11,664 research outputs found
A Privacy Calculus Perspective
Sandhu, R. K., Vasconcelos-Gomes, J., Thomas, M. A., & Oliveira, T. (2023). Unfolding the Popularity of Video Conferencing Apps: A Privacy Calculus Perspective. International Journal Of Information Management, 68(February), 1-17. [102569]. https://doi.org/10.1016/j.ijinfomgt.2022.102569. Funding: This work was supported by national funds through FCT (Fundação para a Ciência e a Tecnologia) under the project - UIDB/04152/2020 - Centro de Investigação em Gestão de Informação (MagIC).Videoconferencing (VC) applications (apps) have surged in popularity as an alternative to face-to-face communications especially during the COVID-19 pandemic. Although VC apps offer myriad benefits, it has caught much media attention owing to concerns of privacy infringements. This study examines the key determinants of working professional’s intentions to use VC apps in the backdrop of this conflicting duality. A conceptual research model is proposed that is based on theoretical foundations of privacy calculus and extended with conceptualizations of mobile users’ information privacy concerns (MUIPC), trust, technicality, ubiquity, as well as theoretical underpinnings of social presence theory. Structural equation modelling (SEM) is used to empirically test the model using data collected from 487 working professionals. For researchers, the study offers insights on the extent to which social richness and technological capabilities afforded by the virtual environment serve as predictors of the continuance intentions of using VC apps. Researchers may also find the model applicable to other studies of surveillance-based technologies. For practitioners, key recommendations pivotal to the design and development mobile video-conferencing apps are presented to ensure higher acceptance and continued usage of VC apps in professional settings.preprintauthorsversionepub_ahead_of_prin
Challenges in the Design and Implementation of IoT Testbeds in Smart-Cities : A Systematic Review
Advancements in wireless communication and the increased accessibility to low-cost sensing and data processing IoT technologies have increased the research and development of urban monitoring systems. Most smart city research projects rely on deploying proprietary IoT testbeds for indoor and outdoor data collection. Such testbeds typically rely on a three-tier architecture composed of the Endpoint, the Edge, and the Cloud. Managing the system's operation whilst considering the security and privacy challenges that emerge, such as data privacy controls, network security, and security updates on the devices, is challenging. This work presents a systematic study of the challenges of developing, deploying and managing urban monitoring testbeds, as experienced in a series of urban monitoring research projects, followed by an analysis of the relevant literature. By identifying the challenges in the various projects and organising them under the V-model development lifecycle levels, we provide a reference guide for future projects. Understanding the challenges early on will facilitate current and future smart-cities IoT research projects to reduce implementation time and deliver secure and resilient testbeds
Using Online Video Observations and Real Time, Peer Reflective Analysis of Culturally Responsive Teaching Pedagogy in a University Teacher Preparatory Program for Preservice Teachers
This research aimed to understand the impacts of using online video observations and real-time peer reflection to teach and address culturally responsive teaching in a Pacific Northwest university’s teacher preparatory program. Six active university students enrolled in a university’s new teacher preparatory program (i.e., preservice, new teacher candidates) actively participated in all areas of this study (i.e., nonrandom sampling) and provided both quantitative and qualitative data. Study participants completed self-evaluative pre- and post-surveys in a research group session. Surveys were built using the ready 4 rigor framework (Hammond & Jackson, 2015) and the four areas of culturally responsive teaching as a foundation for a psychometric response scale (i.e., Likert scale 1–5) and peer reflection prompts. In group settings, study participants watched videos of their peers and themselves engaging in classroom instruction. After video observations, they participated in real-time, peer reflective analysis of teaching performance. Using a quantitative and qualitative approach to analyze the pre- and post-survey responses and reflective discussions, data revealed participants gained a deeper understanding of their ability to deliver culturally responsive teaching pedagogy. Overall, these data points suggested a change in participant awareness of culturally responsive teaching performance levels before and after engaging in video observations and real-time, peer reflective analysis involving culturally responsive teaching pedagogy
Evaluation of the protective efficacy of Olyset®Plus ceiling net on reducing malaria prevalence in children in Lake Victoria Basin, Kenya: study protocol for a cluster-randomized controlled trial.
BACKGROUND: In the Lake Victoria Basin of western Kenya, malaria remains highly endemic despite high coverage of interventions such as insecticide-impregnated long-lasting insecticidal nets (LLIN). The malaria-protective effect of LLINs is hampered by insecticide resistance in Anopheles vectors and its repurposing by the community. Ceiling nets and LLIN with synergist piperonyl butoxide (PBO-LLIN) are novel tools that can overcome the problems of behavioral variation of net use and metabolic resistance to insecticide, respectively. The two have been shown to reduce malaria prevalence when used independently. Integration of these two tools (i.e., ceiling nets made with PBO-LLIN or Olyset®Plus ceiling nets) appears promising in further reducing the malaria burden. METHODS: A cluster-randomized controlled trial is designed to assess the effect of Olyset®Plus ceiling nets on reducing malaria prevalence in children on Mfangano Island in Homa Bay County, where malaria transmission is moderate. Olyset®Plus ceiling nets will be installed in 1315 residential structures. Malaria parasitological, entomological, and serological indicators will be measured for 12 months to compare the effectiveness of this new intervention against conventional LLIN in the control arm. DISCUSSION: Wider adoption of Olyset®Plus ceiling nets to complement existing interventions may benefit other malaria-endemic counties and be incorporated as part of Kenya's national malaria elimination strategy. TRIAL REGISTRATION: UMIN Clinical Trials Registry UMIN000045079. Registered on 4 August 2021
An Exploration of the Suitability of Pharmacy Education in Saudi Arabia to Prepare Graduates to Meet Healthcare Needs: a Mixed-Methods Study
The key role of pharmacists within the health system, particularly in optimising safe, responsible and effective use of medicines, underpins the demand for a highly skilled and competent workforce. Therefore, developing the capacity of pharmacists to attain and maintain essential competencies relevant to the population’s health needs is required to ensure a high standard of patient care, thereby helping to improve patient and population health. In Saudi Arabia, little evidence exists regarding the assessment of national educational programmes’ structure and outcomes. Moreover, no national competency framework exists for pharmacists in any sector or stage of practice. In the absence of such core quality elements to inform pharmacy education assessment and development, the extent to which pharmacy schools in Saudi Arabia prepare competent pharmacists to address societal needs from pharmacy services is unclear. Therefore, this study aimed to explore the extent to which pharmacy education can prepare competent pharmacists to address the healthcare needs for pharmacy practice in Saudi Arabia.
An exploratory sequential mixed methods research design was used to address the aim of this study in three phases: individual interviews and focus groups were employed with a purposively selected sample of pharmacy policy makers, pharmacists and the public to explore societal healthcare needs and the roles required of pharmacists to meet those needs; a national online survey of pharmacists and an online nominal group consensus method of pharmacy experts were used to identify competencies considered essential to develop a profession-wide national foundation level competency framework; and a case study in which curriculum mapping of two purposively selected Doctor of Pharmacy (PharmD) curricula was used to assess the extent to which the current pharmacy programme in Saudi Arabia meets the identified competencies of the developed national competency framework.
Based on qualitative and quantitative analyses of societal healthcare needs, pharmacists’ roles, core competencies and curricular contents within the local context of Saudi Arabia, findings showed that there is a mismatch between initial education and real practice needs and expectations. While the country’s current needs from pharmacists are to optimise health system capacity and increase access to primary care services and medicines expertise in community pharmacies, the study indicated local education is product-oriented with a focus of curricular content and experiential training opportunities in most schools on preparing future pharmacists for hospital pharmacy practice. The study also identified several gaps between current initial education programmes and the competencies required to practise the expected roles, suggesting that current initial education might not prepare the students sufficiently to provide the full range of quality pharmaceutical services as per the country’s pharmacy practice needs.
The study provided a new understanding of graduates’ readiness to practise as per the country’s pharmacy practice needs, the quality of educational programmes and pharmacists' professional development opportunities in Saudi Arabia. Findings maybe used to inform the development of competency-based education and maximise graduates’ capacity to deliver and develop pharmaceutical services effectively to best meet societal healthcare needs in Saudi Arabia
Reframing data ethics in research methods education: a pathway to critical data literacy
This paper presents an ethical framework designed to support the development of critical data literacy for research methods courses and data training programmes in higher education. The framework we present draws upon our reviews of literature, course syllabi and existing frameworks on data ethics. For this research we reviewed 250 research methods syllabi from across the disciplines, as well as 80 syllabi from data science programmes to understand how or if data ethics was taught. We also reviewed 12 data ethics frameworks drawn from different sectors. Finally, we reviewed an extensive and diverse body of literature about data practices, research ethics, data ethics and critical data literacy, in order to develop a transversal model that can be adopted across higher education. To promote and support ethical approaches to the collection and use of data, ethics training must go beyond securing informed consent to enable a critical understanding of the techno-centric environment and the intersecting hierarchies of power embedded in technology and data. By fostering ethics as a method, educators can enable research that protects vulnerable groups and empower communities
A Design Science Research Approach to Smart and Collaborative Urban Supply Networks
Urban supply networks are facing increasing demands and challenges and thus constitute a relevant field for research and practical development. Supply chain management holds enormous potential and relevance for society and everyday life as the flow of goods and information are important economic functions. Being a heterogeneous field, the literature base of supply chain management research is difficult to manage and navigate. Disruptive digital technologies and the implementation of cross-network information analysis and sharing drive the need for new organisational and technological approaches. Practical issues are manifold and include mega trends such as digital transformation, urbanisation, and environmental awareness.
A promising approach to solving these problems is the realisation of smart and collaborative supply networks. The growth of artificial intelligence applications in recent years has led to a wide range of applications in a variety of domains. However, the potential of artificial intelligence utilisation in supply chain management has not yet been fully exploited. Similarly, value creation increasingly takes place in networked value creation cycles that have become continuously more collaborative, complex, and dynamic as interactions in business processes involving information technologies have become more intense.
Following a design science research approach this cumulative thesis comprises the development and discussion of four artefacts for the analysis and advancement of smart and collaborative urban supply networks. This thesis aims to highlight the potential of artificial intelligence-based supply networks, to advance data-driven inter-organisational collaboration, and to improve last mile supply network sustainability. Based on thorough machine learning and systematic literature reviews, reference and system dynamics modelling, simulation, and qualitative empirical research, the artefacts provide a valuable contribution to research and practice
Countermeasures for the majority attack in blockchain distributed systems
La tecnologÃa Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus caracterÃsticas únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraÃdo o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnologÃa. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en IngenierÃa de Sistemas y Computació
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Globally, the external Internet is increasingly being connected to the
contemporary industrial control system. As a result, there is an immediate need
to protect the network from several threats. The key infrastructure of
industrial activity may be protected from harm by using an intrusion detection
system (IDS), a preventive measure mechanism, to recognize new kinds of
dangerous threats and hostile activities. The most recent artificial
intelligence (AI) techniques used to create IDS in many kinds of industrial
control networks are examined in this study, with a particular emphasis on
IDS-based deep transfer learning (DTL). This latter can be seen as a type of
information fusion that merge, and/or adapt knowledge from multiple domains to
enhance the performance of the target task, particularly when the labeled data
in the target domain is scarce. Publications issued after 2015 were taken into
account. These selected publications were divided into three categories:
DTL-only and IDS-only are involved in the introduction and background, and
DTL-based IDS papers are involved in the core papers of this review.
Researchers will be able to have a better grasp of the current state of DTL
approaches used in IDS in many different types of networks by reading this
review paper. Other useful information, such as the datasets used, the sort of
DTL employed, the pre-trained network, IDS techniques, the evaluation metrics
including accuracy/F-score and false alarm rate (FAR), and the improvement
gained, were also covered. The algorithms, and methods used in several studies,
or illustrate deeply and clearly the principle in any DTL-based IDS subcategory
are presented to the reader
- …