20 research outputs found

    Predicting Studentsā€™ Continuance Intention Related to the Use of Collaborative Web 2.0 Applications

    Get PDF
    One of the main prerequisites for the implementation of collaborative Web 2.0 applications in higher education is their acceptance by students. With the objective to identify the predictors of studentsā€™ satisfaction and their intentions related to further use of collaborative Web 2.0 applications, a two-part research was conducted. After completing the collaborative educational activities by means of Google Docs, students were asked to fill out a post-use questionnaire. The aim of this paper is to examine the psychometric characteristics of the research framework which reflects the interplay among relevant aspects of Technology Acceptance Model (TAM) and Expectation-Confirmation Theory (ECT). Empirical findings and practical implications are presented and discussed

    Factors and Predictors of Online Security and Privacy Behavior

    Get PDF
    Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills) that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 ā€“ conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 ā€“engagement in risky and careless online activities with lack of concern for personal online privacy; F3 ā€“ disbelief that privacy violations and security threats represent possible problems; F4 ā€“ lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1) and data loss on the home computer (C2) on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors

    1957-2007: 50 Years of Higher Order Programming Languages

    Get PDF
    Fifty years ago one of the greatest breakthroughs in computer programming and in the history of computers happened ā€“ the appearance of FORTRAN, the first higher-order programming language. From that time until now hundreds of programming languages were invented, different programming paradigms were defined, all with the main goal to make computer programming easier and closer to as many people as possible. Many battles were fought among scientists as well as among developers around concepts of programming, programming languages and paradigms. It can be said that programming paradigms and programming languages were very often a trigger for many changes and improvements in computer science as well as in computer industry. Definitely, computer programming is one of the cornerstones of computer science. Today there are many tools that give a help in the process of programming, but there is still a programming tasks that can be solved only manually. Therefore, programming is still one of the most creative parts of interaction with computers. Programmers should chose programming language in accordance to task they have to solve, but very often, they chose it in accordance to their personal preferences, their beliefs and many other subjective reasons. Nevertheless, the market of programming languages can be merciless to languages as history was merciless to some people, even whole nations. Programming languages and developers get born, live and die leaving more or less tracks and successors, and not always the best survives. The history of programming languages is closely connected to the history of computers and computer science itself. Every single thing from one of them has its reflexions onto the other. This paper gives a short overview of last fifty years of computer programming and computer programming languages, but also gives many ideas that influenced other aspects of computer science. Particularly, programming paradigms are described, their intentions and goals, as well as the most of the significant languages of all paradigms

    Importance of the Future Entrepreneurs\u27 Computer Literacy Development for the Implementation of Cloud Services as a Foundation of Improved Competitiveness in the Labor Market

    Get PDF
    Primjena cloud usluga u poslovanju može se promatrati kao inovacija koja prolazi kroz određene faze prihvaćanja i koriÅ”tenja kod korisnika u njihovom poslovnom okruženju. Rezultati ranijih istraživanja pokazali su da je jedan od najvažnijih činitelja, koji predstavlja barijeru u koriÅ”tenju cloud tehnologije u poslovanju, upravo nedovoljno poznavanje iste. U ovom radu posebno se razmatra važnost razvoja informatičke pismenosti studenata ā€“ budućih poduzetnika za primjenu SaaS usluge u poslovanju. Svrha ovog rada je trostruka: (a) ukazati na prednost koriÅ”tenja SaaS usluge u poslovanju poduzeća na jednom primjeru dobre prakse, (b) ilustrirati primjer početka razvoja informatičke pismenosti za primjenu SaaS usluge kod studenata ā€“ budućih poduzetnika VeleučiliÅ”ta u Rijeci i (c) prezentacijom rezultata provedene ankete ukazati na potrebu za boljim razvojem informatičke pismenosti studenata tijekom srednjoÅ”kolskog obrazovanja. Rezultati ovoga rada mogu pomoći svima koji su uključeni u edukaciju i razvoj kompetencija poduzetnika kako bi poboljÅ”ali njihovu konkurentnost na tržiÅ”tu rada.The application of cloud services in business can be seen as an innovation that goes through certain levels of acceptance and implementation by users in their business environment. The results of earlier studies have shown that one of the most important factors, which is the obstacle to using cloud technology in business, is an insufficient knowledge of the cloud service. This paper deals with the importance of the development of future entrepreneurs\u27 computer literacy as a prerequisite for the application of SaaS services in business. The objective of this paper is threefold: (a) to demonstrate the advantage of using the SaaS services on an example of good business practices, (b) to illustrate how computer literacy of students, future entrepreneurs, is developed at the Polytechnic of Rijeka, thus facilitating the application of SaaS services in practice, and (c) drawing on the results of counducted studies to emphasize the need for better development of students\u27 computer literacy during high school education. The reported results can help everyone involved in educating entrepreneurs and developing their competencies to improve their competitiveness in the labor market

    MOBILNI LOKACIJSKI SERVIS ZA POZICIONIRANJE I PREZENTIRANJE OBJEKATA KULTURNE BAÅ TINE I WEB 2.0 TEHNOLOGIJE

    Get PDF
    The development of mobile technologies over the last few years has enabled their usage in all the domains of everyday life. One of the components that is becoming a common part of advanced mobile devices (e.g. mobile phones and personal digital assistance devices) is the GPS transceiver, the most common usage of which is determining the geographical location and helping navigating a certain area. In this paper we present the concept of a system for locating and presenting information about objects belonging to cultural heritage relying on mobile technologies and GPS. This kind of system can be used for educational purposes, promotion and enrichment of cultural heritage and the local community\u27s tourist offer. Unlike other similar systems, this mobile location service has characteristics of Web 2.0 technologies usage in all its user-interaction components.Razvoj mobilnih tehnologija u posljednjih nekoliko godina omogućio je njihovu uporabu u svim područjima svakodnevnoga života. Jedna od komponenti koje sve viÅ”e postaju sastavni dio naprednijih mobilnih uređaja (npr. mobilnih telefona i osobnih digitalnih pomoćnika) jest GPS prijemnik, a njegova je najčeŔća uporaba u uređajima za određivanje geografske lokacije i pomoć u navigaciji određenim područjem. U ovom radu predstavili smo koncept sustava za lociranje i prezentiranje informacija o objektima koji pripadaju kulturnoj baÅ”tini, a oslanja se na mobilne tehnologije i GPS. Takvi se sustavi mogu koristiti za potrebe obrazovanja, promocije kulturne baÅ”tine i obogaćivanje turističke usluge lokalne zajednice. Za razliku od drugih sličnih sustava, ovaj mobilni lokacijski servis ima karakteristiku koriÅ”tenja Web 2.0 tehnologija u svim komponentama koje su u interakciji s korisnikom, Å”to je njegova velika prednost

    Java Applications Development Based on Component and Metacomponent Approach

    Get PDF
    Component based modeling offers new and improved approach to design, construction, implementation and evolution of software applications development. This kind of software applications development is usually represented by appropriate component model/diagram. UML, for example, offers component diagram for representation of this kind of model. On the other hand, metacomponents usage offers some new features which hardly could be achieved by using generic components. Firstly, implementation of program properties which are dispersed on different classes and other program units, i.e. aspects, is offered. This implies using automated process of assembling components and their interconnection for building applications, according to appropriate model offered in this paper, which also offers generic components usage. Benefits of this hybrid process are higher flexibility achieved by automated connection process, optimization through selective features inclusion and easier application maintenance and development. In this paper we offer an approach of application development based on hybrid component/metacomponent model. The component model is given by UML diagrams, while the metacomponent model is given by generator scripting model. We explain that hybrid approach on an example of Java Web application development

    Factors and Predictors of Online Security and Privacy Behavior

    Get PDF
    Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills) that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 ā€“ conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 ā€“engagement in risky and careless online activities with lack of concern for personal online privacy; F3 ā€“ disbelief that privacy violations and security threats represent possible problems; F4 ā€“ lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1) and data loss on the home computer (C2) on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors

    Dynamic Frames Based Generation of 3D Scenes and Applications

    Get PDF
    Modern graphic/programming tools like Unity enables the possibility of creating 3D scenes as well as making 3D scene based program applications, including full physical model, motion, sounds, lightning effects etc. This paper deals with the usage of dynamic frames based generator in the automatic generation of 3D scene and related source code. The suggested model enables the possibility to specify features of the 3D scene in a form of textual specification, as well as exporting such features from a 3D tool. This approach enables higher level of code generation flexibility and the reusability of the main code and scene artifacts in a form of textual templates. An example of the generated application is presented and discussed

    Introductory programming: a systematic literature review

    Get PDF
    As computing becomes a mainstream discipline embedded in the school curriculum and acts as an enabler for an increasing range of academic disciplines in higher education, the literature on introductory programming is growing. Although there have been several reviews that focus on specific aspects of introductory programming, there has been no broad overview of the literature exploring recent trends across the breadth of introductory programming. This paper is the report of an ITiCSE working group that conducted a systematic review in order to gain an overview of the introductory programming literature. Partitioning the literature into papers addressing the student, teaching, the curriculum, and assessment, we explore trends, highlight advances in knowledge over the past 15 years, and indicate possible directions for future research

    Evaluating the Quality of Social Web Applications Using the LSP Method

    No full text
    Quality is an essential determinant of the success of every type of software and social Web applications are not an exception. It is therefore of great importance that the examination of the degree to which social Web applications meet predefined requirements related to particular facets of quality is performed effectively and frequently. With an objective to facilitate evaluation procedure and enable comparison of social Web applications at all levels of the quality model, we initiated a research into development of a methodology that will aggregate quality requirements into a single score. The work presented in this paper draws on the employment of the logic scoring of preference (LSP) method and outlines only some parts of the aforementioned methodology. After identifying quality attributes that constitute the requirement tree, elementary criteria for both objective and subjective performance variables were introduced. As a follow up, field experts were included in the study in order to determine weights of performance variables within particular performance subsystem. Finally, the appropriate logic aggregation operators were selected based on the relevance of performance variable
    corecore