- Technology Adoption and User Behaviour
- Online and Blended Learning
- Spreadsheets and End-User Computing
- Privacy, Security, and Data Protection
- Information Systems Education and Curriculum Development
- Open Source Software Innovations
- Innovative Teaching and Learning Methods
- Knowledge Management and Sharing
- Teaching and Learning Programming
- Online Learning and Analytics
- Digital Marketing and Social Media
- Information and Cyber Security
- Educational Games and Gamification
- Innovations in Educational Methods
- Evaluation of Teaching Practices
- Experimental Learning in Engineering
- Impact of Technology on Adolescents
- Higher Education Learning Practices
- Big Data and Business Intelligence
- Software Engineering Techniques and Practices
- Visual and Cognitive Learning Processes
- Open Education and E-Learning
- Higher Education and Employability
- Emotion and Mood Recognition
- Student Assessment and Feedback
Murdoch University
2014-2024
Curtin University
1991-2024
Virginia Tech
2017
Royal College of Surgeons in Ireland
1996
Rotunda Hospital
1996
DeLone and McLean’s (1992) model of information systems success has received much attention amongst researchers. This study provides the first empirical test an adaptation in user-developed application domain. The tested was only partially supported by data. Of nine hypothesized relationships tested, four were found to be significant remainder not significant. provided strong support for between perceived system quality user satisfaction, satisfaction intended use, individual impact....
Abstract Virtual learning environments (VLEs) are widespread in higher education today, typically used to deliver instructional materials and facilitate communication within a course. This study aimed investigate the task–technology fit of VLEs for their two main groups users: instructors students, using VLE WebCT. Task–technology fit, user satisfaction, attitude towards use anticipated consequences were found be significantly students than instructors. Instructors have perceptions social...
Smart home devices form a significant part of the Internet Things market and can provide benefits such as convenience energy efficiency. They also have potential privacy security risks they collect information constantly. In order to examine how benefit risk factors influence individuals' intentions adopt smart devices, we developed net valence model that integrates both positive factors. The was tested using data collected an online questionnaire. results show individuals tend ignore focus...
Home users are particularly vulnerable to information security threats as they must make decisions about how protect themselves, often with little knowledge of the technology. Furthermore, for home tends focus on traditional PC and may downplay faced mobile devices, transforming well-known old risks into new challenges security. To address need more behavioural research that focusses this paper reports first large-scale study comparing perceptions behaviours computer devices. Data from 629...
Abstract Though there is a tension between citizens' privacy concerns and their acceptance of government surveillance, little systematic research in this space less still cross‐cultural context. We address the gap by modeling factors that drive public exploring influence national culture. The involved an online survey 242 Australian Sri Lankan residents. Data were analyzed using partial least squares, revealing around initial collection data influenced levels surveillance Australia but not...
This article proposes a conceptual framework for analyzing students' knowledge of programming. The integrates three distinct types programming identified in the educational computing literature (syntactic, conceptual, and strategic) with forms proposed cognitive psychology (declarative, procedural, conditional). Analysis empirical data from previous experimental study (Volet, 1991) provided support usefulness model its potential diagnosing deficiencies novice programmers during course...
This work evaluated the National Research Council (NRC) dairy model (2001) predictions of rumen undegradable (RUP) and degradable (RDP) protein compared with measured postruminal non-ammonia, nonmicrobial (NANMN) microbial N flows. Models were using root mean squared prediction error (RMSPE) as a percent observed mean, slope biases percentages (MSPE), concordance correlation coefficient (CCC). The NRC over-estimated NANMN by 18% under-estimated 14%. Both responses had large (19% 20% MSPE,...
An international association advancing the multidisciplinary study of informing systems. Founded in 1998, Informing Science Institute (ISI) is a global community academics shaping future science.
Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional models that focused on separating each other have proven ineffective in environment of widespread software vulnerabilities and rampant malware. However, alternative approaches provide more finely grained generally require greater expertise than typical can reasonably be expected to have, consequently had limited success. The functionality-based application confinement (FBAC)...
Passwords have long been the preferred method of user authentication, yet poor password practices cause security issues. The study described in this paper investigates how perceptions passwords and threats affect intended compliance with guidelines explores these might be altered order to improve compliance. It tests a research model based on protection motivation theory [24]. Two groups internet users were surveyed, one which received information an exercise reinforce it. This suggests...
Passwords are the most widely used method of authentication on Internet, but users find compliance with password guidelines difficult, and we know little about long-term effects attempts to improve compliance. In this paper, extend work fear appeals use in IS security domain investigate their longer-term effects. We conducted a longitudinal experimental study examine appeals’ long- short-term Using model based protection motivation theory (Rogers, 1983), found that threat, perceived...
Evaluation of ration balancing systems such as the National Research Council (NRC) Nutrient Requirements series is important for improving predictions animal nutrient requirements and advancing feeding strategies.This work used a literature data set (n = 550) to evaluate total-tract digested neutral detergent fiber (NDF), fatty acid (FA), crude protein (CP), nonfiber carbohydrate (NFC) estimated by NRC (2001) dairy model.Mean biases suggested that lactating cow model overestimated true FA CP...