- Technology Adoption and User Behaviour
- Mobile Learning in Education
- Online and Blended Learning
- Digital Platforms and Economics
- Digital Marketing and Social Media
- Advanced Malware Detection Techniques
- Experimental Learning in Engineering
- Network Security and Intrusion Detection
- Innovative Teaching and Learning Methods
- ICT Impact and Policies
- Information Systems Education and Curriculum Development
- IoT and Edge/Fog Computing
- Open Education and E-Learning
- Knowledge Management and Sharing
- Sharing Economy and Platforms
- Cloud Data Security Solutions
- E-Learning and Knowledge Management
- Service and Product Innovation
- ICT in Developing Communities
- Customer Service Quality and Loyalty
- Digital and Cyber Forensics
- Software Engineering Techniques and Practices
- Education and Technology Integration
- Context-Aware Activity Recognition Systems
- Wireless Communication Networks Research
Auckland University of Technology
2014-2025
University of Auckland
2020
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the efficacy of data protection mechanisms in this environment. The framework developed study (CCAID: computing, attack, intrusion detection) aims to improve performance detection systems (IDS) operating CC environments. It deploys a proposed new hybrid ensemble feature selection (FS) method. includes FS algorithms three different types (filter, wrapper, embedded algorithms). selected features used train...
Mobile cloud computing (MCC) is a technological paradigm for providing services to mobile device (MD) users. A compromised MD may cause harm both its user and other MCC customers. This study explores the use of machine learning (ML) models stochastic methods protection Android MDs connected cloud. To test validity feasibility proposed methods, adopted proof-of-concept approach developed prototype system named MINDPRESS. The static component MINDPRES assesses risk apps installed on MD. It...
Learning computer programming is a demanding cognitive task that requires number of competencies. Students with limited problem-solving skills or prior knowledge find it challenging to understand the abstract concepts involved. While much research has investigated how load affects learning, few studies have in memory associated tasks using electroencephalograms. This uses EEG data, modelled NeuCube spiking neural network architecture, analyse efficiency two groups students, and without...
Transfer of learning (TL) is the process applying knowledge and skills learned in one context to a new different context. Efficient use memory essential achieving successful TL good outcomes. This study uses cognitive computing approach identify explore brain activity patterns related efficiency programming language. The hypothesizes that prior reduces load, leading improved efficiency. Spatiotemporal data (STBD) were collected from sample participants (n=26) using an electroencephalogram...
The predominant mode of electronic learning today is 'online' (web-based). This type relies on student access to personal computers – both and off campus. Mobile technologies offer other educational alternatives. article defines mobile (mLearning) as a new paradigm flexible describes scenarios for blended learning, which integrates the online environments. A research model study mLearning adoption proposed, hypotheses are derived that allow from pedagogical business perspective can be...
In this paper, we introduce the concept of researchpractice gap as it is perceived in field software requirements engineering.An analysis has shown that two key causes for research-practice are lack effective communication and relatively light coverage engineering material University programmes.We discuss design delivery a Masters course Software Requirements Engineering (SRE) designed to overcome some issues have caused gap.By encouraging students share their experiences peer learning...
Quick Response (QR) codes are two dimensional (matrix) that have been developed in ways allow companies and individuals to sell or market their products, skills, events quickly easily.The code can be used represent data such as a web address map location scanned by mobile device smart phone.Tracking inventories marketers were some of the first uses users QR because ease deployment low development cost.The use has also grown amongst individual who want transfer information sending an...
Mobile applications (apps) for self-management of diseases such as diabetes and general well-being, including keeping track food, diet, exercise, are widely available. However, consumers face a flood new mobile apps in the app stores have no guidance from clinicians about choosing appropriate app. As much would like to support patient-centered approach promote health wellness apps, they may be unable provide advice due lack comprehensive reliable reviews. This research reviewed selection...
This qualitative study aimed to identify the motivating factors and challenges related adoption of mobile payment (mPayment) by small business retailers. Data collected from semi-structured personal interviews with a group participants were analyzed applying content analysis approach. The findings indicate that retailer demand for mPayment was motivated mainly perceived customer expectations convenient (faster) way pay using ubiquitous technology, as well efficiency leading revenue increase....
This paper describes the design and development of a mobile serious game discusses outcomes prototype evaluation. The augments physical location to represent virtual company. Players take role business consultants hired by this company help it address its problems 'interview' employees, obtaining information artifacts, players must infer behind symptoms is facing, offer change recommendations, utilizing higher level thinking skills. game-like activities issues common simulations leveraging...
Mobile devices (MD) are used by mobile cloud computing (MCC) customers users because of their 11 portability and robust connectivity the ability to house operate third-party applications 12 (apps). However, apps installed on a MD may pose data security risks owner 13 other MCC users, especially when requested permissions include access sensitive (e.g., 14 user’s location contacts). Calculating risk score an app or quantifying its potential 15 harmfulness based user input gathered...
There is a need for educators of information technology professionals to monitor the demands market and adjust their programmes curriculum accordingly. A number universities colleges have sought opportunities extend incorporate fast developing area security. The School Computing Information Sciences at Auckland University Technology offers two in - an undergraduate postgraduate one. security assurance concepts are integrated with learning objectives individual courses. This paper provides...
This paper describes the results of a research study conducted in conjunction with an experiment using short text messaging service (SMS) scenario for test revision. The learning environment was developed specific class context and supported by commercial mobile data service. aimed to identify factors students perceived as drivers mLearning inhibitors success scenario, investigate implementation requirements framework evaluating outcomes. An activity theory (AT) represent dynamic...