175 research outputs found

    Connecting resources in online learning environments

    Get PDF
    This article highlights considerations for connecting resources in Online Learning Environments (OLEs). Extensive human, information, learning, and technical resources are needed to produce and manage comprehensive OLEs. The requirements and considerations for each of these resources are unique, but they should be viewed mainly as interrelated and connected to each other. Basic considerations for resources-based OLEs are discussed in this article, however future research is needed to explore the complexity of these resources and how they can be optimized for the effective delivery and management of online learning environments

    The Embodiment of Discovery: An Adapted Framework for Qualitative Analysis of Lived Experiences

    Get PDF
    We reflect on our process of working with an adapted framework as an effective strategy for analyzing and interpreting the results of our qualitative study on the lived experiences of insulin pump trainers. Interpretative Phenomenological Analysis (IPA) was applied as the overarching research methodology and was encapsulated into a framework adapted from Bonello and Meehan (2019) and from Chong (2019). We describe this framework as the “embodiment of discovery” to posit the researcher’s tangible experience of discovering the meaning of data that also brought transparency to the researcher’s process for data analysis and interpretation. We present challenges the doctoral student researcher experienced working with the framework through three phases and various steps performed during the analysis. We recommend the framework may assist novice researchers as a tool for wayfinding and scoping the structure of data analysis and interpretation. We conclude that novice researchers should not fear finding their “embodiment of discovery” in adapting creative or alternate methods for qualitative analysis

    A study on the success of group formation and cohesiveness in virtual teams using computer-mediated communications

    Get PDF
    While the Internet is a major business tool nowadays, individuals are still challenged to form team s and collaboration virtually. To evaluate the success of team formation in a virtual setting, this research study assessed the role of different computer – mediated communications (CMC) employed on the success of team formation measured by task performance (TP), team cohesiveness (TC), computer skills (CS) and social bond (SB), while assessing the differences on such relationships when controlled for gender, age, education level, academic major, as well as academic year. This research used analysis of variance (ANOVA) and analysis of covariance (ANCOVA) to address the hypotheses proposed. Using three teams and 140 participants, the results indicated that there is a significance difference in the role of CMC levels employed on the level of perception of CS in team formation. Also, there is a significance difference in the role of CMC levels employed on the levels of TP, when controlled for gender .In addition, there is a significance difference in the role of CMC levels employed (No - CMS/F2F,OLS,&OLS+SNS) on the levels of CS, when controlled for education, academic major and academic year. The results of this study contribute to the body of knowledge by helping organizations identify ways to support effective team formations

    Designing an online dissertation research community of practice

    Get PDF
    This design case describes phase one (pilot phase) of an intervention strategy aimed to support students in a limited–residency doctoral program. Specifically, this case documents the process and decisions that were made along the way to design an online research community of practice (CoP) for students who have completed coursework and are working on their dissertations in the field of instructional design and technology. The case includes the designers’ guiding framework, a detailed description of the case including the site, participant and platform selection, and the preliminary state of the design. To date, a design team is in place, a guiding framework for the design of the CoP is established, a needs analysis has been conducted, the participants have been identified, the CoP strategy has been defined, the site has launched, and students are just now beginning to become a part of this online community. It will take time to cultivate the community and determine whether the design is effective in achieving the community’s goals. Data collection and documentation of design decisions continue as the design and development of the online CoP emerges

    Usability Challenges with Insulin Pump Devices in Diabetes Care: What Trainers Observe with First-time Pump Users

    Get PDF
    Insulin pumps are designed for the self-management of diabetes mellitus in patients and are known for their complexity of use. Pump manufacturers engage trainers to help patients use the devices correctly to control the symptoms of their disease. Usability research related to insulin pumps and other infusion pumps has centered on the relationship between user interface design and the effectiveness of task completion by a single evaluator perspective, namely first-time users. From a different perspective, there is a lack of insight into the experiences of insulin pump trainers during learning sessions with first-time users. The focus of the study is to present the lived experiences and shared impressions of the insulin pump trainers. Their narratives will be used to conduct an interpretive examination of the phenomena uncovered and to provide the essence of their lived experiences

    Towards an Assessment of Pause Periods on User Habituation in Mitigation of Phishing Attacks

    Get PDF
    Social engineering is the technique in which the attacker sends messages to build a relationship with the victim and convinces the victim to take some actions that lead to significant damages and losses. Industry and law enforcement reports indicate that social engineering incidents costs organizations billions of dollars. Phishing is the most pervasive social engineering attack. While email filtering and warning messages have been implemented for over three decades, organizations are constantly falling for phishing attacks. Prior research indicated that attackers use phishing emails to create an urgency and fear response in their victims causing them to use quick heuristics, which leads to human errors. Humans use two types of decision-making processes: a heuristic decision, which is a quick, instinctual decision-making process known as ‘System One’, and a second, known as ‘System Two,’ that is a slow, logical process requiring attention. ‘System Two’ is often triggered by a pause in the decision-making process. Additionally, timers were found in other research fields (medicine, transportation, etc.) to affect users’ judgement and reduce human errors. Therefore, the main goal of this work-in-progress research study is to determine through experimental field study whether requiring email users to pause by displaying a phishing email warning with a timer, has any effect on users falling to simulated phishing attacks. This paper will outline the rationale and the process proposed for the validation of the field experiments with Subject Matter Experts (SMEs). Limitations of the proposed study and recommendation for further research are provided

    EXPERIMENTAL STUDY TO ASSESS THE IMPACT OF TIMERS ON USER SUSCEPTIBILITY TO PHISHING ATTACKS

    Get PDF
    Social engineering costs organizations billions of dollars. It exploits the weakest link of information systems security, the users. It is well-documented in literature that users continue to click on phishing emails costing them and their employers significant monetary resources and data loss. Training does not appear to mitigate the effects of phishing much; other solutions are warranted. Kahneman introduced the concepts of System-One and System-Two thinking. System-One is a quick, instinctual decision-making process, while System-Two is a process by which humans use a slow, logical, and is easily disrupted. The key aim of our experimental field study was to investigate if requiring the user to pause by presenting a countdown or count-up timer when a possible phishing email is opened will influence the user to enter System-Two thinking. In this study, we designed, developed, and empirically tested a Pause-and-Think (PAT) mobile app that presented a user with a warning dialog and a countdown or count-up timer. Our goal was to determine whether requiring users to wait with a colored warning and a timer has any effect on phishing attempts. The study was completed in three phases with 42 subject matter experts and 107 participants. The results indicated that a countdown timer set at 3-seconds accompanied by red warning text was most effective on the user’s ability to avoid clicking on a malicious link or attachment. Recommendations for future research include enhancements to the PAT mobile app and investigating what effect the time of day has on susceptibility to phishing

    Towards the Development and Assessment of a Method for Educating Users into Choosing Complex, Memorable Passphrases

    Get PDF
    The currently most used method for authentication is the password because it is simple to implement, and computer users are very familiarized with it. However, passwords are vulnerable to attacks that can be mitigated by increasing the complexity of the chosen password, particularly in terms of length. One possible approach to accomplish this is through the usage of passphrases, which can be easier to remember than a standard password, thus reducing the loss of work time and productivity related to forgotten passwords. To achieve the required balance between complexity and memorability, the concept of passphrase categories can be used, i.e. more sensitive accounts or services should have more complex passphrases, and vice versa. This work-in-progress study proposes to develop and assess a method for educating users into creating complex, yet easy to remember passphrases, according to the category of account or service they want to protect. The work-in-progress study will be developed in three phases, including validation of the method by a panel of subject matter experts, a pilot test, and a main data collection and analysis phase

    Remote Monitoring Technologies in Dementia Care: An Interpretative Phenomenological Analysis of Family Caregivers’ Experiences

    Get PDF
    The desire to maintain an independent lifestyle is one shared by an increasing number of older adults. Adult children, spouses, siblings, and other relatives, also known as family caregivers, play an integral role in helping their loved ones maintain independence. Remote monitoring technologies (RMTs) such as wearable sensors, mobile emergency devices, smartphone apps, and webcams can be used to monitor, sense, record, and communicate a person’s daily activities. However, understanding is limited of the family caregiver’s needs and perceptions of RMTs used in a home-based setting. The purpose was to explore how family caregivers perceive RMTs and their use for monitoring and supporting their care recipients who choose to live independently. We used a survey to capture some basic characteristics of family caregivers, what they know about RMTs, and to recruit interview participants. We conducted semi-structured interviews with four participants who shared the commonality of caring for a relative with dementia. We reported the survey data using descriptive statistics and we applied interpretative phenomenological analysis (IPA) to analyze and report results from the interviews. Four themes emerged including the unique relationships that exist in family care, the risk-benefit conundrum that accompanies benefits and tradeoffs of RMT use, human-technology interaction and usability, and the importance of creating tailored solutions to facilitate RMT adoption and use. Our findings provide insight into factors impacting adoption and use

    A Grounded Theory of Connectivity and Persistence in a Limited Residency Doctoral Program

    Get PDF
    Limited-residency and online doctoral programs have an attrition rate significantly higher than traditional programs. This grounded-theory study focused on issues pertaining to communication between students, their peers and faculty and how interpersonal communication may affect persistence. Data were collected from 17 students actively working on their dissertation in a limited-residency educational technology program. The resultant theory indicated that students felt communication between themselves and peers is possible but not common. Students also indicated that dissertation supervisors are readily accessible but longer than expected response times may contribute to a lack of student success. The results suggest the development and effective use of an online community of practice will support the communication needs of students and faculty
    corecore