user knowledge
Recently Published Documents


TOTAL DOCUMENTS

216
(FIVE YEARS 73)

H-INDEX

13
(FIVE YEARS 3)

2021 ◽  
Vol 14 (2) ◽  
pp. 325-331
Author(s):  
Yosdarso Afero

Puzzle game is a game that shifts numbers from a box consisting of nine boxes. Eight boxes must have values arranged in numerical order starting from numbers 1 to 8. Puzzle games can produce the correct sequence according to the initial state provided that they follow the rules established rules. Completion of this game using a heuristic method, using the Ascent hill Climbing algorithm. The working process of the Ascent hill Climbing method is a process of looking for several possible solutions in order to get the optimal value for solving the problem by arranging the values from the position of the smallest value to the position of the largest value. The problem that is often experienced in this case is a lack of user knowledge in the concept of puzzle game rules so that search results are difficult to find,with this method it can make it easier to solve puzzle game cases by following the game rules and done systematically so that Goals are quickly found. The Goal results obtained are in the form of steps in the process of finding a solution and calculating the time required in the search to find a solution.


2021 ◽  
Vol 2129 (1) ◽  
pp. 012024
Author(s):  
S E Mohamed ◽  
N A Ismail ◽  
A Mukthar ◽  
M S Hafiz

Abstract Flood disaster is the most disastrous hydrological event that can lead to property destruction and loss of lives. One of the efforts to mitigate the impact is by providing an advance technology in monitoring and event alert. The flood monitoring application is developed to provide real-time weather forecast and disaster warnings. To increase disaster management efficiency, we conducted this research to identify the needs and requirements for a flood monitoring application. The study is mainly focusing on user perspective and preferences. The participant of this survey includes the authorities, non-government agency (NGO) and public. The participant is given a set of questionnaires containing thirteen questions, including the combination of open-ended and close-ended questions covering three sub-topics: user background, user experience, and user knowledge. List of important flood monitoring application features based on user requirements analysis and empathy map has been used to visualize user attitudes and behaviours.


2021 ◽  
Vol 17 (4) ◽  
pp. 98-117
Author(s):  
Boonlert Watjatrakul ◽  
Vimolluck Vatanapitukpong

While many studies explain factors influencing the success of ERP implementation, little is known about the system outcome to satisfy user expectations based on the concepts of task-technology fit and person-task fit. The study examines the effects of fits between user interfaces, task interdependence, and user knowledge on system utilization and performance impacts leading to user satisfaction with ERP system implementation. Based on the structural equation modeling analysis and two-way interaction test results, a user interface dampens the positive effect of task interdependence on task-technology fit while it strengthens the positive effect of user knowledge on task-technology fit. Task interdependence dampens the positive effect of user knowledge on system utilization. The results provide guidance on how to enhance the system impacts on user performance and encourage the system usage resulting in user satisfaction with the ERP system implementation. The paper provides detailed discussions of the results, the implications for theory and practices, and the study limitations.


2021 ◽  
Vol 11 (17) ◽  
pp. 7880
Author(s):  
Abdul Razaque ◽  
Abrar Al Ajlan ◽  
Noussaiba Melaoune ◽  
Munif Alotaibi ◽  
Bandar Alotaibi ◽  
...  

Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these threats. The ignorance of or lack of cybersecurity knowledge also causes a critical problem regarding confidentiality and privacy. It is not possible to fully avoid cybercrimes that often lead to sufficient business losses and spread forbidden themes (disgust, extremism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WBCA) process is introduced in this paper. The proposed WBCA trains users to improve their security skills. The proposed program helps with understanding the common behaviors of cybercriminals and improves user knowledge of cybersecurity hygiene, best cybersecurity practices, modern cybersecurity vulnerabilities, and trends. Furthermore, the proposed WBCA uses Blockchain technology to protect the program from potential threats. The proposed program is validated and tested using real-world cybersecurity topics with real users and cybersecurity experts. We anticipate that the proposed program can be extended to other domains, such as national or corporate courses, to increase the cybersecurity awareness level of users. A CentOS-based virtual private server is deployed for testing the proposed WBCA to determine its effectiveness. Finally, WBCA is also compared with other state-of-the-art web-based programs designed for cybersecurity awareness.


Author(s):  
Abdul Razaque ◽  
Abrar M Alajlan ◽  
Noussaiba Melaoune ◽  
Munif Alotaibi ◽  
Bandar Alotaibi ◽  
...  

The ignorance of or lack of knowledge about cybersecurity aspects causes a critical problem regarding confidentiality and privacy. This security problem will continue to exist even if the user possesses less expertise in information security. The modern IT technologies are well developed, and almost everyone uses the features of IT technologies and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures. However, it is not possible to entirely avoid cybercrimes. Cybercrimes often lead to sufficient business losses and spread forbidden themes (hatred, terrorism, child porn, etc.). Therefore, to reduce the risk of cybercrimes, a web-based Blockchain-enabled cybersecurity awareness program (WBCA) process is introduced in this paper. The proposed web-based cybersecurity awareness program trains users to improve their security skills. The proposed program helps with understanding the common behaviors of cybercriminals and improves user knowledge of cybersecurity hygiene, best cybersecurity practices, modern cybersecurity vulnerabilities, and trends. Furthermore, the proposed WBCA uses the Blockchain technology to protect the model from the potential threats. The proposed model is validated and tested using real-world cybersecurity topics with real users and cybersecurity experts. We anticipate that the proposed program can be extended to other domains, such as national or corporate courses, to increase the cybersecurity awareness level of users.


ReCALL ◽  
2021 ◽  
pp. 1-15
Author(s):  
John S. Y. Lee

Abstract Extracurricular reading is important for learning foreign languages. Text recommendation systems typically classify users and documents into levels, and then match users with documents at the same level. Although this approach can be effective, it has two significant shortcomings. First, the levels assume a standard order of language acquisition and cannot be personalized to the users’ learning patterns. Second, recommendation decisions are not transparent because the leveling algorithms can be difficult for users to interpret. We propose a novel method for text recommendation that addresses these two issues. To enhance personalization, an open, editable learner model estimates user knowledge of each word in the foreign language. The documents are ranked by new-word density (NWD) – that is, the percentage of words that are new to the user in the document. The system then recommends documents according to a user-specified target NWD. This design offers complete transparency as users can scrutinize recommendations by reviewing the NWD estimation of the learner model. This article describes an implementation of this method in a mobile app for learners of Chinese as a foreign language. Evaluation results show that users were able to manipulate the learner model and NWD parameters to adjust the difficulty of the recommended documents. In a survey, users reported satisfaction with both the concept and implementation of this text recommendation method.


2021 ◽  
Vol 18 (1) ◽  
Author(s):  
Tara Beaulieu ◽  
Evan Wood ◽  
Samuel Tobias ◽  
Mark Lysyshyn ◽  
Priya Patel ◽  
...  

Abstract Background Drug checking is a harm reduction intervention aiming to reduce substance use-related risks by improving drug user knowledge of the composition of unregulated drugs. With increasing fears of fentanyl adulteration in unregulated drugs, this study sought to examine whether the expected type of drug checked (stimulant vs. opioid) was associated with timing of drug checking service utilization (pre-consumption vs. post-consumption). Methods Data were derived from drug checking sites in British Columbia between October 31, 2017 and December 31, 2019. Pearson’s Chi-square test was used to examine the relationship between expected sample type (stimulant vs. opioid) and timing of service utilization. Odds ratios (OR) were calculated to assess the strength of this relationship. The Mantel–Haenszel (MH) test was used to adjust for service location. Results A total of 3561 unique stimulant and opioid samples were eligible for inclusion, including 691 (19.40%) stimulant samples; and 2222 (62.40%) samples that were tested pre-consumption. Results indicated a positive association between testing stimulant samples and testing pre-consumption (OR = 1.45; 95% CI 1.21–1.73). Regions outside of the epicenter of the province’s drug scene showed a stronger association with testing pre-consumption (ORMH = 2.33; 95% CI 1.51–3.56) than inside the epicenter (ORMH = 1.33; 95% CI 1.09–1.63). Conclusion Stimulant samples were more likely to be checked pre-consumption as compared with opioid samples, and stimulant samples were more likely to be tested pre-consumption in regions outside the epicenter of the province’s drug scene. This pattern may reflect a concern for fentanyl-adulterated stimulant drugs.


Sign in / Sign up

Export Citation Format

Share Document