The purpose of this study is to investigate the factors underlying the adoption, completion and continuance of massive open online courses (MOOCs), using technology-user-environment (TUE) framework, ...MOOCs features and MOOCs qualities. The proposed model was empirically tested using longitudinal research design. The primary data was gathered at three time points through a survey of 197 students at an Indian university. Stepwise regression analysis was used to test the hypothesised relationships in the proposed model. The results demonstrate that technological characteristics, user characteristics and MOOCs features influence the students' decisions in all the stages of MOOCs acceptance including initial adoption, completion and continuance. Environmental factors determine the students' initial intentions to adopt MOOCs, whereas MOOCs qualities predict their intentions to complete and continue the usage of MOOCs in future. Moreover, the intention to adopt MOOCs significantly predicts the intention to complete MOOCs which in turn significantly determines the intention to continue using MOOCs. These findings will be helpful for MOOCs providers and other stakeholders. The MOOCs providers can focus on the technological characteristics, user characteristics and MOOCs features as they carry a sustained influence on the students' intentions to adopt, complete as well as continue using MOOCs.
The Human Science Division of the Railway Technical Research Institute in Japan, has been conducting research on prevention of human error and safety management as well as measures against transport ...disruptions and to improve user environments in order to ensure better railway safety, convenience and comfort. This paper outlines recent outcomes from representative research on prevention of human error accidents and improvement of user environments.
In this paper we introduce a recent and evolved two-factor authentication (2FA) access govern system specially designed for webbased cloud computing services. Our innovative system encompasses an ...attribute-based access govern mechanism that combines a user’s secret key with a lightweight safety device. Our system significantly improves security, particularly in scenarios where multiple users share a single computer for web-based cloud services, as access is contingent on the presence of both components. In addition, the attribute-based govern mechanism enables the cloud server to enforce access constraints based on users with identical attributes, while maintaining the highest extent of user confidentiality protection. The server’s verification procedure focuses exclusively on verifying that users meet the necessitated criteria, without accessing their exact identities. To further confirm the practicability and usefulness of our 2FA system, we conduct an in-depth simulation as a portion of our study.
New models and methods have been designed to predict the influence of the user's environment and activity information to the driving style in standard automotive environments. For these purposes, an ...experiment was conducted providing two types of analysis: (i) the evaluation of a self-assessment of the driving style; (ii) the prediction of aggressive driving style based on drivers' activity and environment parameters. Sixty seven h of driving data from 10 drivers were collected for analysis in this study. The new parameters used in the experiment are the car door opening and closing manner, which were applied to improve the prediction accuracy. An Android application called
was developed to collect low-level smartphone data about the users' activity. The driving style was predicted from the user's environment and activity data collected before driving. The prediction was tested against the actual driving style, calculated from objective driving data. The prediction has shown encouraging results, with precision values ranging from 0.727 up to 0.909 for aggressive driving recognition rate. The obtained results lend support to the hypothesis that user's environment and activity data could be used for the prediction of the aggressive driving style in advance, before the driving starts.
This article reports on a study of an online system for supporting professional learning within higher education. The system was developed through an iterative user-centred design process to ensure ...that it supported the needs of academics. Results indicated there were a number of practice-related factors that emerged from within the user's environment that triggered micro challenges at the user level and macro challenges at the organisational level. The article offers two considerations for capturing practice-related barriers in complex environments. These considerations are: engaging a multidisciplinary team and designing online tools to be flexible to respond to complex environmental factors.
PurposeThe purpose of this study is to investigate the factors underlying the adoption of massive open online courses (MOOCs), using technology-user-environment (TUE) framework and self-determination ...theory (SDT) as the theoretical frameworks.Design/methodology/approachThe primary data were collected from the field surveys conducted in the universities and academic institutions located in National Capital Region of Delhi, India, using convenience sampling technique. Structural equation modelling was used to test the hypothesized relationships in the proposed model.FindingsThe findings indicate that the learners’ intention to adopt MOOCs is significantly influenced by intrinsic motivation, social recognition, perceived value and perceived usefulness. On the other hand, the personal readiness, self-regulation of learners and peer influence are not found to have any significant impact on MOOCs adoption intention.Practical implicationsThe findings of the study will be helpful for MOOCs providers and other stakeholders. The MOOCs providers should emphasize on providing courses from renowned universities in cutting-edge areas which are self-paced and cost-effective. The academic institutions should provide credit benefits to the students in lieu of completing courses through MOOCs. Likewise, employers should also recognize the certificates awarded by MOOCs and give due credit to the learners who complete such certifications.Originality/valueThe study has contributed to the existing literature on MOOCs adoption by combining constructs from TUE and SDT. To the best of the author’s knowledge, this has been a first attempt to combine these two frameworks to study the learners’ adoption behaviour for MOOCs in Indian context. The integration of these two frameworks provides a more comprehensive model of factors with increased explanatory ability (72.6 per cent) to describe the adoption intention of MOOCs.
Wireless networks connect various devices through radio waves in which the network connection may have different structures. Moreover, the network structure is determined based on the placement areas ...of the network elements, which can be affected by the building and their locations. However, the numerical characteristic which describe the features of the real environment and allow them to be related to the properties of the model are still a challenge that has not been well addressed. To this end, in this paper, we analyze the modeling problems related to the structure of user placement in the access network. Our proposed solution is based on a description of the user environment structure in which cities in the form of buildings and constructions are considered as a typical environment. We propose a new model for addressing the wireless network structure in an efficient manner in which the features of the environment are considered, which are numerically expressed in the form of the Hurst parameter or fractal dimension. In addition, the fractal dimension, geometric fractals, and the characteristics of the user’s distribution territory and urban development are efficiently utilized. Then, we analyze the influence of the fractal properties of the environment on the structure of promising communication networks; in particular, on the structure of the Internet of Things network. Finally, simulation results proved that the proposed model is considered as a beneficial solution for modeling mobile communication and wireless access networks, including fifth-generation networks.
This paper deals with the RESIMA architecture developed to assist people with sensory disability in indoor environments, with particular regard to the visually impaired. With respect to solutions ...presented in the state-of-the-art, RESIMA is a smart multisensor assistive system which, exploiting a high resolution monitoring of the user position in the spatial-temporal domain as well as a deep inertial monitoring of the user status, assures a reliable and continuous form of assistance. The system is based on a wireless sensor network and smart paradigms, which extract relevant information from data collected through the multisensor architecture to manage interactions between the user and the environment itself. This paper mainly focuses on the multisensor system architecture and smart paradigms for the user localization and the user-environment interaction (UEI). Real experiments, performed by good health users, demonstrate an accuracy of the positioning system of about 3.9 cm and a suitable rate of success probability associated to the UEI functionality embedded in the RESIMA architecture.
With rapid development and massive deployment of handheld mobile devices, people in modern societies heavily enjoy and depend on the convenience and efficiency of instant information access and data ...processing through wireless Internet connection capability of their own mobile devices. In consequence, how to securely communicate with remote servers and access inquired data through insecure wireless channel, and to keep low energy consumption on handheld mobile devices, while performing these security computing operations, has become a major challenge for designers of secure authentication protocol. This study proposes a provably secure and efficient ID-based authentication protocol using bilinear pairings for mobile user environment. Formal security analyses show the proposed protocol is secure against well-known attacks under random oracle model. Comparisons on performance efficiency and security among existing pairings based protocols and ours are conducted to evaluate our protocol. The results indicate that our protocol has the less computation cost at the mobile user side and supports more security properties in comparison with others.