ac

Quality of work life: an impact on bankers productivity

Quality of work life (QWL) is a generic term that includes an employee's feeling about various aspects of their work including the compensation and rewards, job security, interpersonal relations and the intrinsic meaning of being satisfied in their workplace. This research paper was documented with an intention to understand the influence of the QWL on the productivity of employees working in the banking arena. The study examined the most clout able factors that contributed to the quality of work-life of employees and its correlation on their productivity. A multi-stage sampling method was used to draw a sizeable sample from ten major banks situated in the Karnataka state of India. A total of 756 personnel spread across various branches belonging to rural, semi-urban and urban were covered. The study was validated further by testing various hypotheses drawn based on a review of the literature. The study empirically identified eight major attributes that influence the QWL of bankers. The relationship between QWL and productivity was investigated with notable results using SEM approach.




ac

Synoptic crow search with recurrent transformer network for DDoS attack detection in IoT-based smart homes

Smart home devices are vulnerable to various attacks, including distributed-denial-of-service (DDoS) attacks. Current detection techniques face challenges due to nonlinear thought, unusual system traffic, and the fluctuating data flow caused by human activities and device interactions. Identifying the baseline for 'normal' traffic and suspicious activities like DDoS attacks from encrypted data is also challenging due to the encrypted protective layer. This work introduces a concept called synoptic crow search with recurrent transformer network-based DDoS attack detection, which uses the synoptic weighted crow search algorithm to capture varying traffic patterns and prioritise critical information handling. An adaptive recurrent transformer neural network is introduced to effectively regulate DDoS attacks within encrypted data, counting the historical context of the data flow. The proposed model shows effective performance in terms of low false alarm rate, higher detection rate, and accuracy.




ac

Revolutionising facility layout: a case study of dynamic facility layout in cable production

In the competitive landscape of globalised markets, businesses must prioritise cost reduction for sustained competitiveness. This study delves into the dynamic facility layout problem (DFLP) within a cable production company in Kerala, emphasising adaptability to changing production demands. Addressing material handling costs and rearrangement expenses, the research evaluates the efficacy of the current static layout and explores the benefits of transitioning to a dynamic layout. The case study reveals potential cost savings through the strategic restructuring of machine arrangements. The innovative machine learning-based genetic algorithm (ML-GA) integrates machine learning algorithms, genetic algorithms, and a local search method, offering a cutting-edge solution to dynamic facility layout challenges. By considering demand variability and relocation costs, the study provides insights for informed decision-making, emphasising the significance of material flow patterns. This research contributes to enhancing efficiency and profitability, providing practical implications for businesses navigating the complexities of modern manufacturing.




ac

Combination of Lv-3DCNN algorithm in random noise environment and its application in aerobic gymnastics action recognition

Action recognition plays a vital role in analysing human body behaviour and has significant implications for research and education. However, traditional recognition methods often suffer from issues such as inaccurate time and spatial feature vectors. Therefore, this study addresses the problem of inaccurate recognition of aerobic gymnastics action image data and proposes a visualised three-dimensional convolutional neural network algorithm-based action recognition model. This model incorporates unsupervised visualisation methods into the traditional network and enhances data recognition capabilities through the introduction of a random noise perturbation enhancement algorithm. The research results indicate that the data augmented with noise perturbation achieves the lowest mean square error, reducing the error value from 0.3352 to 0.3095. The use of unsupervised visualisation analysis enables clearer recognition of human actions, and the algorithm model is capable of accurately recognising aerobic movements. Compared to traditional algorithms, the new algorithm exhibits higher recognition accuracy and superior performance.




ac

An MCDM approach to compare different concepts of SMED to reduce the setup time in concrete products manufacturing: a case study

In the construction sector, moulding machines are crucial in producing concrete products, yet changing their mould can pose challenges for some businesses. This paper presents a case study aimed at reducing the setup time of HESS RH 600 moulding machine. Four alternatives are proposed and evaluated to achieve this goal. The first alternative involves converting internal to external activities, while the subsequent alternatives aim to improve the basic solution. These include building a canopy near the machine (alternative 2), installing an air reservoir (alternative 3), and a comprehensive approach involving building the canopy, installing the air reservoir, and adding a new forklift to facilitate the machine setup process (alternative 4). The analytic hierarchy process (AHP) heuristic method is used to select the best alternative solution based on prespecified criteria. It is found that the application of the single-minute exchange of die (SMED) solution without any further improvement is the most favourable.




ac

Exploring the impact of monetary policy on sustainable development with mediation of e-banking services and moderation of financial risk awareness

Monetary policy is essential for sustainable growth where effective monetary policies can improve investment, employment, and consumption by fostering a balanced and resilient economy. However, sustainable development is vital for harmonising economic growth, social equity, and environmental preservation. A number of factors have been discussed in the literature that impact sustainable development. However, this study explicitly tries to investigate the nexus among the monetary policy (MP) toward sustainable development (SD) with the mediation of e-banking services (e-BS) and moderation of financial risk management (FRM) from China drawing on stakeholder theory. It discovered a significant connection between monetary policy and sustainable development along with sub-dimensions of SD. Likewise, this study confirmed a positive mediating influence of e-BS between monetary policy and sustainable development. Finally, the study additionally ensured a positive moderation of financial risk between monetary policy and sustainable development, respectively. These outcomes bestow several interesting insights into monetary policy, e-banking services, financial risk management, and sustainable development.




ac

The influence of digital literacy and schemes on the overall satisfaction of digital usage among unorganised retailers

The world is transitioning towards the digitalisation of everyday tasks significantly. The impact of digital literacy on technological usage is immense. The awareness and utilisation of the digital India schemes are needed to determine unorganised retailers' overall satisfaction with digitalisation and technological usage. The chief motive of this research is to assess and analyse digital literacy in terms of technology usage and the awareness cum utilisation level of the various digital India schemes proposed by the Government of India for unorganised retailers. The conceptual framework consists of the factors such as digital literacy and digital India schemes that determine the overall satisfaction of retailers with technology usage. The corresponding results of the study synthesised the impact of digital literacy, digital India schemes, and the awareness cum utilisation level of technology among unorganised retailers based on recommendations to enhance the performance of the unorganised retail sector.




ac

Effective inventory management among Malaysian SMEs in the manufacturing sector towards organisational performance

In several manufacturing firms, inventory constitutes most of the current assets, and this underscores the importance of inventory management as a fundamental issue for the majority of the firms irrespective of their sizes. Therefore, the purpose of this research is to assess the factors that influence the effectiveness of inventory management of Malaysian SMEs in the manufacturing sector. The study employs PLS-SEM technique to test the hypotheses. The main findings show that documentation and records, inventory control system and qualified personnel have positive effects on effective inventory management of Malaysian SMEs in the manufacturing sector. The study also reveals that effective inventory management has a mediating effect on the relationship between documentation and records, inventory control system, qualified personnel and organisational performance. Therefore, the study recommends that Malaysian SMEs in the manufacturing sector should improve their approaches to embracing effective inventory management practices in order to enhance organisational performance.




ac

Assessing supply chain risk management capabilities and its impact on supply chain performance: moderation of AI-embedded technologies

This research investigates the correlation between risk management and supply chain performance (SCP) along with moderation of AI-embedded technologies such as big data analytics, Internet of Things (IoT), virtual reality, and blockchain technologies. To calculate the results, this study utilised 644 questionnaires through the structural equation modelling (SEM) method. It is revealed using SmartPls that financial risk management (FRM) is positively linked with SCP. Second, it was observed that AI significantly moderates the connection between FRM and SCP. In addition, the study presents certain insights into supply chain and AI-enabled technologies and how these capabilities can beneficially advance SCP. Besides, certain implications, both managerial and theoretical are described for the supply chain managers along with limitations for future scholars of the world.




ac

Measuring information quality and success in business intelligence and analytics: key dimensions and impacts

The phenomenon of cloud computing and related innovations such as Big Data have given rise to many fundamental changes that are evident in information and data. Managing, measuring and developing business value from the plethora of this new data has significant impact on many corporate agendas, particularly in relation to the successful implementation of business intelligence and analytics (BI&A). However, although the influence of Big Data has fundamentally changed the IT application landscape, the metrics for measuring success and in particular, the quality of information, have not evolved. The measurement of information quality and the antecedent factors that influence information has also been identified as an area that has suffered from a lack of research in recent decades. Given the rapid increase in data volume and the growth and ubiquitous use of BI&A systems in organisations, there is an urgent need for accurate metrics to identify information quality.




ac

Electronic management of enterprise accounting files under the condition of informatisation

With the rapid development of computer information technology, the work of accountants has gradually evolved into an electronic trend and the management of accounting files has also undergone great changes. Combining with the current development trend of informatisation, this paper discusses the electronic management mode of enterprise accounting files under the condition of informatisation. Combined with the latest information technology, an enterprise electronic accounting file system is established and the research and development system is compared with the traditional paper accounting file management. The results have shown that the retrieval and query time of traditional paper accounting files is close to 2 hours. After the implementation of the electronic accounting file system, the retrieval and query time of files can be completed in only 2 minutes, and the query efficiency of files has been increased by nearly 60 times.




ac

Intelligent traffic congestion discrimination method based on wireless sensor network front-end data acquisition

Conventional intelligent traffic congestion discrimination methods mainly use GPS terminals to collect traffic congestion data, which is vulnerable to the influence of vehicle time distribution, resulting in poor final discrimination effect. Necessary to design a new intelligent traffic congestion discrimination method based on wireless sensor network front-end data collection. That is to use the front-end data acquisition technology of wireless sensor network to generate a front-end data acquisition platform to obtain intelligent traffic congestion data, and then design an intelligent traffic congestion discrimination algorithm based on traffic congestion rules so as to achieve intelligent traffic congestion discrimination. The experimental results show that the intelligent traffic congestion discrimination method designed based on the front-end data collection of wireless sensor network has good discrimination effect, the obtained discrimination data is more accurate, effective and has certain application value, which has made certain contributions to reducing the frequency of urban traffic accidents.




ac

Evolution of academic research in French business schools (2008-2018): isomorphism and heterogeneity

In the perspective of institutional theory, business education is an institutional field, in which two major institutional forces are accreditations and rankings. In this context, French business schools (BS) have adopted an isomorphic response by starting to engage in research and publishing in academic journals. Studies have discussed their research as a new institutional trajectory. However, what remains unknown is how they differ from each other in such research dynamics. To bring new insights to the discussion, this quantitative study examines, over the period of 2008-2018, the evolution of research of French BS by systematically comparing the 'best' schools with other schools in all analyses. The results indicate a strong isomorphism in terms of publication quantity and productivity, scale of research collaboration and the internationalisation of research. However, these schools are heterogeneous in terms research quality and scale of international research collaboration, reflecting the diversity in their research strategy.




ac

Student advisement on courses sequencing in teaching-focused business-schools

Students in teaching-focused business-schools need a level of assistance and advisement broader and more profound than what is needed in R1&R2 schools. We investigate the informal interdependencies among marketing, finance, operation, and management core courses in these schools. By conducting hypothesis tests on a large dataset, we identify a flexible network showing the preferred sequencing of these courses to improve students' performance as measured by the course grade. Better performances in this context may also lead to higher retention-rates and lower time-to-degree. We recommend taking Finance or Finance and Management as the first course(s). Marketing should be the next course before or concurrent with Operations Management. Regarding the lower division courses, it is recommended to take Statistics before Economics and Accounting courses and Accounting before or concurrent with Economics. We also consider the significant role of a milestone course that links the lower division and core courses.




ac

International Journal of Teaching and Case Studies




ac

Evaluation method for the effectiveness of online course teaching reform in universities based on improved decision tree

Aiming at the problems of long evaluation time and poor evaluation accuracy of existing evaluation methods, an improved decision tree-based evaluation method for the effectiveness of college online course teaching reform is proposed. Firstly, the teaching mode of college online course is analysed, and an evaluation system is constructed to ensure the applicability of the evaluation method. Secondly, AHP entropy weight method is used to calculate the weights of evaluation indicators to ensure the accuracy and authority of evaluation results. Finally, the evaluation model based on decision tree algorithm is constructed and improved by fuzzy neural network to further optimise the evaluation results. The parameters of fuzzy neural network are adjusted and gradient descent method is used to optimise the evaluation results, so as to effectively evaluate the effect of college online course teaching reform. Through experiments, the evaluation time of the method is less than 5 ms, and the evaluation accuracy is more than 92.5%, which shows that the method is efficient and accurate, and provides an effective evaluation means for the teaching reform of online courses in colleges and universities.




ac

A method for evaluating the quality of college curriculum teaching reform based on data mining

In order to improve the evaluation effect of current university teaching reform, a new method for evaluating the quality of university course teaching reform is proposed based on data mining algorithms. Firstly, the optimal data clustering criterion was used to select evaluation indicators and a quality evaluation system for university curriculum teaching reform was established. Next, a reform quality evaluation model is constructed using BP neural network, and the training process is improved through genetic algorithm to obtain the model weight and threshold of the optimal solution. Finally, the calculated parameters are substituted into the model to achieve accurate evaluation of the quality of university curriculum teaching reform. Selecting evaluation accuracy and evaluation efficiency as evaluation indicators, the practicality of the proposed method was verified through experiments. The experimental results showed that the proposed method can mine teaching reform data and evaluate the quality of teaching reform. Its evaluation accuracy is higher than 96.3%, and the evaluation time is less than 10ms, which is much better than the comparison method, fully demonstrating the practicality of the method.




ac

Evaluation method of teaching reform quality in colleges and universities based on big data analysis

Research on the quality evaluation of teaching reforms plays an important role in promoting improvements in teaching quality. Therefore, an evaluation method of teaching reform quality in colleges and universities based on big data analysis is proposed. A multivariate logistic model is used to select the evaluation indicators for the quality evaluation of teaching reforms in universities. And clustering and cleaning of the evaluation indicator data are performed through big data analysis. The evaluation indicator data is used as input vectors, and the results of the teaching reform quality evaluation are used as output vectors. A support vector machine model based on the whale algorithm is built to obtain the relevant evaluation results. Experimental results show that the proposed method achieves a minimum recall rate of 98.7% for evaluation indicator data, the minimum data processing time of 96.3 ms, the accuracy rate consistently above 97.1%.




ac

A personalised recommendation method for English teaching resources on MOOC platform based on data mining

In order to enhance the accuracy of teaching resource recommendation results and optimise user experience, a personalised recommendation method for English teaching resources on the MOOC platform based on data mining is proposed. First, the learner's evaluation of resources and resource attributes are abstracted into the same space, and resource tags are established using the Knowledge graph. Then, interest preference constraints are introduced to mine sequential patterns of user historical learning behaviour in the MOOC platform. Finally, a graph neural network is used to construct a recommendation model, which adjusts users' short-term and short-term interest parameters to achieve dynamic personalised teaching recommendation resources. The experimental results show that the accuracy and recall of the resource recommendation results of the research method are always higher than 0.9, the normalised sorting gain is always higher than 0.5.




ac

Integrating MOOC online and offline English teaching resources based on convolutional neural network

In order to shorten the integration and sharing time of English teaching resources, a MOOC English online and offline mixed teaching resource integration model based on convolutional neural networks is proposed. The intelligent integration model of MOOC English online and offline hybrid teaching resources based on convolutional neural network is constructed. The intelligent integration unit of teaching resources uses the Arduino device recognition program based on convolutional neural network to complete the classification of hybrid teaching resources. Based on the classification results, an English online and offline mixed teaching resource library for Arduino device MOOC is constructed, to achieve intelligent integration of teaching resources. The experimental results show that when the regularisation coefficient is 0.00002, the convolutional neural network model has the best training effect and the fastest convergence speed. And the resource integration time of the method in this article should not exceed 2 s at most.




ac

Prediction method of college students' achievements based on learning behaviour data mining

This paper proposes a method for predicting college students' performance based on learning behaviour data mining. The method addresses the issue of limited sample size affecting prediction accuracy. It utilises the K-means clustering algorithm to mine learning behaviour data and employs a density-based approach to determine optimal clustering centres, which are then output as the results of the clustering process. These clustering results are used as input for an attention encoder-decoder model to extract features from the learning behaviour sequence, incorporating an attention mechanism, sequence feature generator, and decoder. The characteristics derived from the learning behaviour sequence are then used to establish a prediction model for college students' performance, employing support vector regression. Experimental results demonstrate that this method accurately predicts students' performance with a relative error of less than 4% by leveraging the results obtained from learning behaviour data mining.




ac

A method for evaluating the quality of teaching reform based on fuzzy comprehensive evaluation

In order to improve the comprehensiveness of evaluation results and reduce errors, a teaching reform quality evaluation method based on fuzzy comprehensive evaluation is proposed. Firstly, on the premise of meeting the principles of indicator selection, factor analysis is used to construct an evaluation indicator system. Then, calculate the weights of various evaluation indicators through fuzzy entropy, establish a fuzzy evaluation matrix, and calculate the weight vector of evaluation indicators. Finally, the fuzzy cognitive mapping method is introduced to improve the fuzzy comprehensive evaluation method, obtaining the final weight of the evaluation indicators. The weight is multiplied by the fuzzy evaluation matrix to obtain the comprehensive evaluation result. The experimental results show that the maximum relative error of the proposed method's evaluation results is about 2.0, the average comprehensive evaluation result is 92.3, and the determination coefficient is closer to 1, verifying the application effect of this method.




ac

Multiplication complexity in education activities with fair use principle of copyright in Indonesia

Copying and duplicating papers for educational purposes is a violation form of copyright in Indonesia. The principle of fair use in education is a form of structured violation. Copying and duplicating the papers of the authors for educational purposes has provided commercial (business) benefits for libraries and universities. The research method is conducted using the observation method in libraries and universities that duplicate papers. The method also uses the normative juridical method that connects duplication of the papers in libraries and universities with the fair use principle. The results explain the authors' loss from copying and duplicating of papers in libraries and universities. Therefore, copying and duplicating the papers can only be done by implementing the responsibility system. Copying and duplicating the papers of the authors' in libraries and universities can be allowed if they fulfil the elements of copyright protection in the new concept.




ac

An evaluation of English distance information teaching quality based on decision tree classification algorithm

In order to overcome the problems of low evaluation accuracy and long evaluation time in traditional teaching quality evaluation methods, a method of English distance information teaching quality evaluation based on decision tree classification algorithm is proposed. Firstly, construct teaching quality evaluation indicators under different roles. Secondly, the information gain theory in decision tree classification algorithm is used to divide the attributes of teaching resources. Finally, the rough set theory is used to calculate the index weight and establish the risk evaluation index factor set. The result of teaching quality evaluation is obtained through fuzzy comprehensive evaluation method. The experimental results show that the accuracy rate of the teaching quality evaluation of this method can reach 99.2%, the recall rate of the English information teaching quality evaluation is 99%, and the time used for the English distance information teaching quality evaluation of this method is only 8.9 seconds.




ac

Research on construction of police online teaching platform based on blockchain and IPFS technology

Under the current framework of police online teaching, in order to effectively solve the lack of high-quality resources of the traditional platform, backward sharing technology, poor performance of the digital platform and the privacy problems faced by each subject in sharing. This paper designs and implements the online teaching platform based on blockchain and interplanetary file system (IPFS). Based on the architecture of a 'decentralised' police online teaching platform, the platform uses blockchain to store hashes of encrypted private information and user-set access control policies, while the real private information is stored in IPFS after encryption. In the realisation of privacy information security storage at the same time to ensure the effective control of the user's own information. In order to achieve flexible rights management, the system classifies private information. In addition, the difficulties of police online teaching and training reform in the era of big data are solved one by one from the aspects of communication mode, storage facilities, incentive mechanism and confidentiality system, which effectively improves the stability and security of police online teaching.




ac

Quantitative evaluation method of ideological and political teaching achievements based on collaborative filtering algorithm

In order to overcome the problems of large error, low evaluation accuracy and long evaluation time in traditional evaluation methods of ideological and political education, this paper designs a quantitative evaluation method of ideological and political education achievements based on collaborative filtering algorithm. First, the evaluation index system is constructed to divide the teaching achievement evaluation index data in a small scale; then, the quantised dataset is determined and the quantised index weight is calculated; finally, the collaborative filtering algorithm is used to generate a set with high similarity, construct a target index recommendation list, construct a quantitative evaluation function and solve the function value to complete the quantitative evaluation of teaching achievements. The results show that the evaluation error of this method is only 1.75%, the accuracy can reach 98%, and the time consumption is only 2.0 s, which shows that this method can improve the quantitative evaluation effect.




ac

The performance evaluation of teaching reform based on hierarchical multi-task deep learning

The research goal is to solve the problems of low accuracy and long time existing in traditional teaching reform performance evaluation methods, a performance evaluation method of teaching reform based on hierarchical multi-task deep learning is proposed. Under the principle of constructing the evaluation index system, the evaluation indicator system should be constructed. The weight of the evaluation index is calculated through the analytic hierarchy process, and the calculation result of the evaluation weight is taken as the model input sample. A hierarchical multi-task deep learning model for teaching reform performance evaluation is built, and the final teaching reform performance score is obtained. Through relevant experiments, it is proved that compared with the experimental comparison method, this method has the advantages of high evaluation accuracy and short time, and can be further applied in relevant fields.




ac

A risk identification method for abnormal accounting data based on weighted random forest

In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good.




ac

Online allocation of teaching resources for ideological and political courses in colleges and universities based on differential search algorithm

In order to improve the classification accuracy and online allocation accuracy of teaching resources and shorten the allocation time, this paper proposes a new online allocation method of college ideological and political curriculum teaching resources based on differential search algorithm. Firstly, the feedback parameter model of teaching resources cleaning is constructed to complete the cleaning of teaching resources. Secondly, according to the results of anti-interference consideration, the linear feature extraction of ideological and political curriculum teaching resources is carried out. Finally, the online allocation objective function of teaching resources for ideological and political courses is constructed, and the differential search algorithm is used to optimise the objective function to complete the online allocation of resources. The experimental results show that this method can accurately classify the teaching resources of ideological and political courses, and can shorten the allocation time, with the highest allocation accuracy of 97%.




ac

Student's classroom behaviour recognition method based on abstract hidden Markov model

In order to improve the standardisation of mutual information index, accuracy rate and recall rate of student classroom behaviour recognition method, this paper proposes a student's classroom behaviour recognition method based on abstract hidden Markov model (HMM). After cleaning the students' classroom behaviour data, improve the data quality through interpolation and standardisation, and then divide the types of students' classroom behaviour. Then, in support vector machine, abstract HMM is used to calculate the output probability density of support vector machine. Finally, according to the characteristic interval of classroom behaviour, we can judge the category of behaviour characteristics. The experiment shows that normalised mutual information (NMI) index of this method is closer to one, and the maximum AUC-PR index can reach 0.82, which shows that this method can identify students' classroom behaviour more effectively and reliably.




ac

Can artificial intelligence replace whistle-blowers in the business sector?

The major technological developments have changed the traditional way of doing business. These developments have facilitated whistle-blowing. Access to data is easier and faster and communicating with the public can be done in seconds. Another development is the artificial intelligence (AI) which enters the business workplace in different forms challenging the traditional working relations. The combination of these concepts gives the idea of artificial whistle-blowing or robot whistle-blowing. The concept is that a machine should conceive and report relevant wrongdoing avoiding the traditional model of whistle-blowing where the employee is the person who should report. This concept, yet unexplored, presents interesting positive and negative aspects. The purpose of this contribution is to present the idea of artificial whistle-blowing and its advantages and disadvantages for the business sector. As a conclusion, this paper suggests that the concept of artificial whistle-blowing needs still to be researched and an optimal solution, for the time being, is to permit artificial whistle-blowing as a helping tool for the employees to detect wrongdoings but report them themselves.




ac

The right to access information under the GDPR

The present paper offers a critique of the General Data Protection Regulation in the realm of access to information. Even though the GDPR supports the constitutionally obvious position that the right to data protection does not outweigh other equally important rights, the enhanced protection of the right to the protection of personal data leads to the potential neglect of other constitutional rights, such as that of access to information. Data protection and access to information authorities should be established both on an EU, as well as at national level as a single authority. Scientific research must be facilitated through access to a multitude of information. The present article explores the question of data ownership and aims to propose a new system that will enhance access to information. A key tool of our research will be the comparative overview of existing legislative systems and a review of the different approaches in the case-law of independent authorities.




ac

Stock market response to mergers and acquisitions: comparison between China and India

This research delves into the wealth effect of shareholders from bidding firms created by mergers and acquisitions (M&A) in China and India, two of the world's most populous nations. The study reveals that on average, M&A deals create wealth for shareholders of the acquiring firms, as determined by abnormal percentage returns in a five-day event window. Regarding the further classification of acquiring firms based on industry, the abnormal percentage returns vary in different sectors in both countries. In China, shareholders benefit in seven out of ten industries, while in India, they gain in five out of nine industries. Moreover, the stock markets' responses vary depending on the type of M&A in each country. Cross-industry M&A deals in China generate higher gains for shareholders than within-industry deals, whereas, in India, within-industry M&A deals generate higher gains.




ac

Building a Community of Curatorial Practice at Penn State: A Case Study

The Penn State University Libraries and Information Technology Services (ITS) collaborated on the development of Curation Architecture Prototype Services (CAPS), a web application for ingest and management of digital objects. CAPS is built atop a prototype service platform providing atomistic curation functions in order to address the current and emerging requirements in the Libraries and ITS for digital curation, defined as “... maintaining and adding value to a trusted body of digital information for future and current use; specifically, the active management and appraisal of data over the entire life cycle” (Pennock, 2006)[7]. Additional key goals for CAPS were application of an agile-style methodology to the development process and an assessment of the resulting tool and stakeholders’ experience in the project. This article focuses in particular on the community-building aspects of CAPS, which emerged from a combination of agile-style approaches and our commitment to engage stakeholders actively throughout the process, from the construction of use cases, to decisions on metadata standards, to ingest and management functionalities of the tool. The ensuing community of curatorial practice effectively set the stage for the next iteration of CAPS, which will be devoted to planning and executing the development of a production-ready, enterprise-quality infrastructure to support publishing and curation services at Penn State.




ac

Document Viewers for Non-Born-Digital Files in DSpace

As more institutions continue to work with large and diverse type of content for their digital repositories, there is an inherent need to evaluate, prototype, and implement user-friendly websites -regardless of the digital files' size, format, location or the content management system in use. This article aims to provide an overview of the need and current development of Document Viewers for digitized objects in DSpace repositories -includign a local viewer developed for an newspaper collection and four other viewers currently implemented in DSpace repositories. According to the DSpace Registry, 22% of institutions are currently storing "Images" in their repositories and 21% are using DSpace for non-traditional IR content such as: Image Repository, Subject Repository, Museum Cultural, or Learning Resources. The combination of current technologies such as Djatoka Image Server, IIPImage Server, DjVu Libre, and the Internet Archive BookReader, as well as the growing number of digital repositories hosting digitized content, suggests that the DSpace community will probably benefit with an "out-of-the-box" Document Viewer, especially one for large, high-resolution, and multi-page objects.




ac

An empirical study on the nexus among the prices of commodities: an ARDL and bound test approach

This study investigates the nexus among the commodities: bitcoin, copper, gold, silver, crude oil, and iron ore. Previous studies on establishing the plausibility and the dynamic nexus among commodities are rare. This research attempts to fill this gap. This study investigates whether there are long-term and short-term links between commodities for the period 2010-2022 by applying the bounds testing method to co-integration and ECM, built using an ARDL model and establishing both short-term and long-term relationships among the economic variables analysed. The ECM confirmed the presence of some co-integration relationship for all the variables, both in the short and long term. A strong correlation was discovered among the commodities, which were greatly influenced by their lagged values. The results of this study provides an opportunity for policymakers and researchers to understand the nature of the relationship between the analysed variables and further support the development of new policies for economic sustainability.




ac

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




ac

The role of shopping apps and their impact on the online purchasing behaviour patterns of working women in Bangalore

The study aims to analyse the impact of shopping applications on the shopping behaviour of the working women community in Bangalore, a city known as the IT hub. The research uses a quantitative analysis with SPSS version 23 software and a structured questionnaire survey technique to gather data from the working women community. The study uses descriptive statistics, ANOVA, regression, and Pearson correlation analysis to evaluate the perception of working women regarding the significance of online shopping applications. The results show that digital shopping applications are more prevalent among the working women community in Bangalore. The study also evaluates the socio-economic and psychological factors that influence their purchasing behaviour. The findings suggest that online marketers should enhance their strategies to improve their business on digital platforms. The research provides valuable insights into the shopping habits of the working women community in Bangalore.




ac

Connecting with the Y Generation: an Analysis of Factors Associated with the Academic Performance of Foundation IS Students




ac

Human-Computer Interaction Gearing Up for Work




ac

Manufacturing Organizational Memory: Logged Conversation Thread Analysis




ac

Towards an Interactive Learning Environment for Object-Z




ac

Are All Learners Created Equal? A Quantitative Analysis of Academic Performance in a Distance Tertiary Institution




ac

Exploring Change and Innovation by ICT Teaching Staff in the New Zealand Polytechnic Sector




ac

What to Teach Business Students in MIS Courses about Data and Information




ac

A Data Model Validation Approach for Relational Database Design Courses




ac

A Comparison of Learning and Teaching Styles – Self-Perception of IT Students




ac

Action-Guidance: An Action Research Project for the Application of Informing Science in Educational and Vocational Guidance




ac

Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use




ac

Factors Influencing the Decision to Choose Information Technology Preparatory Studies in Secondary Schools: An Exploratory Study in Regional/Rural Australia