This document discusses a study that explored undergraduate students' perceptions of ethical information technology use based on their awareness. The study surveyed 542 students from 4 universities in Pakistan about various computer and internet activities, asking them to label each as right, wrong, or neither. The results found that many students lacked prior training in computer ethics and had little knowledge about the topic. Female students, those from public universities, computing/IT departments, and science disciplines generally had more positive views of ethical IT use. Minimal differences were seen based on prior IT training or ethics knowledge. This suggests computer ethics training is needed for all university students.
The effect of information and communication technology (ICT) in Jordanian lea...IJERA Editor
Information and communication Technology are used of electronic means which involve access storage, processing of electronic technology to handling of information, the various forms of uses it’s in order to improve Jordanian learning. The study aimed to investigate the uses and effect of ICTs for Jordanian learning from their perspective of student of higher school at the north of Jordan. The study method was a descriptive survey which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure the effect of ICTs based on previous studies its applied to (548) student of higher school. The study was using SPSS to analyses data. The results indicate that ICTs for higher school at the north of Jordan there were a statistically significant relationship between the higher school at the north of Jordan and Jordanian learning, and seven of hypotheses reported statistically significant in the hypotheses and accepted but three hypotheses reported no a statistically significant and rejected. The study have Conclusion should gives more attention to focus on and beneficial of using ICTs applications.
This paper investigated digital competence as perceived by Zimbabwe in relation to four demographic characteristics. The study adopted quantitative descriptive research design. A simple random sample of 440 full time university academics responded to a structured questionnaire. Data were summarized using non parametric methods. Multiple regression and independent samples’t-test were adopted to test two null hypotheses at 95% significance level. Findings revealed significant relationship between university academics’ digital competence and their gender and experience in using the internet. Male academics perceived themselves as more competent than female academics. A significant inverse relationship was also observed between digital competence and age of respondents. The findings led to the conclusion that university academics were fairly competent in using the internet for research and faced challenges in using the internet as a teaching tool. University management was advised to place a premium on the use of information technology in university academic business.
Assesssment of internet service quality and customers’ satisfaction in univer...Alexander Decker
This study examined internet service quality and customer satisfaction at the University of Ilorin in Nigeria. A survey was conducted of 60 academic staff, 40 non-academic staff, and 100 students to understand their awareness of internet services, technical difficulties experienced, and perceptions of quality. The results found that over 90% of staff and 75.5% of students were aware of internet services on campus. However, over 50% of staff and 85.7% of students reported issues like insufficient bandwidth and poor electricity that hindered effective use. Based on these problems, over 50% of staff and 65% of students expressed dissatisfaction with the quality of internet services. Most respondents felt quality and satisfaction could be improved by addressing bandwidth, training
This research aims at examining the effect of Ease, Affect, Flexibility and Accessibility of information technology on utilizing virtual learning environment at Universitas Terbuka. The population of the research consists students of Bidikmisi scholarship in Non Basic Education program of Accounting that include of 145 respondents. The sampling method is purposive sampling with 141 eligible samples. The questionnaires are measured with Correlation and Multiple Regression analysis that covers descriptive statistics, reliability test and validity test. Classical Assumption Test which includes multcollinearity test is later conducted. Hypothesis testing and discussion are presented at the end. Result of research with t test or partially indicate that, variable of ease of use have positive relation and have significant influence to interest of utilization of virtual learning environment, t test result for accessibility variable have positive relation and no significant effect to interest of utilization of virtual learning environment. The result of the research on the affect variable has a positive relationship and has a significant effect on the interest of utilizing the virtual learning environment. While the flexibility variable shows have a negative relationship and no significant effect on the interest of utilization of virtual learning environment.
Time management of internet dependency among university students and its impa...Alexander Decker
This study examined time management of internet dependency among university students in Nigeria and its impact on academic performance. A survey was administered to 402 students at the University of Maiduguri. The survey found that 10.4% of students were categorized as having internet dependency issues. Internet dependency was found to positively correlate with time spent online but negatively correlate with academic performance, though not statistically significant. The study concluded that effective time management and counseling could help minimize the effects of internet overuse and enhance academic performance for students.
Factors influencing the adoption of e learning in jordanAlexander Decker
This document summarizes a study that examines factors influencing the adoption of e-learning in Jordan. It develops an extended Technology Acceptance Model called TAM-EL that includes perception of usefulness, ease of use, degree of support (patronised), and previous experience (practised) as factors influencing attitudes toward e-learning adoption. The study surveyed 380 students to test this model. It found that attitude contributes 57% to predicting e-learning adoption, while degree of support contributes 28%. The findings recommend more determined engagement of users to increase e-learning adoption.
The effect of information and communication technology (ICT) in Jordanian lea...IJERA Editor
Information and communication Technology are used of electronic means which involve access storage, processing of electronic technology to handling of information, the various forms of uses it’s in order to improve Jordanian learning. The study aimed to investigate the uses and effect of ICTs for Jordanian learning from their perspective of student of higher school at the north of Jordan. The study method was a descriptive survey which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure the effect of ICTs based on previous studies its applied to (548) student of higher school. The study was using SPSS to analyses data. The results indicate that ICTs for higher school at the north of Jordan there were a statistically significant relationship between the higher school at the north of Jordan and Jordanian learning, and seven of hypotheses reported statistically significant in the hypotheses and accepted but three hypotheses reported no a statistically significant and rejected. The study have Conclusion should gives more attention to focus on and beneficial of using ICTs applications.
This paper investigated digital competence as perceived by Zimbabwe in relation to four demographic characteristics. The study adopted quantitative descriptive research design. A simple random sample of 440 full time university academics responded to a structured questionnaire. Data were summarized using non parametric methods. Multiple regression and independent samples’t-test were adopted to test two null hypotheses at 95% significance level. Findings revealed significant relationship between university academics’ digital competence and their gender and experience in using the internet. Male academics perceived themselves as more competent than female academics. A significant inverse relationship was also observed between digital competence and age of respondents. The findings led to the conclusion that university academics were fairly competent in using the internet for research and faced challenges in using the internet as a teaching tool. University management was advised to place a premium on the use of information technology in university academic business.
Assesssment of internet service quality and customers’ satisfaction in univer...Alexander Decker
This study examined internet service quality and customer satisfaction at the University of Ilorin in Nigeria. A survey was conducted of 60 academic staff, 40 non-academic staff, and 100 students to understand their awareness of internet services, technical difficulties experienced, and perceptions of quality. The results found that over 90% of staff and 75.5% of students were aware of internet services on campus. However, over 50% of staff and 85.7% of students reported issues like insufficient bandwidth and poor electricity that hindered effective use. Based on these problems, over 50% of staff and 65% of students expressed dissatisfaction with the quality of internet services. Most respondents felt quality and satisfaction could be improved by addressing bandwidth, training
This research aims at examining the effect of Ease, Affect, Flexibility and Accessibility of information technology on utilizing virtual learning environment at Universitas Terbuka. The population of the research consists students of Bidikmisi scholarship in Non Basic Education program of Accounting that include of 145 respondents. The sampling method is purposive sampling with 141 eligible samples. The questionnaires are measured with Correlation and Multiple Regression analysis that covers descriptive statistics, reliability test and validity test. Classical Assumption Test which includes multcollinearity test is later conducted. Hypothesis testing and discussion are presented at the end. Result of research with t test or partially indicate that, variable of ease of use have positive relation and have significant influence to interest of utilization of virtual learning environment, t test result for accessibility variable have positive relation and no significant effect to interest of utilization of virtual learning environment. The result of the research on the affect variable has a positive relationship and has a significant effect on the interest of utilizing the virtual learning environment. While the flexibility variable shows have a negative relationship and no significant effect on the interest of utilization of virtual learning environment.
Time management of internet dependency among university students and its impa...Alexander Decker
This study examined time management of internet dependency among university students in Nigeria and its impact on academic performance. A survey was administered to 402 students at the University of Maiduguri. The survey found that 10.4% of students were categorized as having internet dependency issues. Internet dependency was found to positively correlate with time spent online but negatively correlate with academic performance, though not statistically significant. The study concluded that effective time management and counseling could help minimize the effects of internet overuse and enhance academic performance for students.
Factors influencing the adoption of e learning in jordanAlexander Decker
This document summarizes a study that examines factors influencing the adoption of e-learning in Jordan. It develops an extended Technology Acceptance Model called TAM-EL that includes perception of usefulness, ease of use, degree of support (patronised), and previous experience (practised) as factors influencing attitudes toward e-learning adoption. The study surveyed 380 students to test this model. It found that attitude contributes 57% to predicting e-learning adoption, while degree of support contributes 28%. The findings recommend more determined engagement of users to increase e-learning adoption.
Attitude towards Information and Communication Technology among Rural and Urb...ijtsrd
The present study examined attitude towards information and communication technology among rural and urban primary and secondary school teachers of Punjab state. For this purpose, a sample of 400 teachers were selected randomly 200 rural teachers 100 primary and 100 secondary and 200 urban teachers again 100 primary and 100 secondary Parminder Kaur | Dr. Sunita Arya ""Attitude towards Information and Communication Technology among Rural and Urban Primary and Secondary School Teachers of Punjab"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23131.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/23131/attitude-towards-information-and-communication-technology-among-rural-and-urban-primary-and-secondary-school-teachers-of-punjab/parminder-kaur
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
This document summarizes a study that assessed the current trends in accessing the internet using mobile devices and utilization patterns among pharmacy lecturers in South-South universities in Nigeria. It found that 3G modems and laptops were the most commonly used mobile devices for internet access. The study also found that lecturers most frequently accessed the internet at home on a daily basis for research activities like accessing electronic journals and databases using search engines like Google. In general, the trend was for lecturers to access the internet using 3G modems connected to laptops.
This document summarizes a study that investigated factors affecting acceptance of e-learning among students at Universiti Utara Malaysia (UUM). The study tested a model combining the Technology Acceptance Model (TAM) with variables from the Theory of Planned Behavior and Social Cognitive Theory. It found that perceived usefulness and perceived ease of use positively influenced e-learning usage, but social pressure and internet self-efficacy did not. The implications are that universities should focus on developing useful e-learning content to encourage student adoption. A survey of 256 business students found that most used e-learning a few times a week, indicating a moderate overall usage level.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
Investigation of new approach to detect and track fraud in virtual learningijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Ranking the criteria of quality evaluation forIJITE
Recent past has witnessed the fast use of the information and communication technology in the ever
developing field of education. Enormous information is brought to the classroom for easy access by the
learner anywhere in the world. Learners of today are distinguished by their proficiency in use of
technology to know about assessment and successful management of informational opportunities. Critical
analysis of existing education scenario emphasizes the introduction of major thrust areas as Information
Communication Technology, literacy, organization of curriculum, and others. This is to elevate the
standard of education and disseminate the information in shortest time with use of online and offline
resources through internet. These are for professional growth, teaching support materials and other
classroom related activities. The research work and true knowledge of topics calls for the need to evaluate
the information provided on the internet. The present paper caters to this need, especially in context to
intellectual information available on the internet. The research work in this paper is accomplished by
selecting a system of quality criteria and defining in terms of internet usage for intellectual purpose.
Several questions are designed to assess each criterion and as a result an instrument is developed and
validated in the form of a questionnaire. The quality criteria taken into consideration are as Content,
Objective reasoning, Scope, Authority; these are further classified into indicators for easy assessment.
The collected data has been tabulated and analysed to rank the criteria as per their preference for quality
assessment of the intellectual information available on the internet. The results indicate that authority is
the most preferred criteria while objective reasoning is the least preferred one as per their calculated
mean values.
This document provides a research proposal that explores the usage of mobile phones in building relationships among first and second year college students ages 16-19 at Miriam College. The proposal includes background on mobile phone usage, the rationale and objectives of the study, and a review of related literature on the history of mobile phones and their usage. The general objective is to explore how teenagers at Miriam College use mobile phones to build relationships with friends, family and romantic partners. Specific objectives are to evaluate factors in social interactions, determine frequency of usage, and identify impacts on behavior and attitudes. The proposal aims to investigate how teenagers utilize mobile phones to build relationships and asks how those aged 16-19 at Miriam College maximize their phones for this purpose.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
This document summarizes a study that investigated the attitudes of students at private universities in Bangladesh toward using the internet. The study surveyed over 1,000 undergraduate and graduate students across multiple private universities. It examined how students' attitudes may vary based on gender, parents' education levels, access to computers and the internet at home, and other factors. The study found that students generally had positive attitudes toward using the internet for learning. They viewed the internet as a fast way to access knowledge and believed it has potential as an effective educational tool. The study also found students' attitudes did not significantly differ based on gender. The results provide insights into how students view the internet that can help enhance its role in education.
Mobile learning anytime, anywhere: What are our students doing?Helen Farley
Recent developments in mobile technologies have provided unique opportunities for learning and teaching. This paper reports on recent research undertaken at a regional Australian university in order to understand how higher education students are using mobile devices to support their learning. A survey instrument was developed and deployed and the data collected analysed quantitatively. Upon analysis, these data demonstrate that students are predominantly using laptop computers to support their learning, but their use of smart phones and tablets are also used for a number of specific learning activities. Further analysis indicates that in spite of the limitations in the formal university infrastructure, many students would like to use their mobile devices for formal
learning as well as informal learning.
1. The document discusses how technology and its integration into classrooms has transformed the definition of literacy to include the ability to interact with technological tools and resources.
2. It explores how government initiatives like No Child Left Behind have aimed to expand access to learning through e-learning and technology to close achievement gaps.
3. Standards organizations like ISTE and NETS have also worked to define standards for effective educational use of technology to enhance learning and prepare students for an increasingly digital world.
The Impact of ICT on Students of The Preparatory Academic Unit 14 of The Auto...inventionjournals
For the following investigation was taken as study area High Academic Unit 14, belonging to the Autonomous University of Nayarit, which aims to determine the level of knowledge and management of Information Technology and Communication -ICT- by students, applying these technologies in various activities inside and outside school. Also, the collection of information involved with the lifting of 101 surveys, consisting of the following questions, 1. How old are you? 2. What is your sex? 3. Do you make use of technologies such as computer, internet, programs, email, social networks, etc.? 4. What place make use of the internet for your questions and / or tasks? 5. In providing Internet services, which often use? 6. To which social networks you connect constantly? 7. Do you think anyone can handle technological tools? 8. Which of these programs you constantly use to your academic activities? 9. The level of use of information technologies and communication - ICT- at your school is? applied to groups of first year for which the data were processed statistically using contingency tables in SPSS 19 program, obtaining as main result a moderate about knowledge and use of ICT impact.
Usage, Acceptance, Adoption, and Diffusion of Information & Communication Tec...Zaffar Ahmed Shaikh
This document summarizes a study that measured critical factors related to the usage, acceptance, adoption and diffusion of information and communication technologies (ICTs) in higher education institutions in Pakistan. The study used the Delphi method to analyze differences in perceptions among higher education stakeholders. It found a significant "zone of proximal development gap" in ICT usage, acceptance and adoption in Pakistani institutions compared to developed nations. However, it did not find significant differences in perceptions regarding issues like ICT demand and supply or challenges to ICT integration. The study recommends its findings be considered in designing ICT policies for higher education in Pakistan and other developing countries.
Information retrieval skills and use of library electronic resources by unive...Alexander Decker
1) The document discusses a study that examined the impact of information retrieval skills on Nigerian university
undergraduates' utilization of electronic resources.
2) It found that informational, operational, and strategic retrieval skills significantly correlated with students' use
of electronic resources for research.
3) However, the data showed that undergraduates lacked the requisite skills for effective use of electronic
resources.
EXTENT INFORMATION RESOURCES PROVISION OF NATIONAL OPEN UNIVERSITY OF NIGERIA...AkashSharma618775
This work examined the extent Information resources provision of National Open University of Nigeria
meet the information needs of their students in Southeast Nigeria. Three research questions guided the study.
Descriptive survey research design was adopted for the study. The population of the study comprised 42,200
NOUN Students from four study centers in southeast out of which 2111 were sampled. Random sampling
technique was used to draw the sample. Instrument for data collection was a structured questionnaire. Its
reliability was established using Cronbach alpha. Data collected was analyzed using arithmetic mean. From the
analysis, given that the various information resources needed by students are to a high extent, more so the
provided information resources by NOUN to its students to meet their information need are to a low extent.
However these were not without challenges ranging from poor funding, inadequate provision of information
resources, and irregular power supply and so on but they further highlighted some solutions to the challenges.
Based on the findings, the study recommends that the stakeholders should oftentimes conduct a resources
verification exercise on the resources and facilities of the NOUN programme and they should also ensure that the
policy and the vision statement that established the NOUN programme are strictly followed.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
020. students’ attitude and behavioural intention on adoption of internet for...Gambari Isiaka
This document summarizes a study that examined students' attitudes and behavioral intentions regarding adopting the internet for learning. The study surveyed 200 undergraduate students at Al-Hikmah University in Nigeria. The findings showed that perceived usefulness was the strongest determinant for adopting the internet for learning. Students' attitudes were also found to significantly influence their adoption of the internet. However, facilitating conditions did not significantly impact adoption. The study aims to better understand factors influencing internet adoption for education among Nigerian students.
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
This document summarizes a study that examined how personal factors predict the content that university students access online. A survey was conducted of 200 students at Ajayi Crowther University in Nigeria. The study found that 40.5% of students used the internet for social networking, 32.8% for news and information, and 18.5% for entertainment. While all personal factors considered accounted for 67% of the variation in content choice, only academic level, religion, and socioeconomic status significantly influenced what content students accessed. The personal factors examined were age, gender, religion, socioeconomic status, and academic level.
Usage, acceptance, adoption, and diffusion of information & communicationTariq Ghayyur
The document discusses a study that measured critical factors related to the usage, acceptance, adoption and diffusion of information and communication technologies (ICTs) in higher education institutions in Pakistan. It used the Delphi method to analyze differences in perceptions among higher education stakeholders. It found a significant "zone of proximal development gap" in ICT usage, acceptance and adoption in Pakistani higher education institutions compared to developed nations. However, it did not find significant differences in perceptions regarding issues like ICT demand and supply, causes of poor higher education standards, and challenges and solutions related to ICT integration. The study recommends its findings to help the Pakistani government in developing ICT policies for higher education.
Attitude towards Information and Communication Technology among Rural and Urb...ijtsrd
The present study examined attitude towards information and communication technology among rural and urban primary and secondary school teachers of Punjab state. For this purpose, a sample of 400 teachers were selected randomly 200 rural teachers 100 primary and 100 secondary and 200 urban teachers again 100 primary and 100 secondary Parminder Kaur | Dr. Sunita Arya ""Attitude towards Information and Communication Technology among Rural and Urban Primary and Secondary School Teachers of Punjab"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23131.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/23131/attitude-towards-information-and-communication-technology-among-rural-and-urban-primary-and-secondary-school-teachers-of-punjab/parminder-kaur
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
This document summarizes a study that assessed the current trends in accessing the internet using mobile devices and utilization patterns among pharmacy lecturers in South-South universities in Nigeria. It found that 3G modems and laptops were the most commonly used mobile devices for internet access. The study also found that lecturers most frequently accessed the internet at home on a daily basis for research activities like accessing electronic journals and databases using search engines like Google. In general, the trend was for lecturers to access the internet using 3G modems connected to laptops.
This document summarizes a study that investigated factors affecting acceptance of e-learning among students at Universiti Utara Malaysia (UUM). The study tested a model combining the Technology Acceptance Model (TAM) with variables from the Theory of Planned Behavior and Social Cognitive Theory. It found that perceived usefulness and perceived ease of use positively influenced e-learning usage, but social pressure and internet self-efficacy did not. The implications are that universities should focus on developing useful e-learning content to encourage student adoption. A survey of 256 business students found that most used e-learning a few times a week, indicating a moderate overall usage level.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
Investigation of new approach to detect and track fraud in virtual learningijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Ranking the criteria of quality evaluation forIJITE
Recent past has witnessed the fast use of the information and communication technology in the ever
developing field of education. Enormous information is brought to the classroom for easy access by the
learner anywhere in the world. Learners of today are distinguished by their proficiency in use of
technology to know about assessment and successful management of informational opportunities. Critical
analysis of existing education scenario emphasizes the introduction of major thrust areas as Information
Communication Technology, literacy, organization of curriculum, and others. This is to elevate the
standard of education and disseminate the information in shortest time with use of online and offline
resources through internet. These are for professional growth, teaching support materials and other
classroom related activities. The research work and true knowledge of topics calls for the need to evaluate
the information provided on the internet. The present paper caters to this need, especially in context to
intellectual information available on the internet. The research work in this paper is accomplished by
selecting a system of quality criteria and defining in terms of internet usage for intellectual purpose.
Several questions are designed to assess each criterion and as a result an instrument is developed and
validated in the form of a questionnaire. The quality criteria taken into consideration are as Content,
Objective reasoning, Scope, Authority; these are further classified into indicators for easy assessment.
The collected data has been tabulated and analysed to rank the criteria as per their preference for quality
assessment of the intellectual information available on the internet. The results indicate that authority is
the most preferred criteria while objective reasoning is the least preferred one as per their calculated
mean values.
This document provides a research proposal that explores the usage of mobile phones in building relationships among first and second year college students ages 16-19 at Miriam College. The proposal includes background on mobile phone usage, the rationale and objectives of the study, and a review of related literature on the history of mobile phones and their usage. The general objective is to explore how teenagers at Miriam College use mobile phones to build relationships with friends, family and romantic partners. Specific objectives are to evaluate factors in social interactions, determine frequency of usage, and identify impacts on behavior and attitudes. The proposal aims to investigate how teenagers utilize mobile phones to build relationships and asks how those aged 16-19 at Miriam College maximize their phones for this purpose.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
This document summarizes a study that investigated the attitudes of students at private universities in Bangladesh toward using the internet. The study surveyed over 1,000 undergraduate and graduate students across multiple private universities. It examined how students' attitudes may vary based on gender, parents' education levels, access to computers and the internet at home, and other factors. The study found that students generally had positive attitudes toward using the internet for learning. They viewed the internet as a fast way to access knowledge and believed it has potential as an effective educational tool. The study also found students' attitudes did not significantly differ based on gender. The results provide insights into how students view the internet that can help enhance its role in education.
Mobile learning anytime, anywhere: What are our students doing?Helen Farley
Recent developments in mobile technologies have provided unique opportunities for learning and teaching. This paper reports on recent research undertaken at a regional Australian university in order to understand how higher education students are using mobile devices to support their learning. A survey instrument was developed and deployed and the data collected analysed quantitatively. Upon analysis, these data demonstrate that students are predominantly using laptop computers to support their learning, but their use of smart phones and tablets are also used for a number of specific learning activities. Further analysis indicates that in spite of the limitations in the formal university infrastructure, many students would like to use their mobile devices for formal
learning as well as informal learning.
1. The document discusses how technology and its integration into classrooms has transformed the definition of literacy to include the ability to interact with technological tools and resources.
2. It explores how government initiatives like No Child Left Behind have aimed to expand access to learning through e-learning and technology to close achievement gaps.
3. Standards organizations like ISTE and NETS have also worked to define standards for effective educational use of technology to enhance learning and prepare students for an increasingly digital world.
The Impact of ICT on Students of The Preparatory Academic Unit 14 of The Auto...inventionjournals
For the following investigation was taken as study area High Academic Unit 14, belonging to the Autonomous University of Nayarit, which aims to determine the level of knowledge and management of Information Technology and Communication -ICT- by students, applying these technologies in various activities inside and outside school. Also, the collection of information involved with the lifting of 101 surveys, consisting of the following questions, 1. How old are you? 2. What is your sex? 3. Do you make use of technologies such as computer, internet, programs, email, social networks, etc.? 4. What place make use of the internet for your questions and / or tasks? 5. In providing Internet services, which often use? 6. To which social networks you connect constantly? 7. Do you think anyone can handle technological tools? 8. Which of these programs you constantly use to your academic activities? 9. The level of use of information technologies and communication - ICT- at your school is? applied to groups of first year for which the data were processed statistically using contingency tables in SPSS 19 program, obtaining as main result a moderate about knowledge and use of ICT impact.
Usage, Acceptance, Adoption, and Diffusion of Information & Communication Tec...Zaffar Ahmed Shaikh
This document summarizes a study that measured critical factors related to the usage, acceptance, adoption and diffusion of information and communication technologies (ICTs) in higher education institutions in Pakistan. The study used the Delphi method to analyze differences in perceptions among higher education stakeholders. It found a significant "zone of proximal development gap" in ICT usage, acceptance and adoption in Pakistani institutions compared to developed nations. However, it did not find significant differences in perceptions regarding issues like ICT demand and supply or challenges to ICT integration. The study recommends its findings be considered in designing ICT policies for higher education in Pakistan and other developing countries.
Information retrieval skills and use of library electronic resources by unive...Alexander Decker
1) The document discusses a study that examined the impact of information retrieval skills on Nigerian university
undergraduates' utilization of electronic resources.
2) It found that informational, operational, and strategic retrieval skills significantly correlated with students' use
of electronic resources for research.
3) However, the data showed that undergraduates lacked the requisite skills for effective use of electronic
resources.
EXTENT INFORMATION RESOURCES PROVISION OF NATIONAL OPEN UNIVERSITY OF NIGERIA...AkashSharma618775
This work examined the extent Information resources provision of National Open University of Nigeria
meet the information needs of their students in Southeast Nigeria. Three research questions guided the study.
Descriptive survey research design was adopted for the study. The population of the study comprised 42,200
NOUN Students from four study centers in southeast out of which 2111 were sampled. Random sampling
technique was used to draw the sample. Instrument for data collection was a structured questionnaire. Its
reliability was established using Cronbach alpha. Data collected was analyzed using arithmetic mean. From the
analysis, given that the various information resources needed by students are to a high extent, more so the
provided information resources by NOUN to its students to meet their information need are to a low extent.
However these were not without challenges ranging from poor funding, inadequate provision of information
resources, and irregular power supply and so on but they further highlighted some solutions to the challenges.
Based on the findings, the study recommends that the stakeholders should oftentimes conduct a resources
verification exercise on the resources and facilities of the NOUN programme and they should also ensure that the
policy and the vision statement that established the NOUN programme are strictly followed.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
020. students’ attitude and behavioural intention on adoption of internet for...Gambari Isiaka
This document summarizes a study that examined students' attitudes and behavioral intentions regarding adopting the internet for learning. The study surveyed 200 undergraduate students at Al-Hikmah University in Nigeria. The findings showed that perceived usefulness was the strongest determinant for adopting the internet for learning. Students' attitudes were also found to significantly influence their adoption of the internet. However, facilitating conditions did not significantly impact adoption. The study aims to better understand factors influencing internet adoption for education among Nigerian students.
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
This document summarizes a study that examined how personal factors predict the content that university students access online. A survey was conducted of 200 students at Ajayi Crowther University in Nigeria. The study found that 40.5% of students used the internet for social networking, 32.8% for news and information, and 18.5% for entertainment. While all personal factors considered accounted for 67% of the variation in content choice, only academic level, religion, and socioeconomic status significantly influenced what content students accessed. The personal factors examined were age, gender, religion, socioeconomic status, and academic level.
Usage, acceptance, adoption, and diffusion of information & communicationTariq Ghayyur
The document discusses a study that measured critical factors related to the usage, acceptance, adoption and diffusion of information and communication technologies (ICTs) in higher education institutions in Pakistan. It used the Delphi method to analyze differences in perceptions among higher education stakeholders. It found a significant "zone of proximal development gap" in ICT usage, acceptance and adoption in Pakistani higher education institutions compared to developed nations. However, it did not find significant differences in perceptions regarding issues like ICT demand and supply, causes of poor higher education standards, and challenges and solutions related to ICT integration. The study recommends its findings to help the Pakistani government in developing ICT policies for higher education.
This paper examines the impact of internet use on student performance. In this cross-sectional study, one hundred twenty survey responses were collected from plus two-level students from BirendranagarSurkhet. The respondents were selected from class 11 and 12 students randomly. Frequency of internet use, location of internet use, cooperation from teachers for internet learning and peer group influence on internet use for academic purpose has been analyzed with their academic performance.one sample t test was used to analyze the data. The finding concludes all these variables have positive impact if the student use internet for learning process. Similarly, the analysis shows that the student who used internet at home for learning purpose has found highest academic achievement.
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
1) The study examined awareness of safe and responsible internet use among 103 university students in Malaysia aged 19-24.
2) The findings showed that students felt somewhat safe online and had a good understanding of risky online activities and how to protect themselves.
3) However, students still recognized the importance of learning about internet safety, as they displayed some risky password practices and lacked parental controls at home.
Assessing the Readiness to Adopt E-Learning among Industrial Training Institu...IOSRJBM
E-learning is using computer and Internet to learn part of or full course whether it is in school, college or in any educational training. The use of e-learning has gained momentum in recent years contrasting to the under valuations done in the previous years. This study was undertaken to assess the readiness of the Industrial Training Institute (ITI) students to adopt e-learning platform. The constructs attitude, perceived ease of use, perceived benefits and behavioural intention from Technology Adoption Model are studied to attain the objective. It is a descriptive research and the population used for this study is Industrial Training Institutes (ITI) in Tamil Nadu. The data was collected from sample of 267 students. The findings of the research infer that the ITI students are willing to adopt the e-learning platform.
Internet_Use_Behavior_and_Attitude_of_College_Stud.pdfHải Quân
This document summarizes a study on the internet use behavior and attitudes of college students in Pakistan. Some key findings include:
- 89% of students had a computer at home and 59% had internet access at home. Only 20% had formal internet training.
- Most students (53%) used the internet 2-3 days a week at home to update their knowledge and communicate with others.
- Common reasons for internet use were to update knowledge, communicate, and make friends. Friends were the main source of help with internet problems.
- Popular internet services included Google, Yahoo, and email clients. Most students had 1-2 years of internet experience.
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Graduate students' attitude towards e learning a study case at imam universityDr. Ahmed Farag
In the past few years, a new wave of many technologies, particularly the Internet has emerged with the potential to further enhance the teaching and learning environment in higher education. Many studies in the recent years have shown that E-learning use in the classrooms has increased over the past years. However, the process of E-learning and its applications is limited in the Kingdom of Saudi Arabia. Through this empirical study, a limited research was initiated to track the perceptions of the students toward the E-learning. The results indicate an overall positive attitude towards the E-learning
This document summarizes a research study that examined the effects of electronic gadgets on students' academic performance at the secondary level in Islamabad, Pakistan. The study found that gadgets can have both positive and negative impacts on students. While gadgets may help with tasks like solving math problems, their excessive use can negatively impact students' health and performance. The study also found that gadgets help relieve stress and provide entertainment for students. It recommends that teachers provide guidance to students on positively using mobile devices and that schools provide awareness programs on managing gadget use.
The document discusses adherence to tech ethics among college students. It notes that while ICT has benefits for education, there are also negative impacts like cybercrime, hacking, plagiarism, and internet addiction when not used ethically. The document outlines various studies that found high percentages of students engaging in these unethical behaviors. It emphasizes that educators, parents, and institutions must play a role in teaching students to use technology responsibly and constructively by inculcating ethical values. This includes protecting systems, modeling good behavior, setting rules, and educating students and parents on social responsibilities regarding ICT use.
BARRIERS FOR FEMALES TO PURSUE STEM CAREERS AND STUDIES AT HIGHER EDUCATION I...IJCSES Journal
Background and context: Even when the modern world is transitioning quickly into the digital age, the
gender gap continues to be more acute. Social scientists note the low number of women in Science,
Technology, Engineering, and Maths (STEM) as a scientific, creative, economic, and innovative potential
loss. The importance of women’s participation in technical sciences and technical production is also
recognized as a factor for stable social development. Objective and method: A scoping review has been
conducted to study females’ reasonings and society-based explanations for females to choose STEM
studies at the Higher Education Institutions (HEI) level. The goal is to understand the reasons for the low
number of females in STEM careers related to education in STEM and to reveal the underlying
phenomenon. Results: The gender attitudes and stereotypes inherent in boy and girl children’s spare time
and school life narrow the children's possibilities from what specific education and career direction they
can choose. But only a few genetics and physical differences could postulate and explain this status quo.
Humans have formed a particular social framework; in the process, we have socialized childhood and
education. When choosing a future specialization, the society in which the child grew up, the family that
brought him up, and what traditions they invested in are much more important than his gender.
Implications: Based on our results, we summarise the scattered knowledge base and utilize the analyzed
summary for recommendations to further the development of HEI programs to make them more fitting for
both genders and help reduce the gender gap. The universities should cover the achievements of females,
more often in their media channels, related to the previously mentioned interest in STEM, based on the
presence of a role model. When choosing a university, girls can see a real example and be inspired to study
STEM majors
Barriers for Females to Pursue Stem Careers and Studies at Higher Education I...IJCSES Journal
Background and context: Even when the modern world is transitioning quickly into the digital age, the gender gap continues to be more acute. Social scientists note the low number of women in Science, Technology, Engineering, and Maths (STEM) as a scientific, creative, economic, and innovative potential loss. The importance of women’s participation in technical sciences and technical production is also recognized as a factor for stable social development. Objective and method: A scoping review has been conducted to study females’ reasonings and society-based explanations for females to choose STEM studies at the Higher Education Institutions (HEI) level. The goal is to understand the reasons for the low number of females in STEM careers related to education in STEM and to reveal the underlying phenomenon. Results: The gender attitudes and stereotypes inherent in boy and girl children’s spare time and school life narrow the children's possibilities from what specific education and career direction they can choose. But only a few genetics and physical differences could postulate and explain this status quo. Humans have formed a particular social framework; in the process, we have socialized childhood and education. When choosing a future specialization, the society in which the child grew up, the family that brought him up, and what traditions they invested in are much more important than his gender. Implications: Based on our results, we summarise the scattered knowledge base and utilize the analyzed summary for recommendations to further the development of HEI programs to make them more fitting for both genders and help reduce the gender gap. The universities should cover the achievements of females, more often in their media channels, related to the previously mentioned interest in STEM, based on the presence of a role model. When choosing a university, girls can see a real example and be inspired to study STEM majors.
The fast development of information, communication
and technologies (ICT) has initiated an unparalleled
transformation in universities all over the world. This
development of technology and learning is offering new
techniques to represent knowledge, new practices, and new global
communities of students. E -learning is now increasing as the
advance model for teaching and learning process in higher
education. However, the integration of e-learning system in
higher education is not an easy task because of some challenges.
The aim of this paper is to analyses the impacts of demographic
factors of students on their attitudes towards e-learning. Student
attitudes and beliefs towards e-learning are regarded as success
determinants of future e-learning initiatives. An analysis of
relationships between student attitudes towards e-learning and
their demographic characteristics: gender, study year, study
program and e-learning knowledge is also included. The study
was conducted for measuring the attitude of university students
towards e -learning in University of Tetovo by taking 223
students from different study program and different study year.
In this paper was used questionnaire to collect data from a
sample of undergraduate students. Statistical techniques are used
for the analyses of data. The result revealed that students’ have
high attitude towards e-learning and their attitude scores did not
differ significantly according to gender, but on the other hand
results indicate there was difference according to study year,
study program and e-learning knowledge of students . The
reported findings might be of interest to academics,
administrators, and decision-makers involved in planning,
developing and implementation of future e-learning strategies in
Macedonia and similar developing countries. The obtained data,
from such study, can provide information about what academic
institutions can do before implementing e-learning to reduce and
overcome the challenges in implementing e-learning in
universities.
This study aimed to analyze the contribution of Information and Communications Technology (ICT) basic skills to student social media utilization activities. Quantitative research was determined as a method with regression analysis. A total of 144 students selected randomly participated in this research. The research instrument used a five-scale questionnaire, consisting of 32 items of ICT skill instruments and 20 items for social media utilization instruments. The results showed a high level of ICT students' basic skills and social media use activities. There is a contribution of basic ICT skills to student social media utilization activities. The higher of the basic skill of ICT causes the higher the level of activity utilization of their social media. Research recommendations suggest efforts to improve students' basic ICT skills.
Usage of YouTube Content among Chennai Urban Women.pdfPugalendhiR
Abstract: The majority of YouTube users are college students, therefore it's critical to understand their usage patterns,
goals, and any potential psychological and behavioural effects. In order to determine the current trends in YouTube usage
among female undergraduate students in Chennai City, this study will examine the devices used, memberships subscribed
to, purposes used, and identity formation time spent networking, negative impacts experienced, and educational usage.
Data from a survey were analysed with SPSS-Statistic 19.0 software, and the findings were compared to the examined
literature. According to the survey, students' YouTube networking habits will eventually win out over parents' and
teachers' attitudes, and although while cell phones are currently prohibited in many college buildings, they will
undoubtedly be utilised in classrooms in the near future. The discoveries provide the current study in this area more depth.
This document summarizes a study that examined the relationship between internet addiction and academic performance among university undergraduates in Sri Lanka. The study found a statistically significant negative relationship, indicating that higher levels of internet addiction were associated with lower academic performance. It also found significant gender differences, with males showing higher levels of internet addiction than females. The study assessed internet addiction using a standardized test and measured academic performance via grade point average. It provides background on internet addiction research and factors that can influence addiction among university students.
Issues in Information SystemsVolume XII, No. 2, pp. 67-73-.docxvrickens
The document summarizes research into differences in ethical beliefs between undergraduate and graduate MIS students. A survey was conducted using ethical scenarios to test hypotheses about differences between the groups. Results found some significant differences between male and female CIS students' ethical beliefs, but no differences between MBA and MS-CIS graduate students. The researchers concluded that gender differences in ethical beliefs supported other findings about higher rates of unethical behavior in males.
COMPUTER USE BY SECONDARY SCHOOL PRINCIPALSsyaabdulrahman
This document summarizes a study that examined computer use by secondary school principals in Iran. The study aimed to identify how extensively principals used computers and explore factors related to their computer use. The researchers found that four factors significantly contributed to principals' level of computer use: high computer access, strong perceptions of the benefits of information and communication technology, high computer competence, and exhibiting transformational leadership behaviors. All four factors are important but have varying impacts on computer use. The study provides insight into improving computer integration by principals in the educational context of Iran.
Similar to It ethics undergraduates’ perception based on their awareness (20)
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
It ethics undergraduates’ perception based on their awareness
1. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
110
IT Ethics: Undergraduates’ Perception Based on their Awareness
Mubashrah Jamil*1
, Jamil Hussain Shah2
, Riaz-ul-Haq Tariq1
1. Department of Education, Bahauddin Zakariya University Multan, PO box 60800. Pakistan.
2. Department of Education, Mohiuddin Islamic University, AJK.
*
Email of the corresponding author: mubashrahj@yahoo.com
Abstract
Vide acceptance and use of computer and information technology in universities demanded the researchers and
teachers to train their students to use these resources ethically. In the universities of Pakistan, computer and IT
related courses have recently been included as compulsory subjects. Therefore, this research aimed to explore the
perceptions about ethical use of information technology (IT) by the undergraduate students from four different
public and private sector universities. A questionnaire was designed in which different computer and internet
related activities were given and students were required to respond in terms of Right, Wrong and Neither Right
Nor Wrong. Total 542 students participated in the study and the results were interpreted on the bases of their
demographic information. It was concluded that majority of the students were not previously trained and have no
knowledge about computer or IT ethics. It was found that female students, students from public sector
universities, from different departments of computing and IT and from the disciplines of pure sciences were
perceptually more positive regarding the ethical use of IT resources. Minimal differences were found across the
responses of students who have IT training certificates and prior knowledge of IT ethics. This suggests that
computer ethics awareness training is needed for university students.
Keywords: Computer ethics, IT ethics, Undergraduate Students, Education, Sciences vs Social Sciences, Male
vs Female, Public-sector vs Private-sector universities.
1. Introduction
Ethics are not similar to etiquettes or manners neither skills nor knowledge that might be necessary to undertake
an occupation (Alexandra & Miller, 2010) but in fact, in simple words, ethics is the question of right and wrong
in human conduct (Benn, 1998; Kizza, 2003). Advances in computer technology influenced by human conduct
(McCarthy, Halawi, Aronson, 2005) therefore, there is required to expand the definition of ethics to meet the
constantly changing technology-driven landscape of human conduct. In this regard, Zeid (2009) replied that
‘computer ethics deals with how to make moral decisions while using technology whether in workplace or in
society in general’. The social and ethical implications of technology demand special attention and have resulted
in the creation of ‘ethics’ (Rogerson, 1997; Goessl, 2008; Lee & Chan, 2008). Therefore, computer ethics (CE)
are the ethics regarding the use of the computer and IT (Masrom, Ismail, Hussein and Mohamed, 2010) where
“Cyber ethics”, “Cyber Laws”, “IT Ethics”, and “Internet ethics” as synonym or alternative terms when
associated with Internet (Bynum, 2008; Lee and Chan, 2008).
Vide acceptance and increased use of computer and information technology affected students learning in
universities. When students start interacting with technology, they start operating in a new world that has
unlimited access to the information which could affect either learning habits positively or negatively. Moreover,
they use computer and internet to prepare notes and presentation slides, assess themselves, draw graphs and
charts, email, chat and other activities during studies. In this regard Masrom, Ismail & Hussein (2008) explained
that ‘computer is one of the most important technological advances of 21st
century and has become an essential
component of teaching and learning in universities where students from all disciplines using it as a research and
communication tool’. The increased use of computers in education compels students to be knowledgeable about
computer ethics (CE) and the related social and legal issues so the rewards of technology can be accessible to all
(Ben-Jacob, 2005).
Therefore, the objective of this paper is to explore the perceptions about ethical use of information technology
(IT) by the undergraduate students from different public and private sector universities of Pakistan. Where,
training and use of computer and internet has been included as a compulsory subject in all the disciplines of
undergraduate studies. By reviewing the literature, it was found that the area of CE was too broader and was not
possible to cover all aspects of it in one study therefore at initial stage, survey was conducted to explore about
what extent do undergraduate students were aware of ethical use of computer and internet.
1.1. IT Ethics in Education
Lorents, Maris, Morgan and Neal (2006) explained that IT dependence across the business enterprise, increase
use of system generation operation for decision making and the lack of single unified code of ethics for all IT
professionals were the ignorant factors by the researchers. They were surveying students’ ethical attitudes
towards computer use. A survey was administered among 67 students of Management Information Systems
2. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
111
(MIS) course. 30 students filled the questionnaire online and 37 filled in a face-to-face mode with supplemental
materials. It was required to rate the behavior described in each scenario on a 7-point Likert scale i.e., very
ethical (1), ethical (2), somewhat ethical (3), questionable (4), somewhat unethical (5), unethical (6), and very
unethical (7). They depicted from the results that the median rank for all activities is in the range of somewhat
unethical to very unethical. Personal use of software or downloads was judged more as being just somewhat
unethical as was hacking into a computer system for reasons of intellectual curiosity. Malicious activity was
judged primarily in the unethical to very unethical range. Accessing other peoples records, changing code for
personal gain and causing reduced response time for a company that was believed to exploit its workers and was
unfriendly to the environment was viewed no more negatively than the same activity performed without
malicious intent.
Masrom, Ismail, Hussein & Mohamed (2010) explained that IT advancements without integrity and ethics are
pushing people towards wane i.e., gradually losing power or importance of IT applications; and at the same time
the chances of unethical use increases. These misuses and abuses of computer and technologies could harm
many individuals and society in terms of hacking, spam, denial of service attacks identity theft, and unauthorized
duplication of software (Kuzu, 2009). It is important for educators that they should firmly educate their students
about the difference between uses and abuses of IT and how could we get benefit by using it under the
boundaries of ethics. Ideally, evaluating an educational contribution to ethical development would begin with
finding a suitable method for measuring significant changes in students’ attitudes, affective responses and
behaviors between start and completion of the educational intervention (Jiggar and Strain, 2007).
Young (2009) conducted a survey to examine whether gender differences influence the degree to which
individuals recognize unethical conduct in the use of information technology at work. Total 451 employees were
included in the study in which 46% were male and 54% were female. The average age of males was 29 year and
females were 28. Results indicated that 39% male and 38% female expressed that personal use of internet at
work is not unethical. Most common activities for male respondents were personal email (78%), instant
messaging (59%), online pornography (58%), music downloading (52%) and gaming (51%) the most. The least
common activities used were chat rooms (22%), online auctions (24%), online shopping (24%), stock watching
(8%) and internet gambling (6%). On the other hand, females were personal email (76%), instant messaging
(57%), and music downloading (47%). The least common activities were gamming sites (40%), online shopping
(31%), online auctions (22%), chat rooms (20%), stock watching (5%), and internet gambling (4%). Author
concluded that there were no significant gender differences in the perception of unethical behavior in internet use.
Masrom, Ismail & Hussein (2009) conducted a study to investigate the ethical awareness of computer use among
undergraduate students at two public sector Malaysian universities. They used questionnaire as a tool to measure
159 undergraduate students’ ethical awareness of computer use. They found in their study that male students and
senior undergraduate students’ beliefs were clearer about ethical perceptions on computer use ethics. They
recommended that universities must arrange workshops on computer ethics for all computer users in the
universities and also conduct periodic computer ethics surveys to monitor the awareness of computer users on
campus, as well as include a special section on computer ethics in the university training programs.
Teston (2008) reported that 48% of elementary and middle school students believe software piracy is legal. He
investigated undergraduate technology students’ understanding regarding software piracy. Total 237 valid
subjects were involved in his study. He designed a survey instrument, which was consisted of various dilemma
stories in two different sections in order to measure ethical values. Regarding the students’ software piracy
attitudes, he found that the attitudes of the technology education exploratory group were not significantly
different from those measured originally in a general middle school population. Teston’s 2002 study found 51.9%
in favor of piracy acts and the present study found 52.3% in favor. The technology education students report
significantly higher rates of actual piracy behaviors. General middle school students reported 45.8% for copied
software CDs and 53.4% for pirated installations (Teston, 2002). In contrast, the technology education middle
school students reported 68.3% for copied software and 61.6% for pirated installations, 22.5 and 8.2 increases
respectively. Perhaps technology education students were simply higher consumers of software given their
interests and exposure.
According to Irons (2007), ‘teaching computer ethics to students requires raising the students’ awareness of
ethical issues providing students with the underpinning ethical theory to understand the ethical implications of
their actions and providing students with the tools to analyze and evaluate ethical dilemmas’. In this regard,
Masrom, Ismail & Hussein (2009) conducted a study to investigate the ethical awareness of computer use among
undergraduate students at two public sector Malaysian universities. They used questionnaire as a tool to measure
159 undergraduate students’ ethical awareness of computer use. They found in their study that male students and
senior undergraduate students’ beliefs were clearer about ethical perceptions on computer use ethics. They
recommended that universities must arrange workshops on computer ethics for all computer users in the
universities and also conduct periodic computer ethics surveys to monitor the awareness of computer users on
3. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
112
campus, as well as include a special section on computer ethics in the university training programs.
Many higher educational institutions in Pakistan have incorporated IT based courses into their curriculum in
order to provide knowledge of computer and IT to their students either undergraduates or graduates. As a result,
these IT literate students are practically more beneficial for society. But in turn, it also increased the use of
computers for illegal purpose or unethical activities such as unauthorized access and use of computer systems. In
Pakistan, computer ethics or IT ethics is not offered as an individual subject, but rather the topic is integrated in
some related course, such as the Computer Applications in Education and Computer Literacy courses. In this
instance, computer ethics are becoming increasingly relevant topic of study. Therefore, this study was conducted
to perceive the ethical awareness about proper usage of computer and IT by undergraduate students before
further experimentations in this regard.
2. Research Hypotheses
The research hypotheses were as under:
• H1: Undergraduate students from public-sector universities showed positive ethical perceptions in the
use of IT.
• H2: Undergraduate male students’ have positive ethical perceptions in the use of IT.
• H3: Undergraduate students from rural areas have positive ethical perceptions in the use of IT.
• H4: Undergraduate students from the disciplines of Social Sciences have positive ethical perceptions in
the use of IT.
• H5: Undergraduate students from the disciplines of computing and IT have positive ethical perceptions
in the use of IT.
• H6: IT training certificates influenced positively on undergraduate students’ attitude towards the ethical
use of IT.
• H7: Prior knowledge of IT ethics influenced positively on undergraduate students’ attitude towards the
ethical use of IT.
3. Research Methodology
3.1. Tool of the Study: By nature the study was descriptive; therefore, a self-reported questionnaire was
designed to collect data from undergraduate students during the semesters of 2011 – 12 from two public
and two private sector universities (i.e., Public Sector Universities: Bahauddin Zakariya University
(BZU) Multan & University of Education (UoE); Private Sector Universities: Superior Group of
Colleges (Multan Campus) & Institute of Southern Punjab (Multan campus)). The research was greatly
inspired by the studies of Etter, Cramer and Finn (2006), Siegfried and Ashley (2006) and Masrom,
Ismail & Hussein (2009). Questionnaire had two parts, which were designed to solicit responses. Part –
I was designed to collect students’ demographic information which included: university, major subject
in which the students were actually enrolled, gender, area, computer training certificate and prior
knowledge about computer and IT ethics (see Table 1). While, Part – II was comprised of 18 statements
in which respondents were required to respond for the given statement in terms of Right, Wrong and
Neither Right Nor Wrong. In all statements, some activities/conditions related to the ethical use of
computer and internet were given, which helped to portray their awareness about the ethical use of
computer or IT.
3.2. Data Analysis: The scale was rated from 1 to 3 i.e., 1 = Right, 2 = Wrong and 3 = Neither Right Nor
Wrong (NRNW). The collected responses were fed in SPSS 15.0 and were analyzed demographically.
Statistically, weighted arithmetic mean, standard deviations and independent sample t-test at α = 0.05
were used to conclude the results. The Cronbach Alpha test was used to measure the reliability of the
items in the tool. Result of the reliability test was 0.73, and hence was acceptable (Gliem and Gliem,
2003).
3.3. Sampling & Respondents: All the four universities were delimited on the bases of convenience based
sampling. Regarding the private sector universities, only those were included in the study, which were
recognized as degree awarding institution by Higher Education Commission Pakistan. All those
undergraduate students who were in semesters 3 and 4 during January – December 2012, constituted the
population of this study. These semesters were delimited because basic computer and internet training
courses were compulsory for all students in these two semesters. The questionnaires were distributed
among the students within their classrooms to ensure the maximum feedback, which resulted for 542.
Therefore, 542 students were considered to be the sample of the study. Students’ detailed response rate
is given in Table 1 (see appendix). It was depicted from the table that students from public sector
universities (56%), urban areas (76%), were greater in term of frequencies and percentages. But male
and female students, pure sciences and social sciences and students from Languages and IT subjects
4. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
113
were equal quantitatively. Total 53% admitted that they have no IT training certificate and 58%
disclosed that they have no prior knowledge of IT or computer ethics.
4. Results
Data analyses and discussion of the result were made in the light of research hypotheses stated in the outset.
• H1: Undergraduate students from public-sector universities have positive ethical perceptions in the use of IT.
Table 2 showed statistically significant results for the statements 5, 7, 8, 12 and 15 between the public (n=301)
and private (n=241) sector institutions. It was portrayed from the results that average responses of public sector
universities students strongly believe that chatting during examinations either through cell or internet is wrong; it
is unethical to argue the teacher about an assignment which was not actually attached through an email, they
were more conscious about the copy right acts of the material downloaded from the internet (Siegfried, 2004;
Cohen and Cornwell, 1998) and they believe that cheap access of IT resources is one of the reasons for its
misuse. Calculated values of SD showed that the responses of students from private sector universities were
perceptually varying from each other as compared to public sector students, which means they were having
varying attitude toward the ethical use of IT resources.
• H2: Undergraduate male students’ have positive ethical perceptions in the use of IT.
It was revealed from Table 3 (see appendix) that the results were significantly different at α=95% with df=540
between male (n=271) and female (n=271) undergraduate students for statements of 5, 8, 17 and 18. The
difference of opinion was found in their responses as: copying and pasting essays from internet; unauthorized
sharing of music and movies (Siegfried & Ashley, 2006) and copying an abstract rather reading the whole
manuscript is wrong. Overall, the average responses (above 1.50 and less than 2.50) of both male and female
students indicated that the activities given in the statements regarding the ethical use of IT were WRONG which
in turn showed their positive attitudes towards the ethical use of IT (Young, 2009). But, averages of female
students were higher than that of male students in all statements of Table 3. Calculated values of SD confirmed
that female students were perceptually more integrated regarding the ethical use of IT than to male students.
• H3: Undergraduate students from rural areas have positive ethical perceptions in the use of IT.
It was depicted from Table 4 (see appendix) that the IT ethics awareness by the undergraduate students
belonging to urban (n=411) and rural (n=131) areas were significantly different at α=95% with df=540 for
statements 3, 4, 5, 6, 9, 10, 11, 12, 15 and 18. These statements were related to software piracy and copyright act
of the copied material either from internet or from printed mode. Calculated averages for the responses of urban
students were higher than to the average responses of rural students and hence, were more conclusive regarding
the ethical use of IT. Urban students strongly admitted that getting training or information about ethical use of
computer and other IT resources is important. In statement 15, the average value of urban students were 1.54 (i.e.,
greater than 1.50) and slightly tended towards WRONG and average responses of rural students were 1.38 (i.e.,
less than 1.50) which was slightly leading towards RIGHT. The difference between the opinions of urban and
rural students was due to the availability and accessibility of IT resources in their areas. But, were relatively
inexpensive to purchase and use the same at their own. Therefore, they believe that economically cheap access of
computer and technologies make it easier to perform different wrong activities. Overall, majority of the urban
students were more conscious about copyright acts of the content either downloaded through internet or copied
from printing media.
• H4: Undergraduate students from the disciplines of Social Sciences have positive ethical perceptions in the
use of IT.
Table 5 (see appendix) demonstrated that the attitudinal differences between pure sciences (n=180) and social
sciences (n=180) students were significantly different at α=95% with df=540 for statements 9 and 15. They
disclosed that it is unethical to receive an email from their friends regarding the information about the questions
that they have just attempted in their examinations and now help them to make a guess for them is ethically
wrong (Etter, Cramer & Finn, 2006). From the table it was clear that the average responses of pure sciences
students were higher than to social sciences students and were helpful to understand their awareness in using IT
resources ethically.
• H5: Undergraduate students from the discipline of Computing and IT have positive ethical perceptions in
the use of IT.
Table 6 (see appendix) showed that the attitudinal differences between the students of Languages disciplines
and IT were significantly different at α=95% with df=540 for statements 5 and 7. The value of t-test was 0.000 in
statement 11 because there was no statistical difference between the average results of their responses. The
average responses of students from the disciplines of Languages were higher than to students from IT and were
clearer to understand their awareness in using IT resources ethically.
• H6: IT training certificates have influenced positively on undergraduate students’ attitude towards the
ethical use of IT.
5. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
114
Table 7 (see appendix) showed that the attitudinal differences between those students who have IT training
certificate and those who have not were significantly different at α=95% with df=540 for statements 7, 10, 11
and 12. Although, the average responses of those students who were having IT training certificates were slightly
higher than to their competitive group because the responses were also conclusive of those students who have no
IT training certificates.
• H7: Prior knowledge of IT ethics have influenced positively on undergraduate students’ attitude towards the
ethical use of IT.
Table 8 (see appendix) illustrated that the attitudinal differences between the students who have studied and
haven’t studied Computer ethics or IT ethics as a subject were significantly different at α=95% with df=540 for
statements 3. Overall the average responses of those students who have prior knowledge of computer ethics or IT
ethics were slightly better than those who have not.
5. Conclusions
From the above results, it was concluded that majority of the students have not received training from any
educational institution for using computer, internet and other IT resources and hence therefore have no proper
knowledge or information about computer or IT ethics. The results also helped to declare that students from
public sector universities (H1) and from different computing and IT departments were perceptually more
positive and clearer about ethical use of computer and information technological resources and hence, therefore,
hypotheses H1 and H5 were accepted. On the other hand, female students, students from urban areas and from
social sciences disciplines were perceptually positive and were knowledge-full about the ethical use of computer
and IT resources. Therefore, hypotheses H2, H3 and H4 were rejected on the bases of the above results.
Although there were no drastic differences in the calculated values of average responses of those students who
have either IT training certificates or some prior knowledge about IT; even then, hypotheses H6 and H7 were
accepted. These results also revealed that IT trainings and knowledge about IT ethics have not been very affected
upon students’ practices regarding the use of computer and IT resources.
Cohen and Cornwell (1989) suggested that integrating computer ethics topics into the computer science and
information technology curricula is more effective in terms of making students aware of ethical concerns in IT.
Therefore, it is highly recommended that add computer or IT ethics as a chapter, topic or sub-topic in the
curricula of those subjects of undergraduate studies in which computer and IT were being taught as compulsory
subjects. Moreover, special seminars, and workshops should be arranged in the universities to highlight the
importance and need of knowledge and information about computer or IT ethics.
References
Alexandra, A., & Miller, S. (2010). Law, Ethics and Governance Series: Integrity Systems for Occupations.
England: Asgate. PP: 61, and 113.
Ben-Jacob, M. G. (2005). Integrating Computer Ethics across the Curriculum: A Case Study. Educational
Technology & Society, 8(4), 198 – 204.
Benn, P. (1998). Ethics. London: UCL Press. PP: 1-5.
Bynum, T. W. (2008). Computer and Information Ethics. Retrieved on December 12, 2011 from
http://stanford.library.usyd.edu.au/entries/ethics-computer/
Cohen, E., and Cornwell, L. (1989). College students believe piracy is acceptable. CIS Educator Forum, 1(3), 2
– 5.
Etter S., Cramer J. J., and Finn, S. S. (2006). Origins of academic dishonesty: Ethical orientations and
personality factors associated with attitudes about cheating with information technology. Journal of Research on
Technology in Education, 39(2), 133 – 155.
Gliem, J. A., and Gliem, R. R. (2003). Calculating, Interpreting and Reporting Cronbach’s Alpha Reliability
Coefficient for Likert Type Scales. Retrieved from
https://scholarworks.iupui.edu/bitstream/handle/1805/344/Gliem%20&%20..?sequence=1
Goessl, L. (2008). How Computer Ethics Impact Society. Retrieved from http://www.helium.com/items/845336-
how-computer-ethics-impact-society
Irons, A. (2007). Teaching Computer Ethics to Computer Forensics Students. Retrieved on November 23, 2011
from http://www.ics.heacademy.ac.uk/events/8th-annual-conf/Papers/Alastair%20Irons.pdf
Jaggar, S. & Strain, J. (2007). Assessing students’ ethical development in computing with the defining issues test:
Challenges to be addressed. Journal of Information, Communication and Ethics in Society. 5(1), 33 – 42.
Kizza, J. M. (2003). Ethical and Social Issues in the Information Age (2nd
Edition). New York: Springer. PP: 38
– 48.
Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. The
Turkish Journal of Educational Technology – TOJET. ISSN: 1303-6521, 8(2), Article 9.
6. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
115
Lee, W. W. & Chan, K. C. C. (2008). Computer Ethics: A Potent Weapon for Information Security Management.
Retrieved from http://www.isaca.org/Journal/Past-Issues/2008/Volume-6/Documents/jpdf0806-computer-
ethics.pdf
Lorents, A. C., Maris, J. M., Morgan, J. N. and Neal, G. L. (2006). Ethics of Computer Use: A Survey of Student
Attitudes. Retrieved from http://www.franke.nau.edu/Faculty/Intellectual/workingpapers/pdf/Morgan_Ethics.pdf
Masrom, M., Ismail, Z., Hussein, R. (2008). Computer ethics awareness among undergraduate students in
Malaysian Higher Education Institutions. 19th
Australasian Conference on Information Systems. Retrieved from
http://aisel.aisnet.org/acis2008/41/. 628 - 637.
Masrom, M., Ismail, Z. and Hussein, R. (2009). Ethical Awareness of Computer Use Among Undergraduate
Students. ACM SIGCAS Computers and Society, 39(1), 27 – 40.
Masrom, M., Ismail, Z., Hussein, R., & Mohamed, N. (2010). An Ethical Assessment of Computer Ethics using
Scenario Approach. International Journal of Electronic Commerce Studies. 1 (1), 25 – 36.
McCarthy, R. V., Halawi, L., & Aronson, J. E. (2005). Information Technology Ethics: A Research Framework.
Issues in Information Systems, VI (2). Pages: 64 – 69.
Rogerson, S. (1997). Ethics and information technology. AJIS. 4 (2), 125 – 126.
Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer ethics. Retrieved
from http://home.adelphi.edu/~siegfried/ETIN2004.pdf
Siegfried, R. M., Ashley, A. S. (2006). Is it theft or sampling? Student attitudes on the copying of commercial
software and music. Retrieved from
http://www.academia.edu/2807904/Is_it_theft_or_sampling_Student_attitudes_on_the_copying_of_commercial
_software_and_music
Teston, G. (2008). Software Piracy among Technology Education Students: Investigating Property Rights in a
Culture of Innovation. Journal of Technology Education, 20 (1), pp: 66 – 78.
Young, K. S. (2009). Computer Ethics: Gender Effects and Employee Internet Misuse. Issues in Information
Systems, X(2), 598 – 603.
Zeid, A. (2009). Using Creative Methods for Teaching Professional Ethics for Computer Science Students. First
Kuwait Conference on E-Services and E-Systems on November 17-19. Retrieved from
http://portal.acm.org/citation.cfm?id=1836047.
Appendices Table 1: Overall Sampled Students’ Demographic Information
Categories Groups N (%)
Gender
Female 271 (50%)
Male 271 (50%)
Universities
Public Sector 301 (56%)
Private Sector 241 (45%)
Major Subjects
Pure Sciences (PS) 180 (33%)
Social Sciences (SS) 180 (33%)
Languages (Lang.) 091 (17%)
Computer & IT 091 (17%)
Area
Rural 131 (24%)
Urban 411 (76%)
Computer or IT Training Certificate
Yes 256 (47%)
No 286 (53%
Prior Knowledge of Computer Ethics (CE)
Yes 225 (42%)
No 317 (58%)
7. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
116
Table 2: Comparison of IT Ethics Awareness by Universities
Sr.
#
Statements
Public-Sector Private-Sector t. Test
α=0.05Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.36 0.630 1.27 0.487 1.888
2.
Downloading music or movies from net is: 1.75 0.775 1.76 0.856 -0.121
3. Information about ethical use of computer and
technology is important:
1.14 0.458 1.22 0.596 -1.702
4. Buying a paper online and submitting it as your
own is:
1.79 0.594 1.69 0.631 1.930
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.79 0.594 1.69 0.625 1.996
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.88 0.415 1.83 0.486 1.412
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra
time to complete the work is:
1.96 0.590 1.76 0.646 3.713
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
1.98 0.547 1.81 0.610 3.434
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.73 0.539 1.75 0.595 -0.413
10. Copying two lines from a printed source without
acknowledging the source is:
1.97 0.647 1.93 0.587 0.772
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
1.97 0.647 1.93 0.587 -1.136
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.89 0.674 1.73 0.764 2.603
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create
a paper with acknowledgement to the sites in your
bibliography.
1.55 0.644 1.54 0.644 0.287
14. Using internet chat rooms to ask assignment related
questions is:
1.31 0.583 1.30 0.595 0.054
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.44 0.638 1.59 0.732 -2.545
16. Unauthorized sharing of original software with
friends is:
1.90 0.496 1.85 0.591 0.904
17. Unauthorized sharing of music and movies files
with friends is:
1.98 0.594 1.97 0.785 0.224
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
1.93 0.734 1.83 0.681 1.566
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
8. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
117
Table 3: Comparison of IT Ethics Awareness by Gender
Sr.
#
Statements
Female Male t. Test
α=0.05Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.32 0.556 1.31 0.590 0.300
2.
Downloading music or movies from net is: 1.70 0.805 1.81 0.817 -1.537
3. Information about ethical use of computer and
technology is important:
1.21 0.559 1.15 0.487 1.310
4. Buying a paper online and submitting it as your
own is:
1.78 0.603 1.71 0.621 1.404
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.82 0.601 1.67 0.614 2.899
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.88 0.423 1.83 0.472 1.342
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra
time to complete the work is:
1.90 0.587 1.84 0.656 1.035
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
1.99 0.523 1.82 0.625 3.279
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.72 0.567 1.76 0.562 -0.837
10. Copying two lines from a printed source without
acknowledging the source is:
1.99 0.605 1.91 0.634 1.524
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
2.01 0.683 1.99 0.688 0.501
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.83 0.705 1.80 0.733 0.478
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create
a paper with acknowledgement to the sites in your
bibliography.
1.56 0.658 1.53 0.648 0.592
14. Using internet chat rooms to ask assignment related
questions is:
1.30 0.572 1.31 0.604 -0.365
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.47 0.654 1.54 0.713 -1.130
16. Unauthorized sharing of original software with
friends is:
1.90 0.493 1.85 0.584 1.113
17. Unauthorized sharing of music and movies files
with friends is:
2.09 0.672 1.86 0.680 3.941
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
1.95 0.668 1.82 0.749 2.119
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
9. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
118
Table 4: Comparison of IT Ethics Awareness by Area
Sr.
#
Statements
Rural Urban t. Test
α=0.05Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.34 0.552 1.31 0.580 0.600
2.
Downloading music or movies from net is: 1.80 0.798 1.74 0.816 0.759
3. Information about ethical use of computer and
technology is important:
1.31 0.680 1.13 0.457 3.436
4. Buying a paper online and submitting it as your
own is:
1.63 0.571 1.78 0.621 -2.410
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.64 0.596 1.78 0.613 -2.287
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.77 0.473 1.88 0.437 -2.507
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra
time to complete the work is:
1.84 0.654 1.88 0.613 -0.618
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
1.84 0.666 1.92 0.551 -1.456
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.60 0.579 1.79 0.553 -3.396
10. Copying two lines from a printed source without
acknowledging the source is:
1.82 0.601 1.99 0.623 -2.638
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
1.88 0.702 2.04 0.676 -2.353
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.61 0.697 1.88 0.714 -3.791
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create
a paper with acknowledgement to the sites in your
bibliography.
1.47 0.624 1.57 0.660 -1.586
14. Using internet chat rooms to ask assignment related
questions is:
1.31 0.596 1.30 0.586 0.191
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.38 0.601 1.54 0.706 -2.317
16. Unauthorized sharing of original software with
friends is:
1.84 0.493 1.89 0.555 -0.937
17. Unauthorized sharing of music and movies files
with friends is:
1.96 0.695 1.98 0.682 -0.237
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
1.78 0.671 1.92 0.722 -2.015
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
10. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
119
Table 5: Comparison of IT Ethics Awareness by Subjects (i.e., Pure and Social Sciences)
Sr.
#
Statements
Pure Sciences Social Sciences t. Test
α=0.05Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.31 0.542 1.28 0.542 0.486
2.
Downloading music or movies from net is: 1.82 0.785 1.72 0.779 1.281
3. Information about ethical use of computer and
technology is important:
1.26 0.617 1.12 0.426 2.483
4. Buying a paper online and submitting it as your
own is:
1.76 0.592 1.70 0.642 0.939
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.77 0.608 1.67 0.633 1.444
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.84 0.412 1.82 0.498 0.346
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra
time to complete the work is:
1.88 0.556 1.82 0.713 0.907
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
1.86 0.567 1.84 0.567 0.279
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.64 0.515 1.86 0.567 -3.892
10. Copying two lines from a printed source without
acknowledging the source is:
1.91 0.645 1.95 0.637 -0.575
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
1.97 0.708 1.98 0.717 -0.148
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.71 0.691 1.82 0.721 -1.493
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create
a paper with acknowledgement to the sites in your
bibliography.
1.49 0.621 1.51 0.647 -0.332
14. Using internet chat rooms to ask assignment related
questions is:
1.26 0.530 1.30 0.588 -0.754
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.36 0.575 1.54 0.727 -2.733
16. Unauthorized sharing of original software with
friends is:
1.84 0.505 1.87 0.539 -0.504
17. Unauthorized sharing of music and movies files
with friends is:
1.97 0.668 1.84 0.644 1.847
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
1.84 0.678 1.83 0.766 0.073
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
11. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
120
Table 6: Comparison of IT Ethics Awareness by Subjects (i.e., Languages and IT)
Sr.
#
Statements
Languages IT t. Test
α=0.05Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.30 .568 1.42 0.684 -1.297
2.
Downloading music or movies from net is: 1.75 0.851 1.70 0.888 0.341
3. Information about ethical use of computer and
technology is important:
1.12 0.468 1.20 0.542 -1.025
4. Buying a paper online and submitting it as your
own is:
1.86 0.625 1.69 0.571 1.857
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.96 0.556 1.65 0.584 3.638
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.86 0.410 1.96 0.445 -1.559
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra
time to complete the work is:
2.04 0.595 1.78 0.554 3.096
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
2.01 0.568 2.00 0.632 0.123
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.80 0.542 1.64 0.624 1.903
10. Copying two lines from a printed source without
acknowledging the source is:
2.03 0.623 1.93 0.533 1.151
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
2.05 0.639 2.05 0.621 0.000
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.96 0.729 1.89 0.737 0.607
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create
a paper with acknowledgement to the sites in your
bibliography.
1.62 0.969 1.65 0.673 -0.325
14. Using internet chat rooms to ask assignment related
questions is:
1.34 0.619 1.37 0.661 -0.347
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.52 0.673 1.69 0.756 -1.658
16. Unauthorized sharing of original software with
friends is:
1.91 0.551 1.92 0.601 -0.129
17. Unauthorized sharing of music and movies files
with friends is:
2.05 0.705 2.18 0.724 -1.141
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
2.00 0.650 1.98 0.843 0.217
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
12. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
121
Table 7: Comparison of IT Ethics Awareness Influenced by IT Training Certificates
Sr.
#
Statements
IT Certificate
(Yes)
IT Certificate
(No) t. Test
α=0.05
Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.36 0.617 1.28 0.527 1.770
2.
Downloading music or movies from net is: 1.80 0.828 1.71 0.796 1.254
3. Information about ethical use of computer and
technology is important:
1.14 0.456 1.21 0.579 -1.534
4. Buying a paper online and submitting it as your
own is:
1.74 0.629 1.75 0.598 -0.115
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.76 0.597 1.74 0.625 0.381
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.87 0.428 1.84 0.466 0.737
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra
time to complete the work is:
1.94 0.617 1.81 0.622 2.434
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
1.95 0.572 1.86 0.588 1.862
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.75 0.516 1.73 0.605 0.396
10. Copying two lines from a printed source without
acknowledging the source is:
2.01 0.635 1.89 0.603 2.257
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
2.07 0.674 1.94 0.691 2.142
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.89 0.698 1.74 0.731 2.433
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create
a paper with acknowledgement to the sites in your
bibliography.
1.55 0.649 1.54 0.657 0.087
14. Using internet chat rooms to ask assignment related
questions is:
1.27 0.563 1.33 0.608 -1.162
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.48 0.656 1.52 0.709 -0.687
16. Unauthorized sharing of original software with
friends is:
1.90 0.487 1.96 0.647 0.983
17. Unauthorized sharing of music and movies files
with friends is:
1.87 0.738 1.90 0.689 -0.300
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
1.88 0.863 1.85 0.873 -0.506
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
13. Journal of Education and Practice www.iiste.org
ISSN 2222-1735 (Paper) ISSN 2222-288X (Online)
Vol.4, No.12, 2013
122
Table 8: Comparison of IT Ethics Awareness Influenced by Prior Knowledge of Ethics
Sr.
#
Statements
IT Ethics
Knowledge (Yes)
IT Ethics
Knowledge (No) t. Test
α=0.05
Avg.* SD.** Avg. SD.
1. Copying original software for education purposes
is:
1.37 0.642 1.28 0.516 1.749
2.
Downloading music or movies from net is: 1.74 0.822 1.76 0.803 -0.352
3. Information about ethical use of computer and
technology is important:
1.12 0.421 1.22 0.585 -2.154
4. Buying a paper online and submitting it as your own
is:
1.71 0.629 1.78 0.599 -1.287
5. Copying and pasting an essay from the Internet and
submitting it as your own is:
1.74 0.586 1.75 0.629 -0.205
6. Copying file on disk/CD containing complete
assignment from a friend and submitting the work
with your name is:
1.87 0.463 1.85 0.439 0.474
7. Claiming to have attached an assignment to an
email when you did not – in order to have extra time
to complete the work is:
1.86 0.603 1.88 0.638 -0.346
8. Carrying on an instant message conversation while
taking a(n) computerized exam is:
1.92 0.550 1.89 0.605 0.693
9. Receiving and using an email from a friend about
the questions on an exam he/she just completed is:
1.78 0.519 1.71 0.593 1.428
10. Copying two lines from a printed source without
acknowledging the source is:
2.00 0.609 1.91 0.628 1.778
11. Copying and pasting one sentence from an online
source without acknowledging the source is:
2.06 0.665 1.96 0.698 1.784
12. Changing a few words of paragraph copied and
pasted from the internet, so that the material does
not have to be cited is:
1.87 0.681 1.78 0.744 1.406
13. Using a series of paragraphs that have been copied
and pasted from a variety of internet sites to create a
paper with acknowledgement to the sites in your
bibliography.
1.60 0.647 1.50 0.655 1.782
14. Using internet chat rooms to ask assignment related
questions is:
1.30 0.588 1.31 0.589 -0.092
15. Economically cheap access of computer and
technology makes it easier to perform different
wrong activities:
1.51 0.676 1.50 0.692 0.164
16. Unauthorized sharing of original software with
friends is:
1.89 0.483 1.87 0.579 0.395
17. Unauthorized sharing of music and movies files
with friends is:
1.91 0.655 2.02 0.703 -1.808
18. Writing a summary based on an online abstract of a
journal article rather than reading the article itself
is:
1.90 0.715 1.88 0.711 0.290
* Avg. = Average** SD. = Standard Deviation Value of t Test at α=0.05 is 1.96
14. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar