6 research outputs found

    Moderating effects of cross-cultural dimensions on the relationship between persuasive smartphone application's design and acceptance-loyalty

    Get PDF
    Applying persuasive system design to different cultures has been a focus of many researchers as the global medium of communication has been centered within Smartphone via applications (apps). This is due to the vast proliferation of the Smartphone and the personal attachment of users to this device in various cultures. This led designers to search for ultimate ways to target users in specific regions of the world. The basic purpose of this study was to determine the relevance of cross-cultural factors to persuasive technologies, and the acceptance and loyalty of Smartphone apps. This was achieved by examining the moderating effects of Hofstede’s six cross-cultural dimensions on the relationship between Oinas-Kukkonen and Harjumaa’s Persuasive System Design (PSD), and acceptance and loyalty. By evaluating elements of persuasive systems design and cross-cultural dimensions, from user’s perspective, against a globally popular application like WhatsApp, an instrument was devised to investigate the cross-cultural adoption and continued use of Smartphone apps. Using this instrument, surveys were conducted for this research study to identify the influencing factors that have motivated the users from Malaysia, Netherlands, Germany, and the Kingdom of Saudi Arabia to adopt and continue using this application on a daily basis. These surveys, which included responses from 488 participants, further investigated if there is one cross-cultural dimension that has more moderating effects per country. The findings indicate an agreement among WhatsApp users from all four countries about their reasons for adopting and using this app, namely: social influence (93.7 percent), reliability (83.4 percent), dialog-support via feedback (76.4 percent), ease of use (90.5 percent) and small cost (87.7 percent). The results put new perspective that the gap among cultures is narrowing. Persuasive design strategies are particularly relevant to cultures across the globe. This study can aid the research community in investing efforts into enhancing the persuasive design framework for Smartphone apps

    Cultural factors affecting persuasive design of smartphone applications to maintain customer loyalty

    Get PDF
    Smartphone usage exhibits an asymptotic growth worldwide along with the increasing popularity of various smartphone applications. Against this backdrop, this research analyzes the effect of persuasive design on customer loyalty by perusing behavioral patterns of smartphone application users. Specifically, this study investigates the influence of cross-cultural dimensions towards users’ acceptance and loyalty by integration of persuasive technologies. Past studies reveal that cultural backgrounds affect adoption to computer applications as well as continued use of the applications. A matrix combining persuasive designs with cross-cultural influences is applied pragmatically to a widely used application across all ages and both genders. Economic statuses and educational backgrounds are discounted. This research intends to map the smartphone applications design with persuasive design principles

    Machine and deep learning techniques for detecting internet protocol version six attacks: a review

    Get PDF
    The rapid development of information and communication technologies has increased the demand for internet-facing devices that require publicly accessible internet protocol (IP) addresses, resulting in the depletion of internet protocol version 4 (IPv4) address space. As a result, internet protocol version 6 (IPv6) was designed to address this issue. However, IPv6 is still not widely used because of security concerns. An intrusion detection system (IDS) is one example of a security mechanism used to secure networks. Lately, the use of machine learning (ML) or deep learning (DL) detection models in IDSs is gaining popularity due to their ability to detect threats on IPv6 networks accurately. However, there is an apparent lack of studies that review ML and DL in IDS. Even the existing reviews of ML and DL fail to compare those techniques. Thus, this paper comprehensively elucidates ML and DL techniques and IPv6-based distributed denial of service (DDoS) attacks. Additionally, this paper includes a qualitative comparison with other related works. Moreover, this work also thoroughly reviews the existing ML and DL-based IDSs for detecting IPv6 and IPv4 attacks. Lastly, researchers could use this review as a guide in the future to improve their work on DL and ML-based IDS

    WhatsApp! Does Culture Matter to Persuasive System Design and Brand Loyalty?

    No full text
    The traditional paradigm prioritizes local culture in application design; however, popular applications with persuasive systems design (PSD) like WhatsApp appeal to a global audience beyond local cultural attributes. The purpose of this study is to test the moderating role of Hofstede’s cultural dimensions on PSD and the relationship to loyalty in the context of WhatsApp. By employing an online survey, data were collected from the Netherlands, Germany, KSA, and Malaysia (N = 488). Using regression moderation analyses, the hypotheses were tested. Findings suggest that only two cultural dimensions, namely power distance and individualism, have a moderating role: power distance in Germany, and individualism in both KSA and Malaysia. This implies that managers must consider the possible influence of some cultural dimensions on loyalty. The study contributes to the literature by focusing on smartphone apps in countries with varying cross-cultural dimensions scores and utilizing the user’s perspective instead of the designer’s perspective

    A Comparative Investigation of Automatic Speech Recognition Platforms for Aphasia Assessment Batteries

    No full text
    The rehabilitation of aphasics is fundamentally based on the assessment of speech impairment. Developing methods for assessing speech impairment automatically is important due to the growing number of stroke cases each year. Traditionally, aphasia is assessed manually using one of the well-known assessment batteries, such as the Western Aphasia Battery (WAB), the Chinese Rehabilitation Research Center Aphasia Examination (CRRCAE), and the Boston Diagnostic Aphasia Examination (BDAE). In aphasia testing, a speech-language pathologist (SLP) administers multiple subtests to assess people with aphasia (PWA). The traditional assessment is a resource-intensive process that requires the presence of an SLP. Thus, automating the assessment of aphasia is essential. This paper evaluated and compared custom machine learning (ML) speech recognition algorithms against off-the-shelf platforms using healthy and aphasic speech datasets on the naming and repetition subtests of the aphasia battery. Convolutional neural networks (CNN) and linear discriminant analysis (LDA) are the customized ML algorithms, while Microsoft Azure and Google speech recognition are off-the-shelf platforms. The results of this study demonstrated that CNN-based speech recognition algorithms outperform LDA and off-the-shelf platforms. The ResNet-50 architecture of CNN yielded an accuracy of 99.64 ± 0.26% on the healthy dataset. Even though Microsoft Azure was not trained on the same healthy dataset, it still generated comparable results to the LDA and superior results to Google’s speech recognition platform

    Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks

    No full text
    Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DDoS) attacks. Therefore, this paper proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing an ensemble feature selection technique that utilizes chi-square and information gain ratio methods to select significant features for attack detection with high accuracy. In addition, a long short-term memory (LSTM) is employed to train the detection model on the selected features. The proposed approach was evaluated using a synthetic dataset for false-positive rate (FPR), detection accuracy, F-measure, recall, and precision, achieving 0.55%, 98.41%, 98.39%, 97.3%, and 99.4%, respectively. Additionally, the results reveal that the proposed approach outperforms the existing approaches
    corecore