm the proposed scheme has good feasibility in improving algorithm performance and reducing energy consumption and latency. Full Article
ac Natural language processing-based machine learning psychological emotion analysis method By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 To achieve psychological and emotional analysis of massive internet chats, researchers have used statistical methods, machine learning, and neural networks to analyse the dynamic tendencies of texts dynamically. For long readers, the author first compares and explores the differences between the two psychoanalysis algorithms based on the emotion dictionary and machine learning for simple sentences, then studies the expansion algorithm of the emotion dictionary, and finally proposes an extended text psychoanalysis algorithm based on conditional random field. According to the experimental results, the mental dictionary's accuracy, recall, and F-score based on the cognitive understanding of each additional ten words were calculated. The optimisation decreased, and the memory and F-score improved. An <i>F</i>-value greater than 1, which is the most effective indicator for evaluating the effectiveness of a mental analysis problem, can better demonstrate that the algorithm is adaptive in the literature dictionary. It has been proven that this scheme can achieve good results in analysing emotional tendencies and has higher efficiency than ordinary weight-based psychological sentiment analysis algorithms. Full Article
ac Design of an intelligent financial sharing platform driven by digital economy and its role in optimising accounting transformation production By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 With the expansion of business scope, the environment faced by enterprises has also changed, and competition is becoming increasingly fierce. Traditional financial systems are increasingly difficult to handle complex tasks and predict potential financial risks. In the context of the digital economy era, the booming financial sharing services have reduced labour costs and improved operational efficiency. This paper designs and implements an intelligent financial sharing platform, establishes a fund payment risk early warning model based on an improved support vector machine algorithm, and tests it on the Financial Distress Prediction dataset. The experimental results show that the effectiveness of using F2 score and AUC evaluation methods can reach 0.9484 and 0.9023, respectively. After using this system, the average financial processing time per order decreases by 43%, and the overall financial processing time decreases by 27%. Finally, this paper discusses the role of intelligent financial sharing platform in accounting transformation and optimisation of production. Full Article
ac Urban public space environment design based on intelligent algorithm and fuzzy control By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 With the development of urban construction, its spatial evolution is also influenced by behavioural actors such as enterprises, residents, and environmental factors, leading to some decision-making behaviours that are not conducive to urban public space and environmental design. At the same time, some cities are vulnerable to various factors such as distance factors, transportation factors, and human psychological factors during the construction of public areas, resulting in a decline in the quality of urban human settlements. Urban public space is the guarantee of urban life. For this, in order to standardise urban public space and improve the quality of urban living environment, the standardisation of the environment of urban public space is required. The rapid development of intelligent algorithms and fuzzy control provides technical support for the environmental design of urban public spaces. Through the modelling of intelligent algorithms and the construction of fuzzy space, it can meet the diverse. Full Article
ac Trust in news accuracy on X and its impact on news seeking, democratic perceptions and political participation By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 Based on a survey of 2548 American adults conducted by Pew Research Center in 2021, this study finds that trust in the accuracy of news circulated on X (former Twitter) is positively correlated with following news sites on X, underscoring the crucial role of trust in news accuracy in shaping news-seeking behaviour. Trust in news accuracy also positively relates to political participation via X. Those who trust in news accuracy are more likely to perceive X as an effective tool for raising public awareness about political and social issues, as well as a positive force for democracy. However, exposure to misinformation weakens the connection between trust in news accuracy and users' perception about X as an effective tool for raising public awareness about political or social issues and as a positive driver for democracy. Full Article
ac Beyond utility: unpacking the enjoyment gap in e-government service use By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 E-government serves as a vital channel for citizen interactions with the public sector, where user enjoyment is of paramount importance. To date, few studies have comprehensively examined the determinants of citizen enjoyment in e-government. To address this research gap, we administered a survey and gathered data from 363 Australian residents using myGov for tax filing. Our analysis revealed a pronounced discrepancy between reported enjoyment and the intention to continue using the services. Although users demonstrated a strong intent to use e-government services, this intent did not uniformly align with enjoyment. Additionally, informed by self-determination theory, we developed and tested an e-government service enjoyment model to study the impacts of effort expectancy, technophilia, technology humanness, and engagement in fostering user enjoyment. Unexpectedly, the results showed that information privacy concerns, commonly seen as a deterrent in e-government adoption, did not significantly affect enjoyment. Our findings advance the discourse on e-government service improvement. Full Article
ac Ebullient supervision, employee engagement and employee commitment in a higher education institution: the partial least square approach By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 The study investigated the influence of ebullient supervision on employee commitment in a Ghanaian public university through the mediating role of employee engagement. The simple random sampling technique was used to draw 302 administrative staff of the university to respond to the self-administered questionnaire on the constructs. Furthermore, the partial least square structural equation technique was deployed to test the research hypotheses in the study. The results showed that ebullient supervision had a significant positive relationship with employee commitment and employee engagement. The findings further revealed that employee engagement positively correlated with employee commitment. Finally, the study's findings established that employee engagement partially mediated the link between ebullient supervision and employee commitment. The study emphasised that various supervisors in a university's administration should create an environment that favours fun where subordinates can form ties with one another. Full Article
ac Impact of servicescape dimensions on customer satisfaction and behavioural intentions: a case of casual dining restaurants By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Physical and social aspects each make up a separate part of servicescape. Together, these make up the servicescape. Although previous research has frequently investigated these aspects separately, the purpose of this study is to simultaneously find out the impact of both aspects within the casual dining restaurants' context. In total, 462 customers in Delhi were polled for this study, and structural equation modelling was used to analyse the data. According to the results, both the social and physical parts of the servicescape have the ability to affect how satisfied customers are, which in turn can affect how they behave in the future. Full Article
ac The relationship between 'creative slack' as an intangible asset and the innovative capabilities of the firm By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 The notion of creative slack purposefully refers to the notion of organisational slack proposed by Penrose (1959), who suggested that managers in organisations always have some stock of unused resources that inevitably accumulate when developing projects and are the primary factors determining the growth and innovation of the firm. In this contribution, we aim at adding a new dimension to the notion of organisational slack. Our view is that in many innovative organisations the slack of unused ideas is essentially a creative one, which is accumulated in diverse communities through multiple projects. This creative slack is a key intangible asset and a source of knowledge creation and innovation. To explain how organisations may benefit from exploiting the creative slack accumulated by communities, we rely on the analysis of two case studies, that of the Hydro-Québec Research Institute (IREQ), and of Ubisoft Montreal. Full Article
ac Researching together in academic engagement in engineering: a study of dual affiliated graduate students in Sweden By www.inderscience.com Published On :: 2024-09-02T23:20:50-05:00 This article explores dual affiliated graduate students that conduct research involving both universities and firms, which we conceptualise as a form of academic engagement, e.g., knowledge networks. We explore what they do during their studies, and their perceptions about their contributions to the firm's capacities for technology and innovation. So far, university-industry interactions in engineering are less researched than other fields, and this qualitative study focuses upon one department of Electrical Engineering in Sweden. First, we define and describe how the partner firms and universities organise this research collaboration as a form of academic engagement. Secondly, we propose a conceptual framework specifying how graduate students act as boundary-spanners between universities and firms. This framework is used for the empirical analysis, when exploring their perceptions of impact. Our results reveal that they primarily engage in problem-solving activities in technology, which augment particularly the early stages of absorptive capacities in firms. Full Article
ac Does smartphone usage affect academic performance during COVID outbreak? By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Pandemic has compelled the entire world to change their way of life and work. To control the infection rate, academic institutes deliver education online similarly. At least one smartphone is available in every home, and students use their smartphones to attend class. The study investigates the link between smartphone usage (SU) and academic performance (AP) during the pandemic. 490 data were obtained from various institutions and undergraduate students using stratified random sampling. These components were identified using factor analysis and descriptive methods, while the relationship of SU and AP based on gender classification was tested using Smart-PLS-SEM. The findings show that SU has a substantial relationship with academic success, whether done in class or outside of it. Even yet, the study found that SU and AP significantly impact both male and female students. Furthermore, the research focuses on SU outside and within the classroom to improve students' AP. Full Article
ac Female academics in higher education institutes and their work-life balance strategies: a voiceless saga By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Work-life balance (WLB) is a widely explored topic in the academic discourse. The researchers are trying to find strategies to effectively balance their work and home responsibilities for women in management. This study aims to analyse how gender roles and inequalities shape the strategies of female academics in higher education institutions. Eighteen faculty members participated in the semi-structured interviews. The trustworthiness of qualitative inquiry was ascertained by using triangulation, thick descriptions, and peer reviews. Three major themes emerged from the analysis: emotional, religious and social strategies. Despite available support, faculty noted challenges in managing work and family roles and fighting with gender stereotypes. This research adds to the emerging concept of WLB literature from the developed countries' viewpoint. It also shows how WLB discourse varies from Western sensibilities and collaborates with the previously established strategies that female academics formulate in WLB. Full Article
ac A Realistic Data Warehouse Project: An Integration of Microsoft Access® and Microsoft Excel® Advanced Features and Skills By Published On :: Full Article
ac Realizing Learning in the Workplace in an Undergraduate IT Program By Published On :: Full Article
ac Academic Library Services in Virtual Worlds: An Examination of the Potential for Library Services in Immersive Environments By Published On :: Full Article
ac Algorithm Visualization System for Teaching Spatial Data Algorithms By Published On :: Full Article
ac Studios, Mini-lectures, Project Presentations, Class Blog and Wiki: A New Approach to Teaching Web Technologies By Published On :: Full Article