academic information
Recently Published Documents


TOTAL DOCUMENTS

598
(FIVE YEARS 256)

H-INDEX

13
(FIVE YEARS 2)

2022 ◽  
Vol 22 (1) ◽  
Author(s):  
Samankumara Hettige ◽  
Eshani Dasanayaka ◽  
Dileepa Senajith Ediriweera

Abstract Background The use of Open Educational Resources (OER) and Social Media (SM) for academic information seeking is common among undergraduates nowadays. There is limited data on OER and SM use for education in Sri Lanka. This study was aimed at evaluating the OER and SM use for education among the medical students at the Faculty of Medicine, University of Kelaniya, Sri Lanka. Methods A cross-sectional study was conducted at the Faculty of Medicine, University of Kelaniya. Stratified random sampling was used to select students from the first year to the final year. A self-administrated questionnaire was used to collect data. Results The study included 257 responses (response rate: 89.5%), of which 185 (72.0%) were females. The OER and SM use for educational purposes at least once a month among students was 96.1% (95%CI: 93.7–98.5%) and 88.3% (95%CI: 84.4–92.3%) respectively. There was no gender difference in OER and SM use. The main reasons for accessing OER were the availability of information at any time (36.1%) and ease of information access (31.5%). Wiki sites (84.4%) and Facebook (79.8%) were the highest accessed OER and SM platforms. The majority of students were in view that the information on wiki sites (51.4%) and results of general non-specific web searches (56.0%) were reliable. Only 33.9% of students searched information from educational and government-related sources and 18.7% had accessed e-journals. Through SM, 79.0% joined educational groups and 77.0% followed the medical-related sites, pages and people. More than one-third of students (35.8%) could not find academic information from SM due to the information overload and 31.1% mentioned that SM distracted their education. Conclusion The majority of the students used OER and SM for education; however, only a minority accessed reliable information. Students accepted information available in wiki sites and general non-specific web searchers without considering the credibility of sources. The majority of the students did not refer to e-journals. Distractions to academic work and the difficulty to access accurate information were major concerns of using SM. This study highlights the importance of improving information literacy among medical students.


2021 ◽  
Vol 5 (6) ◽  
pp. 1052-1061
Author(s):  
Ikhwan Arief ◽  
Asmuliardi Muluk ◽  
Ahmad Syafruddin Indrapriyatna ◽  
Mahira Falevy

Technology has been growing rapidly to help humans living their everyday life. Human, as the user interacts through an interface called user interface (UI), and the experience that the users are having is called user experience (UX). UI and UX are inseparable as a good user interface will result in a better user experience. Portal Unand is a web-based app that has all academic information for students. An initial survey was conducted to find out student’s thoughts on Portal Unand. Students have complaints towards Portal Unand due to its unresponsiveness, old-fashioned design, important features weren’t highlighted, etc. Hence, it reduced user experience in using Portal Unand. In this study, the redesign was done by using the design thinking. The study started from empathizing with the users until testing the prototype to the users by conducting usability testing. Usability testing was conducted by using Maze and System Usability Scale (SUS). The score of usability testing was 84 which fell into the high range. The SUS score was 83.33 which fell into grade A and acceptable category. As the new prototype managed to fulfill users’ needs and met users’ expectations, the prototype was usable and ready to be developed.  


Author(s):  
April Rose Articuna Zaragosa ◽  

The Registrar Information System through SMS is design and develop a computer-based system that is able to provide a real-time information through SMS to students regarding of their academic records. It has a two-way interactive text messaging functionality in a Registrar’s office of Northern Iloilo Polytechnic State College Main Campus, Estancia, Iloilo. The architectural design used in this system is two-tier architecture. The developed system employed a descriptive and developmental research design. Respondents of the study were the 354 students enrolled officially in School Year 2016-2017 using a standard questionnaire International Standard Organization / International Electrotechnical Commission 25010. The Rapid Application Development Model was used in the Software Development Life Cycle. MySQL for the database, vb.net language and Windows operating system development environment. The usability of the feature of the developed system is Very Good in terms of delivering important academic information to every student. The performance of the developed system is fully functional when it comes to all the processes such as enrolling, encoding the grades, reliable and efficient to the students in sending/ receiving academic information provided to clienteles.


2021 ◽  
Vol 6 (3) ◽  
pp. 131
Author(s):  
Erick Irawadi Alwi ◽  
Lutfi Budi Ilmawan

The use of academic information systems (siakad) has become mandatory for universities in providing user convenience in online academic administrative activities. However, sometimes college siakad has security holes that irresponsible people can take advantage of by hacking. This study aims to identify security vulnerabilities at XYZ Siakad University. The method used in this study is a vulnerability assessment method. A university syakad will conduct an initial vulnerability assessment by doing footprinting to get information related to XYZ syakad after that a vulnerability scan is carried out using vulnerability assessment tools to identify vulnerabilities and the level of risk found. Based on the vulnerability of the XYZ university's vulnerabilities, it is quite good, with a high risk level of 1, a medium risk level of 6 and a low risk level of 14. Researchers provide recommendations for improvements related to the findings of security holes in XYZ university Siakad from XSS (Cross Site Scripting) attacks, Clickjacking, Brute Force, Cross-site Request Forgery (CSRF) and Sniffing.


2021 ◽  
Vol 4 (2) ◽  
pp. 180-188
Author(s):  
Heru Satria Surya ◽  
Benino Giordiola Millenio ◽  
Junadhi Junadhi ◽  
Silvyana Dwi Putri

The academic information system is an important system to supports lecture activities. Is used by almost all elements in the university, both students, lecturers, staff and leaders. This research uses Heuristic Evaluation as an inference method to assess the components of learnability, efficiency, memorability, errors, and satisfaction. for various cases, such as designing academic and corporate websites with reference to these problems, it is necessary to evaluate the usability of STMIK Amik Riau information system. STMIK Amik Riau implements an integrated information system to support fast and real-time information management processes of STMIK Amik Riau information system includes various services such as E-KRS, E-KTM, E-EDOM, and other information. The aim is to identify problems related to the usability of the website. The data collection method in this research was carried out using questionnaire, containing a list of questions distributed via google form to respondents, its about 100 students of STMIK Amik Riau. Based on the analysis conducted using the Heuristic Evaluation method, the evaluation results of STMIK Amik Riau web portal have met the usability criteria with an average of 78.71915% where P > 60% and provides user satisfaction in accessing STMIK Amik Riau web portal. STMIK Amik Riau's web interface design is quite good. These results are based on the results of Likert scale score which states that the respondents agree.


2021 ◽  
Vol 7 (2) ◽  
pp. 231-244
Author(s):  
Komang Muda Sedana Yoga ◽  
Novita Novita

ABSTRAKTujuan dari penelitian ini adalah untuk mengetahui pengaruh tata kelola teknologi informasi dengan menggunakan COBIT 5 sebagai kerangka kerja tata kelola teknologi informasi terhadap kualitas layanan informasi akademik pada Sistem Infromasi Akademik. Penelitian ini menggunakan analisis deskriptif kualitatif dan analisis partial least square. Data primer didapatkan melalui kuesioner yang disebarkan pada mahasiswa aktif Universitas Trilogi pada semester gasal tahun 2020–2021. Hasil dari penelitian ini menunjukkan COBIT 5 dengan domain EDM (evaluate, direct and monitor) dan domain MEA (monitor, evaluate and assess) berpengaruh positif terhadap peningkatan kualitas layanan pada sistem informasi akademik Universitas Trilogi. Sedangkan domain DSS (Delivery, Service and Support) tidak berpengaruh positif terhadap peningkatan kualitas layanan pada sistem informasi akademik Universitas Trilogi. Hasil penelitian ini menjadi masukan bagi Universitas Trilogi untuk terus meningkatkan tata kelola teknologi informasi pada sistem informasi akademik sebagai salah satu cara untuk meningkatan kualitas layanan yang diberikan agar visi dan misi universitas dapat tercapai. ABSTRACTThe purpose of this research is to see to what extent the implementation of information technology governance with COBIT 5 as a basic framework for assessing information technology and determine the effect of information technology governance on the academic information system. This data processing uses descriptive qualitative analysis and Partial Least Square analysis. The primary data was collected from the questionnaire that distributed to active student in odd semester 2020–2021 in Trilogi University. The result of this research is showing COBIT 5 with the domain EDM (Evaluate. Direct and Monitor) and the MEA (Monitor, Evaluate and Assess) domain have an effect on improving service quality at Trilogy University. While the DSS (Delivery, Service and Support) domain has no effect on improving service quality at Trilogi University. In consequence, Trilogi University is required to improve the governance of information technology in academic information system as way to enchance the service quality provided, so the vision and mission can be achieved.


Author(s):  
Dabiah Alboaneen ◽  
Dalia Alsaffar ◽  
Amani Alqahtani ◽  
Lama Alamri ◽  
Amjad Alfahhad ◽  
...  

This article aims to develop a smart information desk system through a smart mirror for universities. It is a mirror with extra capabilities of displaying answers for academic inquiries such as asking about the lecturers’ office numbers and hours, exams dates and times on the mirror surface. In addition, the voice recognition feature was used to answer spoken inquiries in audio responds to serve all types of users including disabled ones. Furthermore, the system showed general information such as date, weather, time and the university map. The smart mirror was connected to an outdoor camera to monitor the traffics at the university entrance gate. The system was implemented on a Raspberry Pi 4 model B connected to a two-way mirror and an infrared (IR) touch frame. The results of this study helped to overcome the problem of the information desk absence in the university. Therefore, it helped users to save their time and effort in making requests for important academic information.


2021 ◽  
Vol 13 (6) ◽  
pp. 23-36
Author(s):  
Ruo Ando ◽  
Youki Kadobayashi ◽  
Hiroki Takakura ◽  
Hiroshi Itoh

Recently, APT (Advanced Persistent Threats) groups are using the COVID-19 pandemic as part of their cyber operations. In response to cyber threat actors, IoCs (Indicators of Compromise) are being provided to help us take some countermeasures. In this paper, we analyse how the coronavirus-based cyber attack unfolded on the academic infrastructure network SINET (The Science Information Network) based on the passive measurement with IoC. SINET is Japan's academic information infrastructure network. To extract and analyze the traffic patterns of the COVID-19 attacker group, we implemented a data flow pipeline for handling huge session traffic data observed on SINET. The data flow pipeline provides three functions: (1) identification the direction of the traffic, (2) filtering the port numbers, and (3) generation of the time series data. From the output of our pipeline, it is clear that the attacker's traffic can be broken down into several patterns. To name a few, we have witnessed (1) huge burstiness (port 25: FTP and high port applications), (3) diurnal patterns (port 443: SSL), and (3) periodic patterns with low amplitude (port 25: SMTP) We can conclude that some unveiled patterns by our pipeline are informative to handling security operations of the academic backbone network. Particularly, we have found burstiness of high port and unknown applications with the number of session data ranging from 10,000 to 35,000. For understanding the traffic patterns on SINET, our data flow pipeline can utilize any IoC based on the list of IP address for traffic ingress/egress identification and port filtering.


Author(s):  
Muthmainnah Muthmainnah ◽  
Desvina Yulisda ◽  
Veri Ilhadi

The use of Information Technology (IT) in higher education is said to be useful if its application is in accordance with the vision and mission of the organization. Academic information system audit is a method of assessing or assessing academic information systems to ensure that the governance and management functions of the information system are implemented properly. Unimal is a university that has implemented information technology in its operational processes. In achieving the organization's vision, the use of IT in the organization must always be monitored so that the services provided to users can be maximized, including by conducting an audit process to identify the level of IT maturity so that IT management can find solutions from processes that are considered less than optimal. This study aims to measure the level of capability of Unimal Academic Information Technology using COBIT 5 Domain APO (Align, Plan, and Organise) in the APO01, APO02, APO04 and APO11 processes. The focus of the research is also based on the need for priority processes in the Malikussaleh University environment and research related to the APO domain has not been carried out. The purpose of this study in general is to analyze Academic Information Technology using the COBIT 5 framework in the APO domain at the Malikussaleh University, as well as to provide solutions for improving academic information technology and IT implementation at the Malikussaleh University.


2021 ◽  
Vol 9 ◽  
Author(s):  
Chengzhe Yuan ◽  
Yi He ◽  
Ronghua Lin ◽  
Yong Tang

The academic social networks (ASNs) play an important role in promoting scientific collaboration and innovation in academic society. Accompanying the tremendous growth of scholarly big data, finding suitable scholars on ASNs for collaboration has become more difficult. Different from friend recommendation in conventional social networks, scholar recommendation in ASNs usually involves different academic entities (e.g., scholars, scientific publications, and status updates) and various relationships (e.g., collaboration relationship between team members, citations, and co-authorships), which forms a complex heterogeneous academic network. Our goal is to recommend potential similar scholars for users in ASNs. In this article, we propose to design a graph embedding-based scholar recommendation system by leveraging academic auxiliary information. First, we construct enhanced ASNs by integrating two types of academic features extracted from scholars’ academic information with original network topology. Then, the refined feature representations of the scholars are obtained by a graph embedding framework, which helps the system measure the similarity between scholars based on their representation vectors. Finally, the system generates potential similar scholars for users in ASNs for the final recommendation. We evaluate the effectiveness of our model on five real-world datasets: SCHOLAT, Zhihu, APS, Yelp and Gowalla. The experimental results demonstrate that our model is effective and achieves promising improvements than the other competitive baselines.


Sign in / Sign up

Export Citation Format

Share Document