Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective
AbstractThe cybersecurity industry is facing two major challenges as cyber threats get more serious: a shortage of skilled workers to defend against these attacks and a noticeable underrepresentation of women in the field, underscoring the critical need ...
Highlights- Examined gender differences through SDT and SCT.
- Investigated the performance in five cybersecurity domains.
- Educational intervention boosts self-efficacy and motivation for both genders.
- Gender specific preferences were seen ...
- research-articleDecember 2023
The Application and User Acceptance of AIGC in Network Audiovisual Field: Based on the Perspective of Social Cognitive Theory
CSAE '23: Proceedings of the 7th International Conference on Computer Science and Application EngineeringArticle No.: 11, Pages 1–5https://doi.org/10.1145/3627915.3628020[Purpose/Significance] Chinese network audiovisual has become the largest Internet application in China, by combing the application and user acceptance of AIGC in the field of network audiovisual, this paper discusses the standardization, rationalization ...
- research-articleAugust 2023
Sideffect GamePlan: Development of an alcohol and other drug serious game for high school students using a systematic and iterative user-centred game development framework
- Joanna Nicholas,
- Brennen Mills,
- Sara Hansen,
- Stephen J. Bright,
- Joseph Scott,
- Imogen Ridout,
- Jess Watson,
- Heather Boyd,
- Luke Brook,
- Luke Hopper
AbstractSerious games have shown to be effective in improving motivation to learn, knowledge and retention, thus are being increasingly used for alcohol and other drug (AOD) education. This paper outlines the development of an online AOD ...
Graphical abstractDisplay Omitted
Highlights- A six-lesson alcohol and other drug education package for high school teachers to use in-class with Year 9 and 10 students.
- short-paperNovember 2022
Civil Servants on Open Data: Perceptions of Azorean civil servants before an imminent Open Government Data initiative
ICEGOV '22: Proceedings of the 15th International Conference on Theory and Practice of Electronic GovernancePages 591–593https://doi.org/10.1145/3560107.3560205Understanding stakeholder reactions to Open Government Data provides valuable insight to officials in charge of OGD strategies and tactics. This research investigates the attitudinal base-state of individual civil servants faced with an imminent OGD ...
- articleOctober 2021
Student ICT Use Motives: Scale Construction and Relationship With Student Alienation
International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), Volume 11, Issue 4Pages 34–53https://doi.org/10.4018/IJCBPL.288498Research on the second-level digital divide suggests that motivational factors are crucial for its comprehensive understanding. However, the literature survey indicates a lack of research on ICT usage motives and their relation with student ...
-
- research-articleMay 2021Honorable Mention
StoryMap: Using Social Modeling and Self-Modeling to Support Physical Activity Among Families of Low-SES Backgrounds
CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing SystemsArticle No.: 203, Pages 1–14https://doi.org/10.1145/3411764.3445087Physical activity (PA) is crucial for reducing the risk of obesity, an epidemic that disproportionately burdens families of low-socioeconomic status (SES). While fitness tracking tools can increase PA awareness, more work is needed to examine (1) how ...
- articleMarch 2021
Social Networking Services and Social Trust in Social Commerce: A PLS-SEM Approach
Journal of Global Information Management (JGIM), Volume 29, Issue 2Pages 23–44https://doi.org/10.4018/JGIM.2021030102This study researches the mediating consequence of social trust (identification-based trust and information-based trust) on the relationship between social networking services (SNS) use and social commerce intention. The study also explores whether ...
- research-articleMarch 2021
Planned Behavior and Social Cognitive Model on Auditor's Attitude in Adopting Information Technology
EBEE '20: Proceedings of the 2020 2nd International Conference on E-Business and E-commerce EngineeringPages 35–43https://doi.org/10.1145/3446922.3446929Auditing activity is a necessity for a business in the future. Auditing is an important activity because every business has the main goal which is to satisfy their stakeholder to keep developing. Moreover, in this Covid-19 period, Auditing becomes a ...
- research-articleJune 2020
Prospective Experiment for Reinforcement Learning on Demand Response in a Social Game Framework
- Lucas Spangher,
- Akash Gokul,
- Manan Khattar,
- Joseph Palakapilly,
- Akaash Tawade,
- Adam Bouyamourn,
- Alex Devonport,
- Costas Spanos
e-Energy '20: Proceedings of the Eleventh ACM International Conference on Future Energy SystemsPages 438–444https://doi.org/10.1145/3396851.3402365Improving demand response can help optimize renewable energy use and might be possible using current tools in machine learning. We propose an experiment to test the development of Reinforcement Learning (RL) agents to learn to vary a daily grid price ...
- articleJanuary 2015
Non-Cognitive Factor Relationships to Hybrid Doctoral Student Self-Efficacy
International Journal of Web-Based Learning and Teaching Technologies (IJWLTT-IGI), Volume 10, Issue 1Pages 1–13https://doi.org/10.4018/ijwltt.2015010101Statistical analysis of data gathered from 139 healthcare doctoral students revealed three key findings regarding non-cognitive factor relationships to hybrid doctoral student self-efficacy between online web-based and on-campus course components. First,...
- articleOctober 2014
Chinese Text Sentiment Analysis Utilizing Emotion Degree Lexicon and Fuzzy Semantic Model
International Journal of Software Science and Computational Intelligence (IJSSCI-IGI), Volume 6, Issue 4Pages 20–32https://doi.org/10.4018/IJSSCI.2014100102Text on the web has become a valuable source for mining and analyzing user opinions on any topic. Non-native English speakers heavily support the growing use of Network media especially in Chinese. Many sentiment analysis studies have shown that a ...
- articleJanuary 2014
The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use
Journal of Organizational and End User Computing (JOEUC-IGI), Volume 26, Issue 1Pages 1–26https://doi.org/10.4018/joeuc.2014010101Prior research has shown that proximal states are important mechanisms through which distal states relate to IT usage. In particular, the influence of distal traits tied to social activity has not been incorporated into the nomological network ...
- articleJanuary 2014
Exploring Self-Efficacy Beliefs as Entry Behaviors for Participation in an Online Peer Tutoring Learning Environment
International Journal of Strategic Information Technology and Applications (IJSITA-IGI), Volume 5, Issue 1Pages 54–82https://doi.org/10.4018/ijsita.2014010105Social cognitive theory is founded on the belief that learning is shared socially. Triadic reciprocal determinism explains the interrelationship and interaction between environmental cues, behavior, and biological determinants to shape and alter the ...
- articleJuly 2013
Exploring Behaviors and Perceptions Affecting the Adoption of Cloud Computing
International Journal of Innovation in the Digital Economy (IJIDE), Volume 4, Issue 3Pages 51–68https://doi.org/10.4018/jide.2013070104Cloud computing is a technological innovation that has been marketed to consumers as a revolution in the way people store and communicate data information. This paper extends previous research on technology adoption behavior of individuals by focusing ...
- articleNovember 2012
Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia
Computers in Human Behavior (COHB), Volume 28, Issue 6Pages 2366–2375https://doi.org/10.1016/j.chb.2012.07.008The research aims at gaining insights into information privacy concerns, its antecedents and privacy measure use in social networking sites. The Social Cognitive, Protection Motivation theories and gender factor were used as a basis to develop and ...
- articleJuly 2012
The Effects of Self-Regulated Learning Processes on E-Learning Outcomes in Organizational Settings
Journal of Management Information Systems (JMIS), Volume 29, Issue 1Pages 307–340https://doi.org/10.2753/MIS0742-1222290109This paper focuses on employees' e-learning processes during online job training. A new categorization of self-regulated learning strategies, that is, personal versus social learning strategies, is proposed, and measurement scales are developed. The new ...
- articleApril 2012
Cloud Computing Services: Theoretical Foundations of Ethical and Entrepreneurial Adoption Behaviour
International Journal of Cloud Applications and Computing (IJCAC-IGI), Volume 2, Issue 2Pages 48–58https://doi.org/10.4018/ijcac.2012040105Cloud computing is an emerging service technology that has ethical and entrepreneurial implications. Due to technological innovations increasing the attention placed on cloud computing services, more people are focusing on the security and privacy ...
- articleSeptember 2010
Review: Computer use by older adults: A multi-disciplinary review
Computers in Human Behavior (COHB), Volume 26, Issue 5Pages 870–882https://doi.org/10.1016/j.chb.2010.03.029As the populations of most of the world's developed nations experience an increase in average age, a similar trend is being observed in the population of computer and Internet users. In many cases, older adults are the fastest growing computer and ...
- articleApril 2010
Users' Perceptions of Wireless Networks Usage
International Journal of Interdisciplinary Telecommunications and Networking (IJITN-IGI), Volume 2, Issue 2Pages 67–78https://doi.org/10.4018/jitn.2010040105Wireless networks provide the most convenient way to access the Internet. This paper determines how the preliminary and advanced knowledge of wireless networks affect users' perception and usage. Based on their knowledge, users develop certain emotional ...
- articleAugust 2009
A social status perspective of network utility over electronic channels in academic communities
International Journal of Information Management: The Journal for Information Professionals (IJIM), Volume 29, Issue 4Pages 262–271https://doi.org/10.1016/j.ijinfomgt.2009.03.011Early research on the social implications of e-mail has promoted the role of electronic communication channels in fostering social equality and reducing gaps between the social classes. Follow-up studies, however, suggest that people continue to rely on ...