11 research outputs found

    A conceptual framework for measuring acceptance of contactless payment methods

    Get PDF
    Information Technology has been effective in every filed around the world, and ICT acceptance in any filed has produced new developments which has significantly contributed in that particular context. Driven by this impulse the Higher Education Institutes (HEI) around the world are incorporating ICT approaches and using the most recent advances to give world class education to inhabitants. In such manner Ministry of Education (MOE) Kuwait has propelled numerous plans and put some considerable measures in the execution of innovation in HEIs. HEI for the most part comprises of Universities. While there is no comprehensive study conducted in measuring the success and obstacles in the State of Kuwait, therefore, this paper focuses to measure and identify the success factors in acceptance of HEIs in the State of Kuwait. In the interim keeping in mind the end goal to evaluate the adoption and use of ICT by studnets and academicians in their day by day work, the UTAUT will be used as baseline theory to measure the ICT acceptance by students and academicians. This investigation likewise intents to discover the variables and issues keeping in mind the end goal to make a model for better usage of ICT by the HEIs. The effect of this investigation will be on HEI(s) to enhance the policy of learning methods through successful use of ICT and enhance the ability of students and academicians to be more viable and qy=quality-situated people

    The effect of web-based social networking on consultancy

    Get PDF
    Social networking has become a fact that we cannot live without even if we try. It has become a day to day activity or even yet a chore. Where we share our life experiences. We have all become its slave! Social networks bring many benefits to the user and the world at large. These advantages from an expert perspective includes sharing of information, collaboration, promote products and services, building a group community, donations etc. This paper provides a review of the Effect of Web-based Social Networking on Consultancy

    Factors affecting secure software development practices among developers- an investigation

    Get PDF
    An evidently dominate problem in the software development domain is that software security is not consistently addressed from the initial phase of software development which escalates security concerns, results in insecure software development. Several secure software development methodologies were introduced in literature and recommended to the industry but they are usually ignored by the developers and software practitioners. In this research paper, an extensive literature review is performed to find out factors influencing implementations of secure software development practices in industry. Secondly, based on Unified Theory of Acceptance and Use of Technology model 2 (UTAUT2) this study proposes a model to investigate the factors influencing adoption of secure software development practices among software developers

    A review on optimization of vehicle frontal crashworthiness for passenger safety

    Get PDF
    In engineering and technology safety of human life has always been a top priority. With the increasing usage of vehicles in everyday life, probability of deaths and injuries has also increased. This paper provides a critical review on the optimization of vehicle frontal crashworthiness studied by researchers using various methods. They investigated the effects of crash at a defined speed using the method of FRB and ODB impact. It further discusses other methods that can be used to save passengersโ€™ life. Also, the designing and manufacturing limitations faced by engineers in actual development processes. Finally, it is concluded that improved structure design and material composition can significantly increase the overall crashworthiness of the vehicle

    Web 2.0-based collaborative learning framework promoting lifelong learning: developing sustainability competencies

    Get PDF
    This paper aims to present a Web 2.0-based collaborative Learning framework based on the social constructivist theory promoting life-long learning. The Web 2.0 provides conditions of collaborative learning, multiple modes and methods of learning and multiple perspec-tive to achieve learning goals. This practical framework under the guidelines of design science research methodology allows learners to actively engage in the learning process, construct own knowledge and use to solve real-world problems collaboratively. Experts reviewed and confirmed the validity of the framework. Three successive iterations, working with 42 students in formal learning and Facebook members in informal learning were conducted to demonstrate and validate how learners started developing critical thinking, self-regulation and use of knowledge. The framework contributes to the practice of lifelong learning with emphasis on developing sustaina-bility competencies that enable learners to gain more skills in applying different problem-solving frameworks to complex daily life prob-lems

    Beyond traditional audits: the implications of information technology on auditing

    Get PDF
    This paper examines the manner in which audits would be conducted in the future and how technology has transformed and impacted the business processes of public, private sector entities and various organisations and the guidelines which need to be followed to ensure compliance with applicable laws and regulations. The tranperancy of financial statements is of paramount interest to shareholders and other significant stakeholders. This necessities that the financial statements are audited to acquire a certain level of confidence over the integrity of numbers and the validity of business rationale which thereby arises a need for auditor to be well equipped with all the tools and system essentials in carrying out an effective and efficient audit. Information Technology can act as an impediment or stimulant towards the achievement of the above discussed objective. Various organizations use automation tools and ERP applications which have become a vital cog in their internel control environment. Understanding by auditor of these automated controls is necessary to ensure that the they are well equipped with the requisite skills and have knowledge of all technological tweaks that would be required in the audit process of a complex structured entity. The primary function which can be performed by generalized audit software include customizing data in numrous ways to serve the distinct purpose. The audit teams obtain insights into latest developments and plan their procedures accordingly keeping in view the applicable professional standards

    Information technology (IT) based intervention among individuals with ASD (autism spectrum disorder): A review

    Get PDF
    The aim of this article is to provide systematic analysis of studies using ICT (information and Communication Technology) tools as intervention. These tools are categorized into two categories: (a) assessment tools and (b) Intervention tools. This review gives a brief description about the technological features and the functionality related to it. The intervention tools assist in enhancing cognitive and social abilities of the individual with ASD. Here we try to identify the latest advancement by reviewing these related articles and recommend future direction of extended research work

    A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases

    No full text
    Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry

    A conceptual framework for determining acceptance of Internet of Things (IoT) in higher education institutions of Pakistan

    No full text
    The IoT is the latest innovation and increasingly growing area to be implemented in all areas of life especially in higher education. This has created new excitement and challenges for academicians, this study will focus on IoT adoption and acceptance in higher educational institutes of Pakistan. The way IoT in learning environments supports educators can influence how we collaborate, communicate and operate. In this research, we focus on two aspects to investigate here. Firstly, how students are taught and; secondly, how educational institutes can bring in IoT to improve learning. This study explores the important aspect which influence the IoT acceptance and usage in an academic setting with in higher education institutes of Pakistan. Current study lays foundation for a comprehensive framework using trusted models of technology and scoial psychology like Unified Theory of Acceptance and Use of Technology 2 (UTAUT2). This research proposes the network analysis approach to observe the users' behaviors towards different IoT applications usage in higher education. The considerations of key deliverable that have significant effect on the acceptance of IoT in higher education institutions of Pakistan and the in-depth analysis showed that few applications are being used heavily compared to all other applications.This study provides basis for developing countries to increase wider acceptance and use of IoT technologies in higher education to provide benefits for both students' and faculty members

    Acceptance of IoT learning among university students at Pakistan

    No full text
    The Internet of Things abbreviated as an IoT is considered the most recent innovative and fastest-developing field that is to be applied in all aspects of life, in particular higher education. It has sparked interest as well as challenges among academics; the current research will concentrate on acceptance and adoption of IoT in the higher educational institutions of Pakistan. IoT supports educators in environment of learning and can have an impact on how we interact, connect, and work. In this study, we will look at two different aspects. The first one is how to teach students, and secondly how IoT can be used in educational institutions to enhance learning. This study looks at the factors that affect acceptance of IoT and use in an academic setting in Pakistan's higher education institutions. The current research establishes foundation for a comprehensive framework based on trusted technology and social psychology models, such as the Use of Technology 2 and Unified Theory of Acceptance (UTAUT2). The method proposed in this study is network analysis method to observe users' actions in relation to several IoT applications in higher education. An in-depth analysis and consideration of key deliverables which have a major impact on the Internet of Things (IoT) adoption in Pakistani educational institutions of higher level, revealed that only a few applications are heavily used in comparison to all other applications. This research lays the groundwork for developed countries to grow adoption and IoT technologies use in higher education, which will support both students and faculty
    corecore