w

The Utilization of 3D Printers by Elementary-Aged Learners: A Scoping Review

Aim/Purpose: This review’s main objective was to examine the existing literature on the use of 3D printers in primary education, covering students aged six to twelve across general, special, and inclusive educational environments. Background: A review of the literature indicated a significant oversight – prior reviews insufficiently distinguish the application of 3D printing in primary education from its utilization at higher educational tiers or focused on particular subject areas and learning domains. Considering the distinct nature and critical role of primary education in developing young students’ cognitive abilities and skills, it is essential to concentrate on this specific educational stage. Methodology: The scoping review was selected as the preferred research method. The methodological robustness was augmented through the utilization of the backward snowballing technique. Consequently, a total of 50 papers were identified and subjected to thorough analysis. Contribution: This review has methodically compiled and analyzed the literature on 3D printing use among elementary students, offering a substantial addition to academic conversations. It consolidated and organized research on 3D printers’ educational uses, applying robust and credible criteria. Findings: Many studies featured small sample sizes and limited research on inclusive and special education. The analysis revealed 82 distinct research goals and 13 educational fields, with STEM being the predominant focus. Scholars showed considerable interest in how 3D printers influence skills like creativity and problem-solving, as well as emotions such as engagement and motivation. The majority of studies indicated positive outcomes, enhancing academic achievement, engagement, collaboration, creativity, interest, and motivation. Nonetheless, challenges were noted, highlighting the necessity for teacher training, the expense of equipment, technical difficulties, and the complexities of blending new methods with traditional curricula. Recommendations for Practitioners: To capitalize on the benefits that 3D printers bring, curriculum planners are urged to weave them into their programs, ensuring alignment with educational standards and skill development. The critical role educators play in the effective implementation of this technology necessitates targeted professional development programs to equip them with the expertise for successful integration. Moreover, 3D printing presents a unique opportunity to advance inclusive education for students with disabilities, offering tailored learning experiences and aiding in creating assistive technologies. In recognizing the disparities in access to 3D printing, educational leaders must address the financial and logistical barriers highlighted in the literature. Strategic initiatives are essential to democratize 3D printing access, ensuring all students benefit from this educational tool. Recommendation for Researchers: Comparative studies are critical to elucidate the specific advantages and limitations of 3D printing technology due to the scarcity of research contrasting it with other tools. The variability in reporting durations of interventions and research environments underscores the necessity for uniform methodologies and benchmarks. Because research has predominantly focused on STEM/STEAM education, expanding into different educational areas could provide a comprehensive understanding of 3D printing’s capabilities. The existence of neutral and negative findings signals an opportunity for further investigation. Exploring the factors that impede the successful integration of 3D printing will inform the creation of superior pedagogical approaches and technological refinements. Future Research: As the review confirmed the significant promise of 3D printing technology in enriching education, especially in the context of primary education, the imperative for continued research to refine its application in primary education settings is highlighted.




w

Faculty Perspectives on Web Learning Apps and Mobile Devices on Student Engagement

Aim/Purpose: The digital ecosystem has contributed to the acceleration of digital and mobile educational tools across institutions worldwide. The research displays educators’ perspectives on web applications on mobile devices that can be used to engage and challenge students while impacting their learning. Background: Explored are elements of technology in education and challenges and successes reported by instructors to shift learning from static to dynamic. Methodology: Insights for this study were gained through questionnaires and focus groups with university educators in the United Arab Emirates. Key questions addressed are (1) challenges/benefits, (2) types of mobile technology applications used by educators, and (3) strategies educators use to support student learning through apps. The research is assisted by focus groups and a sample of 42 completed questionnaires. Contribution: The work contributes to web/mobile strategic considerations in the classroom that can support student learning and outcomes. Findings: The results reported showcase apps that were successfully implemented in classrooms and provide a perspective for today’s learning environment that could be useful for instructors, course developers, or any educational institutions. Recommendations for Practitioners: Academics can integrate suggested tools and explore engagement and positive associations with tools and technologies. Recommendation for Researchers: Researchers can consider new learning applications, mobile devices, course design, learning strategies, and student engagement practices for future studies. Impact on Society: Digitization and global trends are changing how educators teach, and students learn; therefore, gaps need to be continually filled to keep up with the pace of ever-evolving digital technologies that can engage student learning. Future Research: Future research may focus on interactive approaches toward mobile devices in higher education learning and shorter learning activities to engage students.




w

Android malware analysis using multiple machine learning algorithms

Currently, Android is a booming technology that has occupied the major parts of the market share. However, as Android is an open-source operating system there are possibilities of attacks on the users, there are various types of attacks but one of the most common attacks found was malware. Malware with machine learning (ML) techniques has proven as an impressive result and a useful method for malware detection. Here in this paper, we have focused on the analysis of malware attacks by collecting the dataset for the various types of malware and we trained the model with multiple ML and deep learning (DL) algorithms. We have gathered all the previous knowledge related to malware with its limitations. The machine learning algorithms were having various accuracy levels and the maximum accuracy observed is 99.68%. It also shows which type of algorithm is preferred depending on the dataset. The knowledge from this paper may also guide and act as a reference for future research related to malware detection. We intend to make use of Static Android Activity to analyse malware to mitigate security risks.




w

Implementation of a novel technique for ordering of features algorithm in detection of ransomware attack

In today's world, malware has become a part and threat to our computer systems. All electronic devices are very susceptible/vulnerable to various threats like different types of malware. There is one subset of malware called ransomware, which is majorly used to have large financial gains. The attacker asks for a ransom amount to regain access to the system/data. When dynamic technique using machine learning is used, it is very important to select the correct set of features for the detection of a ransomware attack. In this paper, we present two novel algorithms for the detection of ransomware attacks. The first algorithm is used to assign the time stamp to the features (API calls) for the ordering and second is used for the ordering and ranking of the features for the early detection of a ransomware attack.




w

Electronic disciplinary violations and methods of proof in Jordanian and Egyptian laws

The use of electronic means of a public official in carrying out their duties may lead to an instance wherein the person discloses confidential information, which can significantly impact their obligations. After verifying this act as part of electronic misconduct, disciplinary action is enforced upon the concerned party to rectify and ensure proper functioning in delivering public services without any disturbance or infringement. The study presents several significant findings regarding the absence of comparative regulations concerning electronic violations and their judicial evidence. It provides recommendations such as modifying legislative frameworks to enhance public utility disciplinary systems and incorporating rules for electric violations. The fundamental focus revolves around assessing, verifying, and punishing digital misconduct by management or regulatory bodies. Additionally, this research employs descriptive-analytical methods comparing the Jordanian Law with its Egyptian counterpart in exploring these issues.




w

Honeybrid method for network security in a software defined network system

This research introduces a hybrid honeypot architecture to bolster security within software-defined networks (SDNs). By combining low-interaction and high-interaction honeypots, the proposed solution effectively identifies and mitigates cyber threats, including port scanning and man-in-the-middle attacks. The architecture is structured into multiple modules that focus on detecting open ports using Vilhala honeypots and simulating targeted and random attack scenarios. This hybrid approach enables comprehensive monitoring and detailed packet-level analysis, providing enhanced protection against advanced online threats. The study also conducts a comparative analysis of different attack detection methods using tools like KFSensor and networking shell commands. The results highlight the hybrid honeypot system's efficacy in filtering malicious traffic and detecting security breaches, making it a robust solution for safeguarding SDNs.




w

Quality of work life: an impact on bankers productivity

Quality of work life (QWL) is a generic term that includes an employee's feeling about various aspects of their work including the compensation and rewards, job security, interpersonal relations and the intrinsic meaning of being satisfied in their workplace. This research paper was documented with an intention to understand the influence of the QWL on the productivity of employees working in the banking arena. The study examined the most clout able factors that contributed to the quality of work-life of employees and its correlation on their productivity. A multi-stage sampling method was used to draw a sizeable sample from ten major banks situated in the Karnataka state of India. A total of 756 personnel spread across various branches belonging to rural, semi-urban and urban were covered. The study was validated further by testing various hypotheses drawn based on a review of the literature. The study empirically identified eight major attributes that influence the QWL of bankers. The relationship between QWL and productivity was investigated with notable results using SEM approach.




w

Nexus between women directors and firm performance: a study on BSE 200 companies

The present study is a modest attempt to investigate the impact of gender diversity on firm performance of BSE 200 listed companies. The study is based on the secondary data collected from the EMIS database and the corporate governance reports for a period of eight years, i.e., from 2012 to 2019. Sample size of the present study is 174 Indian companies listed in the Bombay Stock Exchange. The study has employed multiple regression models by considering the endogeneity issue to empirically test the impact of gender diversity on firm performance in Indian context. Based on the multiple regression models, we find that the impact of gender diversity is positive and significant on the market-based measure of firm performance. However, the impact becomes negative significant when firm performance was measured by accounting based measure of firm performance.




w

'CSR, sustainability and firm performance linkage' current status and future dimensions - a bibliometric review analysis

Corporate social responsibility (CSR) and sustainability are gaining worldwide recognition. The question of whether CSR and sustainability programs benefit an organisation's financial success is still being debated. This study aims to verify this phenomenon by examining the current literature pattern on this relationship using bibliometric and systematic review analysis. It further provides a taxonomy for understanding this association. VOSviewer is used to obtain comprehensive dataset mapping and clustering in the field. The manuscript offers promising insights regarding academia by assessing the pattern of publication trends, the most influential author in the area, and analysing the methodological and theoretical underpinnings of CSR, sustainability and firm performance linkage. The outcome of this study provides exploratory insights into research gaps and avenues for future research.




w

Influence of nostalgic behaviour on the consumption patterns of adults: a conceptual framework

Nostalgia has an intrinsic association with consumer behaviour. Retrieval of memories drives emotions among consumers and reinforces experience-led buying decisions. Despite nostalgia, and consumption being a common practice at various times in life, issues regarding the nostalgia stimuli on customers' perceptions and buying decisions remain less explored. This article aims at exploring the consumption pattern of adult consumers by analysing the influence of nostalgic behaviour referring to the autobiographic memories and social motivations. It describes the purchase intentions and consumption pattern among adult consumers in the context of self-reference criteria based on nostalgic memories and social motivations. This article offers constructive understanding on establishing relationship between nostalgic memories and consumption pattern over the temporal framework and establishing the brand loyalty and hedonic satisfaction. It contributes to the existing literature by critically examining the theoretical concepts and empirical findings of previous studies on perceptions of consumers on nostalgic emotions and their role in making buying decisions.




w

Synoptic crow search with recurrent transformer network for DDoS attack detection in IoT-based smart homes

Smart home devices are vulnerable to various attacks, including distributed-denial-of-service (DDoS) attacks. Current detection techniques face challenges due to nonlinear thought, unusual system traffic, and the fluctuating data flow caused by human activities and device interactions. Identifying the baseline for 'normal' traffic and suspicious activities like DDoS attacks from encrypted data is also challenging due to the encrypted protective layer. This work introduces a concept called synoptic crow search with recurrent transformer network-based DDoS attack detection, which uses the synoptic weighted crow search algorithm to capture varying traffic patterns and prioritise critical information handling. An adaptive recurrent transformer neural network is introduced to effectively regulate DDoS attacks within encrypted data, counting the historical context of the data flow. The proposed model shows effective performance in terms of low false alarm rate, higher detection rate, and accuracy.




w

Identification of badminton players' swinging movements based on improved dense trajectory algorithm

Badminton, as a fast and highly technical sport, requires high accuracy in identifying athletes' swing movements. Accurately identifying different swing movements is of great significance for technical analysis, coach guidance, and game evaluation. To improve the recognition accuracy of badminton players' swing movements, this text is based on an improved dense trajectory algorithm to improve the accuracy of recognising badminton players' swing movements. The features are efficiently extracted and encoded. The results on the KTH, UCF Sports, and Hollywood2 datasets demonstrated that the improved algorithm achieved recognition accuracy of 94.2%, 88.2%, and 58.3%, respectively. Compared to traditional methods, the innovation of research lies in optimised feature extraction methods, efficient algorithm design, and accurate action recognition. These results provide new ideas for the research and application of badminton swing motion recognition.




w

Why provenance of SPARQL 1.1 queries

In this paper, we study and provide algorithms for source-provenance of answers to extended SPARQL queries. Extended SPARQL queries are an extension of SPARQL 1.1 queries which support not only a single dataset but multiple datasets, each in a particular context. For example, normal subqueries, aggregate subqueries, (NOT) EXISTS filter subqueries may (optionally) have their own dataset. Additionally, GRAPH patterns can query multiple RDF graphs from the local FROM NAMED dataset and not just one. For monotonic queries, the source why provenance sets that we derive for an answer mapping are each the minimal set of sources appearing in the query that if we consider as they are while the rest of the sources are considered empty, we derive the same answer mapping. We show that this property does not hold for non-monotonic queries. Among others, knowing source why provenance is of critical importance for judging confidence on the answer, allow information quality assessment, accountability, as well as understanding the temporal and spatial status of information.




w

International Journal of Web Engineering and Technology




w

Exploring the impact of monetary policy on sustainable development with mediation of e-banking services and moderation of financial risk awareness

Monetary policy is essential for sustainable growth where effective monetary policies can improve investment, employment, and consumption by fostering a balanced and resilient economy. However, sustainable development is vital for harmonising economic growth, social equity, and environmental preservation. A number of factors have been discussed in the literature that impact sustainable development. However, this study explicitly tries to investigate the nexus among the monetary policy (MP) toward sustainable development (SD) with the mediation of e-banking services (e-BS) and moderation of financial risk management (FRM) from China drawing on stakeholder theory. It discovered a significant connection between monetary policy and sustainable development along with sub-dimensions of SD. Likewise, this study confirmed a positive mediating influence of e-BS between monetary policy and sustainable development. Finally, the study additionally ensured a positive moderation of financial risk between monetary policy and sustainable development, respectively. These outcomes bestow several interesting insights into monetary policy, e-banking services, financial risk management, and sustainable development.




w

Crowdfunding on Patreon by YouTube sailing channels

This study is unique in how it looks at how crowdfunding on the recurring pledge platform Patreon is associated with the frequency of video creation. It analyses factors that make video creators on YouTube more likely to crowdfund on Patreon. It finds channels that upload more frequently, younger channels, channels with more subscribers and views per video, and channels that shared their Facebook pages were more likely to crowdfund on that platform.




w

Finding a balance between business and ethics: an empirical study of ERP-based DSS attributes

Numerous scandals due to unethical decisions occur despite the growing use of decision support systems (DSS). Several scholars recommend incorporating ethical attributes along with business requirements in DSS design. However, little guidance exists to indicate which ethical attributes to include and the importance ethical attributes should be given in comparison to business requirements. This study addresses this deficiency by identifying ethical requirements to integrate in DSS design drawn from the business ethics literature. This study conducted a large-scale empirical survey with information technology decision-makers to examine the relative importance of DSS fit with ethical and business requirements as well as the appropriate balance of those requirements on perceived DSS performance. The results show that decision makers perceive better DSS performance when the ethical and business requirements align with its organisation's beliefs than from ethical or business requirements alone.




w

Effective inventory management among Malaysian SMEs in the manufacturing sector towards organisational performance

In several manufacturing firms, inventory constitutes most of the current assets, and this underscores the importance of inventory management as a fundamental issue for the majority of the firms irrespective of their sizes. Therefore, the purpose of this research is to assess the factors that influence the effectiveness of inventory management of Malaysian SMEs in the manufacturing sector. The study employs PLS-SEM technique to test the hypotheses. The main findings show that documentation and records, inventory control system and qualified personnel have positive effects on effective inventory management of Malaysian SMEs in the manufacturing sector. The study also reveals that effective inventory management has a mediating effect on the relationship between documentation and records, inventory control system, qualified personnel and organisational performance. Therefore, the study recommends that Malaysian SMEs in the manufacturing sector should improve their approaches to embracing effective inventory management practices in order to enhance organisational performance.




w

Investigation of user perception of software features for software architecture recovery in object-oriented software

A well-documented architecture can greatly improve comprehension and maintainability. However, shorter release cycles and quick delivery patterns results in negligence of architecture. In such situations, the architecture can be recovered from its current implementation based on considering dependency relations. In literature, structural and semantic dependencies are commonly used software features, and directory information along with co-change/change history information are among rarely utilised software features. But, they are found to help improve architecture recovery. Therefore, we consider investigating various features that may further improve the accuracy of existing architecture recovery techniques and evaluate their feasibility by considering them in different pairs. We compared five state-of-the-art methods under different feature subsets. We identified that two of them commonly outperform others but surprisingly with low accuracy in some evaluations. Further, we propose a new subset of features that reflects more accurate user perceptions and hence, results in improving the accuracy of architecture recovery techniques.




w

Entrepreneurship vs. mentorship: an analysis of leadership modes on sustainable development with moderation of innovation management

This study explores the connection between mentorship and sustainable development (SD) within three major perspectives of sustainable development, such as social, environmental, and economic perspectives from China. Second, the study revealed the relationship between entrepreneurship and SD. Third, a moderation influence of innovation management (IM) was observed among the proposed nexuses of mentorship, entrepreneurship, and SD. To this end, a total of 535 questionnaires were eventually utilised with the support of SmartPLS and the structure equation modelling (SEM) approach. A positive connection was confirmed between mentorship and SD. The outcome uncovered a positive correlation between entrepreneurship and SD. In addition, a moderation of IM was found between mentorship, entrepreneurship, and SD. The study enlists several interesting lines about mentorship, entrepreneurship, and IM that might help to improve SD in terms of social, environmental, and economic perspectives. Besides, the study provides various implications for management and states the weaknesses along with the future directions for worldly researchers.




w

Psychological intervention of college students with unsupervised learning neural networks

To better explore the application of unsupervised learning neural networks in psychological interventions for college students, this study investigates the relationships among latent psychological variables from the perspective of neural networks. Firstly, college students' psychological crisis and intervention systems are analysed, identifying several shortcomings in traditional psychological interventions, such as a lack of knowledge dissemination and imperfect management systems. Secondly, employing the Human-Computer Interaction (HCI) approach, a structural equation model is constructed for unsupervised learning neural networks. Finally, this study further confirms the effectiveness of unsupervised learning neural networks in psychological interventions for college students. The results indicate that in psychological intervention for college students. Additionally, the weightings of the indicators at the criterion level are calculated to be 0.35, 0.27, 0.19, 0.11 and 0.1. Based on the results of HCI, an emergency response system for college students' psychological crises is established, and several intervention measures are proposed.




w

Intelligent traffic congestion discrimination method based on wireless sensor network front-end data acquisition

Conventional intelligent traffic congestion discrimination methods mainly use GPS terminals to collect traffic congestion data, which is vulnerable to the influence of vehicle time distribution, resulting in poor final discrimination effect. Necessary to design a new intelligent traffic congestion discrimination method based on wireless sensor network front-end data collection. That is to use the front-end data acquisition technology of wireless sensor network to generate a front-end data acquisition platform to obtain intelligent traffic congestion data, and then design an intelligent traffic congestion discrimination algorithm based on traffic congestion rules so as to achieve intelligent traffic congestion discrimination. The experimental results show that the intelligent traffic congestion discrimination method designed based on the front-end data collection of wireless sensor network has good discrimination effect, the obtained discrimination data is more accurate, effective and has certain application value, which has made certain contributions to reducing the frequency of urban traffic accidents.




w

Advancing mobile open learning through DigiBot technology: a case study of using WhatsApp as a scalable learning tool

This article presents a case study that outlines the potential of DigiBot technology, an interactive automated response program, in mobile open learning (MOL) for business subjects. The study, which draws on a project implemented in Sub-Saharan Africa, demonstrates the applications of DigiBots delivered via WhatsApp to over 650,000 learners. Employing a mixed-methods approach, the article reports on live event tracking, qualitative observations from facilitators and learning technologists, and a learner survey (<i>N</i> = 304,000). The research offers practical recommendations and proposes a model for scalable DigiBot learning. Findings reveal that in this case, DigiBot MOL had the potential to effectively address two key obstacles in open learning: accessibility and scalability. Leveraging mobile platforms such as WhatsApp mitigates accessibility restrictions, particularly in resource-constrained contexts, while tailored micro-learning enhances scalability.




w

Case study: when a bright idea creates a business dilemma

Bright Lights has a history of success, but is at a pivotal point, facing the pains of strategic change. One salesperson has found a way to maintain sales and increase profit margin, but it requires operating between the lines of ethical boundaries. Ethics provides a choice between right and right as opposed to moral temptation of right and wrong (Kidder, 1996). As the case unfolds, Jim receives a mandate of which customers he can call on, reducing sales, profit margin, and customer satisfaction. A top performer, Jim finds a solution within company policy and the law, but although not hidden, is not entirely transparent. This creates two ethical decisions: 1) Should he be reprimanded or praised? 2) Should the company update policies to ban his actions, or promote his actions among other salespeople? This case clearly strikes the dilemma found in navigating the boundaries of a questionable business strategy.




w

COVID-19 disruptions driving sustainable tourism: a case of the Hawaiian tourism industry

This study inquires about the COVID-19-generated momentum and how it resulted in transformative opportunities for the hard-hit tourism industry in Hawai'i. It also investigates the type of sustainability-based management strategies that were favoured by actors from the industry to help navigate uncertain times and capture transformative opportunities. Findings indicate that actors from the tourism industry in Hawai'i perceived the COVID-19 pandemic as a huliau, or a point of transformation, to reflect and re-evaluate the tourism industry's responsibility and shift toward a recovery focused on sustainability. This research confirms that the pandemic-driven momentum accelerated opportunities for changing and transforming traditional business models and indicators of progress within the tourism industry in Hawai'i. Further research may explore additional Pacific Island countries to gain a deeper understanding of the problem within the region's context.




w

Integrating MOOC online and offline English teaching resources based on convolutional neural network

In order to shorten the integration and sharing time of English teaching resources, a MOOC English online and offline mixed teaching resource integration model based on convolutional neural networks is proposed. The intelligent integration model of MOOC English online and offline hybrid teaching resources based on convolutional neural network is constructed. The intelligent integration unit of teaching resources uses the Arduino device recognition program based on convolutional neural network to complete the classification of hybrid teaching resources. Based on the classification results, an English online and offline mixed teaching resource library for Arduino device MOOC is constructed, to achieve intelligent integration of teaching resources. The experimental results show that when the regularisation coefficient is 0.00002, the convolutional neural network model has the best training effect and the fastest convergence speed. And the resource integration time of the method in this article should not exceed 2 s at most.




w

Constitutional and international legal framework for the protection of genetic resources and associated traditional knowledge: a South African perspective

The value and utility of traditional knowledge in conserving and commercialising genetic resources are increasingly becoming apparent due to advances in biotechnology and bioprospecting. However, the absence of an international legally binding instrument within the WIPO system means that traditional knowledge associated with genetic resources is not sufficiently protected like other forms of intellectual property. This means that indigenous peoples and local communities (IPLCs) do not benefit from the commercial exploitation of these resources. The efficacy of domestic tools to protect traditional knowledge and in balancing the rights of IPLCs and intellectual property rights (IPRs) is still debated. This paper employs a doctrinal research methodology based on desktop research of international and regional law instruments and the Constitution of the Republic of South Africa, 1996, to determine the basis for balancing the protection of genetic resources and associated traditional knowledge with competing interests of IPLCs and IPRs in South Africa.




w

Multiplication complexity in education activities with fair use principle of copyright in Indonesia

Copying and duplicating papers for educational purposes is a violation form of copyright in Indonesia. The principle of fair use in education is a form of structured violation. Copying and duplicating the papers of the authors for educational purposes has provided commercial (business) benefits for libraries and universities. The research method is conducted using the observation method in libraries and universities that duplicate papers. The method also uses the normative juridical method that connects duplication of the papers in libraries and universities with the fair use principle. The results explain the authors' loss from copying and duplicating of papers in libraries and universities. Therefore, copying and duplicating the papers can only be done by implementing the responsibility system. Copying and duplicating the papers of the authors' in libraries and universities can be allowed if they fulfil the elements of copyright protection in the new concept.




w

A risk identification method for abnormal accounting data based on weighted random forest

In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good.




w

Risk assessment method of power grid construction project investment based on grey relational analysis

In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency.




w

A data mining method based on label mapping for long-term and short-term browsing behaviour of network users

In order to improve the speedup and recognition accuracy of the recognition process, this paper designs a data mining method based on label mapping for long-term and short-term browsing behaviour of network users. First, after removing the noise information in the behaviour sequence, calculate the similarity of behaviour characteristics. Then, multi-source behaviour data is mapped to the same dimension, and a behaviour label mapping layer and a behaviour data mining layer are established. Finally, the similarity of the tag matrix is calculated based on the similarity calculation results, and the mining results are output using SVM binary classification process. Experimental results show that the acceleration ratio of this method exceeds 0.9; area under curve receiver operating characteristic curve (AUC-ROC) value increases rapidly in a short time, and the maximum value can reach 0.95, indicating that the mining precision of this method is high.




w

An evaluation of customer trust in e-commerce market based on entropy weight analytic hierarchy process

In order to solve the problems of large generalisation error, low recall rate and low retrieval accuracy of customer evaluation information in traditional trust evaluation methods, an evaluation method of customer trust in e-commerce market based on entropy weight analytic hierarchy process was designed. Firstly, build an evaluation index system of customer trust in e-commerce market. Secondly, the customer trust matrix is established, and the index weight is calculated by using the analytic hierarchy process and entropy weight method. Finally, five-scale Likert method is used to analyse the indicator factors and establish a comment set, and the trust evaluation value is obtained by combining the indicator membership. The experiment shows that the maximum generalisation error of this method is only 0.029, the recall rate is 97.5%, and the retrieval accuracy of customer evaluation information is closer to 1.




w

General Data Protection Regulation: new ethical and constitutional aspects, along with new challenges to information law

The EU 'General Data Protection Regulation' (GDPR) marked the most important step towards reforming data privacy regulation in recent years, as it has brought about significant changes in data process in various sectors, ranging from healthcare to banking and beyond. Various concerns have been raised, and as a consequence of these, certain parts of the text of the GDPR itself have already started to become questionable due to rapid technological progress, including, for example, the use of information technology, automatisation processes and advanced algorithms in individual decision-making activities. The road to GDPR compliance by all European Union members may prove to be a long one and it is clear that only time will tell how GDPR matters will evolve and unfold. In this paper, we aim to offer a review of the practical, ethical and constitutional aspects of the new regulation and examine all the controversies that the new technology has given rise to in the course of the regulation's application.




w

Can artificial intelligence replace whistle-blowers in the business sector?

The major technological developments have changed the traditional way of doing business. These developments have facilitated whistle-blowing. Access to data is easier and faster and communicating with the public can be done in seconds. Another development is the artificial intelligence (AI) which enters the business workplace in different forms challenging the traditional working relations. The combination of these concepts gives the idea of artificial whistle-blowing or robot whistle-blowing. The concept is that a machine should conceive and report relevant wrongdoing avoiding the traditional model of whistle-blowing where the employee is the person who should report. This concept, yet unexplored, presents interesting positive and negative aspects. The purpose of this contribution is to present the idea of artificial whistle-blowing and its advantages and disadvantages for the business sector. As a conclusion, this paper suggests that the concept of artificial whistle-blowing needs still to be researched and an optimal solution, for the time being, is to permit artificial whistle-blowing as a helping tool for the employees to detect wrongdoings but report them themselves.




w

Auditing the Performing Rights Society - investigating a new European Union Collective Management Organization member audit method

The European Union Rights Management Directive 2014/26/EU, provides regulatory oversight of European Union (EU) Collective Management Organizations (CMOs). However, the Directive has no provision indicating how members of EU CMOs may conduct non-financial audits of their CMO income and reporting. This paper addresses the problem of a lack of an audit method through a case study of the five writer members of the music group Duran Duran, who have been members of the UK's CMO for performing rights - the Performing Rights Society (PRS) for over 35 years. The paper argues a new audit CMO member method that can address the lacunae regarding the absence of CMO member right to audit a CMO and an applicable CMO audit method.




w

National ICT policy challenges for developing countries: a grounded theory informed literature review

This paper presents a review of the literature on the challenges of national information and communication technology (ICT) policies in the context of African countries. National ICT policies have been aligned with socio-development agendas of African countries. However, the policies have not delivered the expected outcomes due to many challenges. Studies have been conducted in isolation to highlight the challenges in the policy process. The study used grounded theory informed literature review to holistically analyse the problems in the context of African countries. The results were categorised in the typology of the policy process to understand the challenges from a broad perspective. The problems were categorised into agenda setting, policy formulation, legal frameworks, implementation and evaluation. In addition, there were constraints related to policy monitoring in the policy phases and imbalance of power among the policy stakeholders. The review suggests areas of further research.




w

International Journal of Technology Policy and Law




w

Transformative advances in volatility prediction: unveiling an innovative model selection method using exponentially weighted information criteria

Using information criteria is a common method for making a decision about which model to use for forecasting. There are many different methods for evaluating forecasting models, such as MAE, RMSE, MAPE, and Theil-U, among others. After the creation of AIC, AICc, HQ, BIC, and BICc, the two criteria that have become the most popular and commonly utilised are Bayesian IC and Akaike's IC. In this investigation, we are innovative in our use of exponential weighting to get the log-likelihood of the information criteria for model selection, which means that we propose assigning greater weight to more recent data in order to reflect their increased precision. All research data is from the major stock markets' daily observations, which include the USA (GSPC, DJI), Europe (FTSE 100, AEX, and FCHI), and Asia (Nikkei).




w

Stock market response to mergers and acquisitions: comparison between China and India

This research delves into the wealth effect of shareholders from bidding firms created by mergers and acquisitions (M&A) in China and India, two of the world's most populous nations. The study reveals that on average, M&A deals create wealth for shareholders of the acquiring firms, as determined by abnormal percentage returns in a five-day event window. Regarding the further classification of acquiring firms based on industry, the abnormal percentage returns vary in different sectors in both countries. In China, shareholders benefit in seven out of ten industries, while in India, they gain in five out of nine industries. Moreover, the stock markets' responses vary depending on the type of M&A in each country. Cross-industry M&A deals in China generate higher gains for shareholders than within-industry deals, whereas, in India, within-industry M&A deals generate higher gains.




w

FISHNet: encouraging data sharing and reuse in the freshwater science community

This paper describes the FISHNet project, which developed a repository environment for the curation and sharing of data relating to freshwater science, a discipline whose research community is distributed thinly across a variety of institutions, and usually works in relative isolation as individual researchers or within small groups. As in other “small sciences”, these datasets tend to be small and “hand-crafted”, created to address particular research questions rather than with a view to reuse, so they are rarely curated effectively, and the potential for sharing and reusing them is limited. The paper addresses a variety of issues and concerns raised by freshwater researchers as regards data sharing, describes our approach to developing a repository environment that addresses these concerns, and identifies the potential impact within the research community of the system.




w

Beyond The Low Hanging Fruit: Data Services and Archiving at the University of New Mexico

Open data is becoming increasingly important in research. While individual researchers are slowlybecoming aware of the value, funding agencies are taking the lead by requiring data be made available, and also by requiring data management plans to ensure the data is available in a useable form. Some journals also require that data be made available. However, in most cases, “available upon request” is considered sufficient. We describe a number of historical examples of data use and discovery, then describe two current test cases at the University of New Mexico. The lessons learned suggest that an instituional data services program needs to not only facilitate fulfilling the mandates of granting agencies but to realize the true value of open data. Librarians and institutional archives should actively collaborate with their researchers. We should also work to find ways to make open data enhance a researchers career. In the long run, better quality data and metadata will result if researchers are engaged and willing participants in the dissemination of their data.




w

Chempound - a Web 2.0-inspired repository for physical science data

Chempound is a new generation repository architecture based on RDF, semantic dictionaries and linked data. It has been developed to hold any type of chemical object expressible in CML and is exemplified by crystallographic experiments and computational chemistry calculations. In both examples, the repository can hold >50k entries which can be searched by SPARQL endpoints and pre-indexing of key fields. The Chempound architecture is general and adaptable to other fields of data-rich science.




w

Document Viewers for Non-Born-Digital Files in DSpace

As more institutions continue to work with large and diverse type of content for their digital repositories, there is an inherent need to evaluate, prototype, and implement user-friendly websites -regardless of the digital files' size, format, location or the content management system in use. This article aims to provide an overview of the need and current development of Document Viewers for digitized objects in DSpace repositories -includign a local viewer developed for an newspaper collection and four other viewers currently implemented in DSpace repositories. According to the DSpace Registry, 22% of institutions are currently storing "Images" in their repositories and 21% are using DSpace for non-traditional IR content such as: Image Repository, Subject Repository, Museum Cultural, or Learning Resources. The combination of current technologies such as Djatoka Image Server, IIPImage Server, DjVu Libre, and the Internet Archive BookReader, as well as the growing number of digital repositories hosting digitized content, suggests that the DSpace community will probably benefit with an "out-of-the-box" Document Viewer, especially one for large, high-resolution, and multi-page objects.




w

DAR: A Modern Institutional Repository with a Scalability Twist

The Digital Assets Repository (DAR) is an Institutional Repository developed at the Bibliotheca Alexandrina to manage the full lifecycle of a digital asset: its creation and ingestion, its metadata management, storage and archival in addition to the necessary mechanisms for publishing and dissemination. DAR was designed with a focus on integrating DAR with different sources of digital objects and metadata in addition to integration with applications built on top of the repository. As a modern repository, the system architecture demonstrates a modular design relying on components that are best of the breed, a flexible content model for digital objects based on current standards and heavily relying on RDF triples to define relations. In this paper we will demonstrate the building blocks of DAR as an example of a modern repository, discussing how the system addresses the challenges that face an institution in consolidating its assets and a focus on solving scalability issues.




w

Mobile wallet payments - a systematic literature review with bibliometric and network visualisation analysis over two decades

The study aims to review the literature on mobile wallet payment and align research trends using a systematic literature review with bibliometric and network visualisation analysis over two decades. It uses bibliometric analysis of the literature research retrieved from the Web of Science database. The study period was from 2001 to 2021, with 1,134 research papers. It also provides the indicators like citation trends, cited reference patterns, authorship patterns, subject areas published on the mobile wallet, top contributing authors, and highly cited research articles using the database. Furthermore, network visualisation analysis, like the co-occurrence of author keywords and keywords plus terms, has also been examined using VOSviewer software. The bibliometric analysis shows that the Republic of China dominates mobile wallet payment, and India is a significant contributor. Furthermore, the constructions of the network map using a co-citation analysis and bibliographic coupling shows an interesting pattern of mobile wallet payment.




w

Cognitive biases in decision making during the pandemic: insights and viewpoint from people's behaviour

In this article, we have attempted to study the ways in which the COVID-19 pandemic has gradually increased and impacted the world. The authors integrate the knowledge from cognitive psychology literature to illustrate how the limitations of the human mind might have a critical role in the decisions taken during the COVID-19 pandemic. The authors show the correlation between different biases in various contexts involved in the COVID-19 pandemic and highlight the ways in which we can nudge ourselves and various stakeholders involved in the decision-making process. This study uses a typology of biases to examine how different patterns of biases affect the decision-making behaviour of people during the pandemic. The presented model investigates the potential interrelations among environmental transformations, cognitive biases, and strategic decisions. By referring to cognitive biases, our model also helps to understand why the same performance improvement practices might incite different opinions among decision-makers.




w

International Journal of Enterprise Network Management




w

Unveiling learner experience in MOOC reviews

The surge of learner enrolment in massive open online courses (MOOCs) has led to a wealth of learner-generated data, such as online course reviews that document learner experience. To unveil learner experience with MOOCs, this research uses machine learning methods to extract prominent topics from MOOC reviews and assess the sentiments expressed by learners within them. Furthermore, this research investigates the cooccurrence of the topics using association rule mining. The findings reveal six central topics discussed in MOOC reviews, such as "instructor", "design", "material", "assignment", "platform", and "experience". Notably, most learners express positive sentiments in their reviews. The sentiment indicated in reviews of skill-seeking MOOCs is higher than that in reviews of knowledge-seeking MOOCs. Furthermore, the association rule mining identifies four meaningful association rules. The findings offer valuable insights for MOOC instructors to enhance course design and for platform operators to ensure the long-term viability and success of MOOC platforms.




w

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




w

The role of shopping apps and their impact on the online purchasing behaviour patterns of working women in Bangalore

The study aims to analyse the impact of shopping applications on the shopping behaviour of the working women community in Bangalore, a city known as the IT hub. The research uses a quantitative analysis with SPSS version 23 software and a structured questionnaire survey technique to gather data from the working women community. The study uses descriptive statistics, ANOVA, regression, and Pearson correlation analysis to evaluate the perception of working women regarding the significance of online shopping applications. The results show that digital shopping applications are more prevalent among the working women community in Bangalore. The study also evaluates the socio-economic and psychological factors that influence their purchasing behaviour. The findings suggest that online marketers should enhance their strategies to improve their business on digital platforms. The research provides valuable insights into the shopping habits of the working women community in Bangalore.