Poh Soon JosephNg, Xiaoxue Gong, Narinderjit Singh, T. Sam, Hua Liu, K. Y. Phan
With the advancement of technology, the metaverse image is used to improve the success rate of surgical. The purpose of this study was to understand the acceptance of extended reality surgery by different populations of medical experts and patients. The main reason for using a triangular mixed model for the study is because of the small amount of relevant research data for this study, quantitative research, exploratory research, and cross-sectional research can avoid some human interference and reduce error. The results of the study data showed that the image model, interaction design, surgeon, and clarity of use of the head-mounted display with metaverse technology by the expert group were conducive to improved surgical success rates. Metaverse surgery offers opportunities for modern digital surgery and can effectively improve the expert's ability to promote the smoothness of physical indicators during the procedure. This study is pioneering the role of a metaverse in facilitating surgery from the dual perspective of medical experts and patients.
{"title":"Beyond Your Sight Using Metaverse Immersive Vision With Technology Behaviour Model","authors":"Poh Soon JosephNg, Xiaoxue Gong, Narinderjit Singh, T. Sam, Hua Liu, K. Y. Phan","doi":"10.4018/jcit.321657","DOIUrl":"https://doi.org/10.4018/jcit.321657","url":null,"abstract":"With the advancement of technology, the metaverse image is used to improve the success rate of surgical. The purpose of this study was to understand the acceptance of extended reality surgery by different populations of medical experts and patients. The main reason for using a triangular mixed model for the study is because of the small amount of relevant research data for this study, quantitative research, exploratory research, and cross-sectional research can avoid some human interference and reduce error. The results of the study data showed that the image model, interaction design, surgeon, and clarity of use of the head-mounted display with metaverse technology by the expert group were conducive to improved surgical success rates. Metaverse surgery offers opportunities for modern digital surgery and can effectively improve the expert's ability to promote the smoothness of physical indicators during the procedure. This study is pioneering the role of a metaverse in facilitating surgery from the dual perspective of medical experts and patients.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42972772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increased cyberattack frequency and ferocity have alerted the fintech industry in detecting existential security threats and risks. Various authentication mechanisms have been deployed to countermeasure cyberattacks; whether these deployed solutions fulfil the security and technical standards has not been significantly investigated. This article proposed an uAuth security analytics framework to evaluate the deployed user authentication mechanisms. Subsequently, the technical evaluation study covered ten major commercial banks in Malaysia, whereas 120 respondents aged 18 to 25 participated in the user awareness study. The result found that mobile banking enforces more robust user authentication mechanisms than internet banking in Malaysia. As 80% of the Malaysia fintech systems only ranked as Level 3 of the uAuth security analytics framework, the authors urge Malaysia fintech industry to enhance their authentication factor, login and transaction verification methods, password policy, as well as readiness for quantum-safe security technologies.
{"title":"An Evaluation Study of User Authentication in the Malaysian FinTech Industry With uAuth Security Analytics Framework","authors":"S. Tan, G. Chung","doi":"10.4018/jcit.318703","DOIUrl":"https://doi.org/10.4018/jcit.318703","url":null,"abstract":"The increased cyberattack frequency and ferocity have alerted the fintech industry in detecting existential security threats and risks. Various authentication mechanisms have been deployed to countermeasure cyberattacks; whether these deployed solutions fulfil the security and technical standards has not been significantly investigated. This article proposed an uAuth security analytics framework to evaluate the deployed user authentication mechanisms. Subsequently, the technical evaluation study covered ten major commercial banks in Malaysia, whereas 120 respondents aged 18 to 25 participated in the user awareness study. The result found that mobile banking enforces more robust user authentication mechanisms than internet banking in Malaysia. As 80% of the Malaysia fintech systems only ranked as Level 3 of the uAuth security analytics framework, the authors urge Malaysia fintech industry to enhance their authentication factor, login and transaction verification methods, password policy, as well as readiness for quantum-safe security technologies.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48252900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-01DOI: 10.4018/JCIT.20211001.OA8
Miguel Eduardo Torres Moreno, Jairo Hernan Aponte Melo
{"title":"Assessing Business-IT Alignment Maturity at a Colombian University","authors":"Miguel Eduardo Torres Moreno, Jairo Hernan Aponte Melo","doi":"10.4018/JCIT.20211001.OA8","DOIUrl":"https://doi.org/10.4018/JCIT.20211001.OA8","url":null,"abstract":"","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70478749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.4018/JCIT.20210401.OA6
Hanan A. R. Akkar, Huthaifa Salman Khairy
Portable robots are considered an important device in many areas such as in medical, space research, emergency situations, applications, etc. The robots complete tasks efficiently and effectively without any human interaction. The most important advantages of portable robots are their small size and very high speed in problem processing with relatively high accuracy and efficiency compared with constant devices. In this paper, the authors discussed the applications of the robot systems based on swarm intelligent controller and field programmable gate array (FPGA). A component-oriented FPGA design platform is proposed for robot system integration because FPGAs are known to be power-efficient hardware platforms. From the results, they found that FPGA and swarm intelligence are very efficient in robotic systems and used in a wide area of applications.
{"title":"Design of a Field Programmable Gate Array for Swarm Intelligent Controller Based on a Portable Robotic System: Review Study","authors":"Hanan A. R. Akkar, Huthaifa Salman Khairy","doi":"10.4018/JCIT.20210401.OA6","DOIUrl":"https://doi.org/10.4018/JCIT.20210401.OA6","url":null,"abstract":"Portable robots are considered an important device in many areas such as in medical, space research, emergency situations, applications, etc. The robots complete tasks efficiently and effectively without any human interaction. The most important advantages of portable robots are their small size and very high speed in problem processing with relatively high accuracy and efficiency compared with constant devices. In this paper, the authors discussed the applications of the robot systems based on swarm intelligent controller and field programmable gate array (FPGA). A component-oriented FPGA design platform is proposed for robot system integration because FPGAs are known to be power-efficient hardware platforms. From the results, they found that FPGA and swarm intelligence are very efficient in robotic systems and used in a wide area of applications.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70479114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.4018/JCIT.20210401.OA2
Mohammed Khaleel Hussein, RaffatIzzat Saheel, Alidoosti Ali
E-learning utilizing information systems framework has been booming in information systems. This paper covers the systematic performance evaluation results process, and understanding how e-learning utilizing information system implementation was undertaken for education in the context of universities. The aim of this paper is to analyse the framework of improving e-learning utilizing information system adoption utilizing information system, implementation, and development in higher education. Although e-learning utilizing information systems have been widely used at various education sectors, several fixed outcomes have been calculated. Recent e-learning utilizing information systems structure was implemented utilizing current method and managed for the drawbacks of recent academic technique. There are many things that are not flexible and effective for supporting the real era of this world referring to teaching and learning.
{"title":"Implementation of E-Learning Functions With the Use of Information Systems Architecture","authors":"Mohammed Khaleel Hussein, RaffatIzzat Saheel, Alidoosti Ali","doi":"10.4018/JCIT.20210401.OA2","DOIUrl":"https://doi.org/10.4018/JCIT.20210401.OA2","url":null,"abstract":"E-learning utilizing information systems framework has been booming in information systems. This paper covers the systematic performance evaluation results process, and understanding how e-learning utilizing information system implementation was undertaken for education in the context of universities. The aim of this paper is to analyse the framework of improving e-learning utilizing information system adoption utilizing information system, implementation, and development in higher education. Although e-learning utilizing information systems have been widely used at various education sectors, several fixed outcomes have been calculated. Recent e-learning utilizing information systems structure was implemented utilizing current method and managed for the drawbacks of recent academic technique. There are many things that are not flexible and effective for supporting the real era of this world referring to teaching and learning.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70478933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.4018/JCIT.20210401.OA3
S. JebaKumarR.J., J. RoopaJayasingh
Connected vehicular tracking schema operated in environmentally safe radio frequency of 434 MHz, artificial intelligence, and machine learning and IoT technology (CVT-AIML-IoT) is cost effective and secured tracking or device monitoring system. The prime benefit of the proposed CVT-AIML-IoT system is that it utilizes cloud internet of things (IoT) technology and active radio frequency identification over global positioning system (GPS), which is prone to attackers due to self-defenseless network architecture. The sliding side of GPS is observed; when the GPS module is switched-off, it can be hidden without any authorization. Hence, an uninterrupted observing secured system like CVT-AIML-IoT is a promising solution with dynamic vehicular PIN generation by AI-ML concept. CVT-AIML-IoT grids the traceable area based on the topographical dependency. Detection range gateway coupled with IoT transceiver module captures data from each tracking zone to the cloud for monitoring over Web UI support and mapped with time stamp. Hence, CVT-AIML-IoT assures vehicular monitoring in a lucrative approach.
{"title":"434 MHz Environmentally Safe Monitoring Schema for Vehicular Network by AI-ML-IoT Technologies","authors":"S. JebaKumarR.J., J. RoopaJayasingh","doi":"10.4018/JCIT.20210401.OA3","DOIUrl":"https://doi.org/10.4018/JCIT.20210401.OA3","url":null,"abstract":"Connected vehicular tracking schema operated in environmentally safe radio frequency of 434 MHz, artificial intelligence, and machine learning and IoT technology (CVT-AIML-IoT) is cost effective and secured tracking or device monitoring system. The prime benefit of the proposed CVT-AIML-IoT system is that it utilizes cloud internet of things (IoT) technology and active radio frequency identification over global positioning system (GPS), which is prone to attackers due to self-defenseless network architecture. The sliding side of GPS is observed; when the GPS module is switched-off, it can be hidden without any authorization. Hence, an uninterrupted observing secured system like CVT-AIML-IoT is a promising solution with dynamic vehicular PIN generation by AI-ML concept. CVT-AIML-IoT grids the traceable area based on the topographical dependency. Detection range gateway coupled with IoT transceiver module captures data from each tracking zone to the cloud for monitoring over Web UI support and mapped with time stamp. Hence, CVT-AIML-IoT assures vehicular monitoring in a lucrative approach.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70479021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pankaj Chaudhary, Rohith Gattu, Soundarajan Ezekiel, J. Rodger
{"title":"Forecasting Solar Radiation: Using Machine Learning Algorithms","authors":"Pankaj Chaudhary, Rohith Gattu, Soundarajan Ezekiel, J. Rodger","doi":"10.4018/jcit.296263","DOIUrl":"https://doi.org/10.4018/jcit.296263","url":null,"abstract":"","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70479316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. McDonough Central School District, located in a small city in upstate New York, is looking to invest some of its budget in new resources for Hawkins Elementary School. The School Board is strongly considering equipping each classroom in the school with interactive whiteboards. However, prior to doing so, the Board is inquiring about how the technology is currently being used. They are seeking input from teachers, students, parents, and other faculty members who have been exposed to the technology about this large-scale budget decision. For each stakeholder, the value and usefulness of the interactive whiteboards are different. Given the school board's proposed spending initiative, the entire school community appears to be debating how to spend this money and what future interactive whiteboards may have in their schools and classrooms.
T. McDonough中央学区位于纽约州北部的一个小城市,该学区正寻求将部分预算投入霍金斯小学的新资源。学校董事会正在强烈考虑为学校的每个教室配备互动白板。但是,在这样做之前,委员会正在询问目前如何使用这项技术。他们正在寻求教师、学生、家长和其他接触过这项大规模预算决策技术的教职员工的意见。对于每个涉众,交互式白板的价值和有用性是不同的。考虑到学校董事会提出的支出计划,整个学校社区似乎都在讨论如何花这笔钱,以及未来在他们的学校和教室里可能会有什么样的交互式白板。
{"title":"Interactive Whiteboards: Worth the Investment?","authors":"H. Schnackenberg, Michael J. Heymann","doi":"10.4018/jcit.2012010102","DOIUrl":"https://doi.org/10.4018/jcit.2012010102","url":null,"abstract":"T. McDonough Central School District, located in a small city in upstate New York, is looking to invest some of its budget in new resources for Hawkins Elementary School. The School Board is strongly considering equipping each classroom in the school with interactive whiteboards. However, prior to doing so, the Board is inquiring about how the technology is currently being used. They are seeking input from teachers, students, parents, and other faculty members who have been exposed to the technology about this large-scale budget decision. For each stakeholder, the value and usefulness of the interactive whiteboards are different. Given the school board's proposed spending initiative, the entire school community appears to be debating how to spend this money and what future interactive whiteboards may have in their schools and classrooms.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/jcit.2012010102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70478861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The semantic integration of software systems can be supported through a shared understanding of the terminology in their respective ontologies. In practice, however, the author is faced with the additional challenge that few applications have an explicitly axiomatized ontology. To address this challenge, we adopt the Ontological Stance, in which we can model a software application as if it were an inference system with an axiomatized ontology, and use this ontology to predict the set of sentences that the inference system determines to be entailed or satisfiable. This chapter gives an overview of a deployment of the Process Specification Language (PSL) Ontology as the interchange ontology for the semantic integration of three manufacturing software applications currently being used in industry -- a process modeller, a process planner, and a scheduler.
{"title":"The Ontological Stance for a Manufacturing Scenario","authors":"M. Gruninger","doi":"10.4018/JCIT.2009072101","DOIUrl":"https://doi.org/10.4018/JCIT.2009072101","url":null,"abstract":"The semantic integration of software systems can be supported through a shared understanding of the terminology in their respective ontologies. In practice, however, the author is faced with the additional challenge that few applications have an explicitly axiomatized ontology. To address this challenge, we adopt the Ontological Stance, in which we can model a software application as if it were an inference system with an axiomatized ontology, and use this ontology to predict the set of sentences that the inference system determines to be entailed or satisfiable. This chapter gives an overview of a deployment of the Process Specification Language (PSL) Ontology as the interchange ontology for the semantic integration of three manufacturing software applications currently being used in industry -- a process modeller, a process planner, and a scheduler.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2009-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70478649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The achievement of coordination activities and the creation of university networks are considered to be fundamental mechanisms to bring together the different higher education systems as well as to promote synergies between less developed regions and more developed ones. ODISEAME (Open Distance Inter-University Synergies between Europe, Africa, and Middle East) is an interdisciplinary and intercultural e-learning project whose main goal is to create a Euro-Mediterranean network of universities for the cooperation in the design and development of tele-learning experiences. This four-year project ended in June of 2006 with its final phase when several multilingual and multicultural learning experiences were carried out in an efficient way. These experiences were developed in all the official languages of the participant countries, as well as in English, using a Web-based multilingual virtual space. This article describes the ODISEAME project and the e-learning experiences derived from it and presents some conclusions from their evaluation. It finally shows the importance of university networks in the process of establishing the European higher education area.
{"title":"E-Learning University Networks: An Approach to a Quality Open Education","authors":"E. V. Pérez, María Jesús Verdú Pérez","doi":"10.4018/JCIT.2007040102","DOIUrl":"https://doi.org/10.4018/JCIT.2007040102","url":null,"abstract":"The achievement of coordination activities and the creation of university networks are considered to be fundamental mechanisms to bring together the different higher education systems as well as to promote synergies between less developed regions and more developed ones. ODISEAME (Open Distance Inter-University Synergies between Europe, Africa, and Middle East) is an interdisciplinary and intercultural e-learning project whose main goal is to create a Euro-Mediterranean network of universities for the cooperation in the design and development of tele-learning experiences. This four-year project ended in June of 2006 with its final phase when several multilingual and multicultural learning experiences were carried out in an efficient way. These experiences were developed in all the official languages of the participant countries, as well as in English, using a Web-based multilingual virtual space. This article describes the ODISEAME project and the e-learning experiences derived from it and presents some conclusions from their evaluation. It finally shows the importance of university networks in the process of establishing the European higher education area.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70479061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}