{"title":"Metamorphosis of EduX: a comparative study for education in the metaverse","authors":"Mohammad Lataifeh, Naveed Ahmed","doi":"10.3389/fcomp.2024.1423768","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1423768","url":null,"abstract":"This research explores critical aspects of the ongoing educational transition from traditional two-dimensional digital platforms toward immersive realities in the metaverse. In this work, a networked, collaborative, ubiquitous, and immersive platform, “EduX” is developed to host different educational sessions. Several metrics are tracked and compared with parallel sessions using traditional digital platforms used by educational institutions, particularly during and after the Covid-19 pandemic, such as Zoom, MS Teams, and Black Board Ultra as the Learning Management System. Four groups of students from different domains of knowledge (n = 396) participated in the study, whereby each group was split into two subgroups, taking their session via EduX and BBUltra, followed by post-assessments and discussions. Using a mixed methods approach, quantitative and qualitative data were collected and analyzed to examine the influence of the platform on engagement, performance, and overall student achievements. The discussed results demonstrate superior usability and user experience levels of the proposed platform, with higher levels of engagement, leading to significantly improved attainments. Other than demonstrating the efficacy and feasibility of the platform, this work establishes fundamental metrics to be considered by software and hardware solution providers, academic institutions, and the research community concerned with the convergence towards immersive technologies.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":"53 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141269550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sameha Alshakhsi, Areej Babiker, C. Sindermann, Dena Al-Thani, Christian Montag, Raian Ali
{"title":"Willingness to pay for digital wellbeing features on social network sites: a study with Arab and European samples","authors":"Sameha Alshakhsi, Areej Babiker, C. Sindermann, Dena Al-Thani, Christian Montag, Raian Ali","doi":"10.3389/fcomp.2024.1387681","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1387681","url":null,"abstract":"In recent years, concerns over the potential negative impacts of social network sites (SNS) on users’ digital wellbeing are on the rise. These concerns have sparked a growing demand for SNS to introduce changes to their business model and offer features that prioritize users’ wellbeing, even if it means introducing fees to users. Still, it is questionable whether such a new model is welcomed by users and commercially valid. In this paper, we investigate (i) people’s willingness to pay (WTP) for digital wellbeing services designed to foster more autonomy, control, and personal growth in users and (ii) the influence of sociodemographic variables, personality, and social networks use disorder (SNUD) on WTP. Data were collected through an online survey with participants from two distinct cultural contexts, the European and Arabic. The samples comprised 262 participants from Europe (Males: 57.63%) and 251 from Arab countries (Males: 60.56%). The participants ranged in age from 18 to 66 years (MEurope = 29.16, SD = 8.42; MArab = 31.24, SD = 8.23). The results revealed that a notable proportion of participants were willing to pay for digital wellbeing services (Europe: 24%; Arab: 30%). Females in the European sample demonstrated a higher WTP for “Mental Health Issues Minimization” compared to males. In the Arab sample, males showed a higher WTP for “Safeguarding Data Privacy” than females. Multiple regression analyses revealed that SNUD and the need for cognition emerged as significant and positive predictors of WTP in both the European and Arab samples. Differences in the relations of personality traits and sociodemographic variables on WTP in each sample were noted. These insights contribute to our understanding of the factors shaping individuals’ preferences and valuation related to digital wellbeing services on SNS and highlight the importance of considering sociodemographic variables and personal factors as well as cultural contexts when planning and introducing them.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":"31 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141272724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial: Perceptual organization in computer and biological vision","authors":"James H. Elder, Mary A. Peterson, Dirk B. Walther","doi":"10.3389/fcomp.2024.1419831","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1419831","url":null,"abstract":"","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XAI Human-Machine collaboration applied to network security","authors":"Steve Moyle, Andrew Martin, Nicholas Allott","doi":"10.3389/fcomp.2024.1321238","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1321238","url":null,"abstract":"Cyber attacking is easier than cyber defending—attackers only need to find one breach, while the defenders must successfully repel all attacks. This research demonstrates how cyber defenders can increase their capabilities by joining forces with eXplainable-AI (XAI) utilizing interactive human-machine collaboration. With a global shortfall of cyber defenders there is a need to amplify their skills using AI. Cyber asymmetries make propositional machine learning techniques impractical. Human reasoning and skill is a key ingredient in defense and must be embedded in the AI framework. For Human-Machine collaboration to work requires that the AI is an ultra-strong machine learner and can explain its models. Unlike Deep Learning, Inductive Logic Programming can communicate what it learns to a human. An empirical study was undertaken using six months of eavesdropped network traffic from an organization generating up-to 562K network events daily. Easier-to-defend devices were identified using a form of the Good-Turing Frequency estimator which is a promising form of volatility measure. A behavioral cloning grammar in explicit symbolic form was then produced from a single device's network activity using the compression algorithm SEQUITUR. A novel visualization was generated to allow defenders to identify network sequences they wish to explain. Interactive Inductive Logic Programming (the XAI) is supplied the network traffic meta data, sophisticated pre-existing cyber security background knowledge, and one recurring sequence of events from a single device to explain. A co-inductive process between the human cyber defender and the XAI where the human is able to understand, then refute and shape the XAI's developing model, to produce a model that conforms with the data as well as the original device designers programming. The acceptable model is in a form that can be deployed as an ongoing active cyber defense.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":"125 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140986177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Almiqdad Elzein, Emrah Basaran, Yin David Yang, Marwa Qaraqe
{"title":"A novel multi-scale violence and public gathering dataset for crowd behavior classification","authors":"Almiqdad Elzein, Emrah Basaran, Yin David Yang, Marwa Qaraqe","doi":"10.3389/fcomp.2024.1242690","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1242690","url":null,"abstract":"Dependable utilization of computer vision applications, such as smart surveillance, requires training deep learning networks on datasets that sufficiently represent the classes of interest. However, the bottleneck in many computer vision applications lies in the limited availability of adequate datasets. One particular application that is of great importance for the safety of cities and crowded areas is smart surveillance. Conventional surveillance methods are reactive and often ineffective in enable real-time action. However, smart surveillance is a key component of smart and proactive security in a smart city. Motivated by a smart city application which aims at the automatic identification of concerning events for alerting law-enforcement and governmental agencies, we craft a large video dataset that focuses on the distinction between small-scale violence, large-scale violence, peaceful gatherings, and natural events. This dataset classifies public events along two axes, the size of the crowd observed and the level of perceived violence in the crowd. We name this newly-built dataset the Multi-Scale Violence and Public Gathering (MSV-PG) dataset. The videos in the dataset go through several pre-processing steps to prepare them to be fed into a deep learning architecture. We conduct several experiments on the MSV-PG datasets using a ResNet3D, a Swin Transformer and an R(2 + 1)D architecture. The results achieved by these models when trained on the MSV-PG dataset, 88.37%, 89.76%, and 89.3%, respectively, indicate that the dataset is well-labeled and is rich enough to train deep learning models for automatic smart surveillance for diverse scenarios.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":" 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140992484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of accent and device usage on perceived credibility during interactions with voice-AI assistants","authors":"Anne Pycha, Georgia Zellou","doi":"10.3389/fcomp.2024.1411414","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1411414","url":null,"abstract":"Voice-AI assistants offer innovative ways for people to interact with technology, such as delivering search results through human-sounding voices. Unlike printed text, however, voices are associated with particular characteristics, such as accents, which have the potential to influence perceived credibility. Voice-AI assistants are also a relatively new phenomenon, and while people who use them frequently may be inclined to trust them, other people may not be. The current study investigated how voice accent and frequency-of-use affected users’ credibility assessments of search results delivered by voice-AI assistants. Participants, who were native speakers of American English and self-classified themselves according to how frequently they used voice-AI assistants, listened to statements produced by neural text-to-speech in either an American English or British English accent. They then rated the credibility of both the information content and the voice itself, along several dimensions. Results showed that in multiple conditions, participants perceived information delivered by British-accented voices as more credible than that delivered by American English-accented voices. Furthermore, frequency-of-use exerted a significant effect on perceived trustworthiness of a voice. These findings have implications for the ethical design of voice-AI systems, and for human-computer interaction more generally.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":" 66","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140991249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hesham Allam, Juan Dempere, E. Lazaros, Chris Davison
{"title":"Empowering engagement: unveiling motivational drivers for social media adoption: a Facebook case study","authors":"Hesham Allam, Juan Dempere, E. Lazaros, Chris Davison","doi":"10.3389/fcomp.2024.1387291","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1387291","url":null,"abstract":"Social networking websites and applications are increasingly becoming significant cultural phenomena. However, the motivation driving individuals to utilize these platforms, particularly in the Middle East, remains unclear. While numerous studies have explored technology adoption, limited research has investigated social media usage in the UAE. Therefore, this study proposes and empirically analyzes a framework based on a modified version of the Technology Acceptance Model to understand the factors influencing users’ opinions, objectives, and actual usage of social media platforms, focusing on Facebook.To investigate these factors, we employed structural equation modeling and smart PLS techniques on a sample of 540 participants. We aimed to identify predictors such as perceived usefulness, perceived ease of use, as well as a hedonic dimension encompassing perceived enjoyment, curiosity, and perceived connectedness, in shaping users’ attitudes towards Facebook usage. Additionally, we examined the relationship between social presence and users’ intentions to use Facebook.Our analysis revealed that perceived usefulness and perceived ease of use are significant predictors of users’ attitudes towards utilizing Facebook. Furthermore, the hedonic dimension, comprising perceived enjoyment, curiosity, and perceived connectedness, also plays a crucial role in shaping users’ attitudes. Moreover, social presence was found to have a significant association with users’ intentions to use Facebook.These findings contribute to our understanding of the factors influencing the adoption and usage of social media platforms, particularly in the context of the UAE. By highlighting the importance of both utilitarian and hedonic aspects, this research provides insights into the complex motivations behind individuals’ acceptance of dynamic applications like Facebook. Furthermore, our empirical model lays the groundwork for exploring additional factors that may influence the uptake of information systems and social media utilities, thereby advancing attitude-behavior theories in this domain.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":" 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140990101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Štofková, F. Bajza, P. Janošková, Martina Kováčiková
{"title":"Proposal of innovative smart solutions for retail store in order to support competitiveness and sustainable development","authors":"K. Štofková, F. Bajza, P. Janošková, Martina Kováčiková","doi":"10.3389/fcomp.2024.1328913","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1328913","url":null,"abstract":"The Internet of Things (IoT) is becoming an increasingly important concept in various areas of our daily lives. With the development of information and communication technologies, the possibilities of IoT implementation are also expanding. The retail sector is also starting to make more significant use of IoT to improve and increase the efficiency of its business processes and more effective interaction with customers. Even though several partial IoT solutions have been implemented in retail, according to publicly available sources, there is no comprehensive IoT implementation in this sector. Therefore, we focused on the possibilities of creating a comprehensive proposal for the use of IoT in a retail enterprise in Slovakia. The main reasons for this transformation are the development of intelligent technologies, the increased demand of consumers for more convenient purchases and the efficiency of business processes, as well as to increase the competitiveness of the company. The aim of the contribution is to create a proposal for the implementation of IoT in retail, which will contribute to the sustainable development and competitiveness of the company. The result of the contribution is the creation of a proposal for the integration of the Internet of Things in retail, while the proposal is also applicable in other similar enterprises. The research methodology includes secondary sources and primary inquiry using an online questionnaire. The results of the primary research showed that a large part of respondents are interested in using IoT solutions in retail and that the implementation of these solutions affects their purchasing behavior. The conclusions of the paper indicate that the implementation of IoT solutions in retail would have a positive impact on the competitiveness of businesses. Factors that influence the choice of brick-and-mortar and online stores by customers were also identified. Customers’ interest in IoT solutions, as well as their preferences when choosing stores, represent a guideline for businesses operating in the retail sector. The implementation of the proposed solutions is relatively demanding on financial resources, therefore a good financial condition of the company is a necessary condition. Further research should focus on the security risks, barriers, ethical privacy issues associated with the use of IoT in retail stores.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":" 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140994846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Student impressions of instructors based on Zoom backgrounds: investigating perceived technology skills of instructors and affective learning of students","authors":"Stephanie Kelly, Jihyun Kim, Ian Berry, Ryan Goke","doi":"10.3389/fcomp.2024.1392669","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1392669","url":null,"abstract":"The purpose of this study is to identify how Zoom backgrounds affect students’ affective learning and perceptions of an instructor’s technology use skills in online learning experiences. Data collected from undergraduate students in the U.S. indicate that with certain Zoom backgrounds, male students perceive the instructor having lower technology skills and experience less affective learning towards the instructor and course content than do female students. Overall, the study’s findings provide meaningful contributions to instructional communication research and suggest recommendations for strategic use of Zoom backgrounds to cultivate the best impression of an instructor and positive learning experiences.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":"184 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141015345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of CSKAS-VANET model for stable clustering and authentication scheme using RBMA and signcryption","authors":"M. Gayathri, C. Gomathy","doi":"10.3389/fcomp.2024.1384515","DOIUrl":"https://doi.org/10.3389/fcomp.2024.1384515","url":null,"abstract":"A public key infrastructure-enabled system authentication model is developed to provide essential security functions for Vehicular ad hoc networks (VANETs). An intelligent transportation system is provided by VANET, an emerging technology. Dedicated short-range communication is used to disseminate messages wirelessly. Communications may be hacked, and messages can be stolen or fabricated. Hence, authenticated communication is crucial in the VANET environment. Some parameters such as trust, authentication, privacy, and security are at high risk. This article suggests a VANET with secure authentication and trust-based clustering mechanisms to provide stable and secure communication. Initially, the Restricted Boltzmann Machine learning algorithm (RBMA) is used to select the cluster head, which depends upon trust, vehicle lifetime, and buffer level. Then, cluster members are formed, followed by grouping. Diffie–Hellman Hyperelliptic Curve Cryptography and cryptographic hash functions are used by signcryption for secure communication in VANET. Therefore, the essential component of the key agreement strategy that will give superior authentication is this signcryption mechanism. Over the medium access protocol layer, all of these security characteristics are updated. The proposed method of clustering signcryption key agreement scheme (CSKAS) approach reduces time complexity and increases packet delivery ratio which is vital in providing stable, secure communication.","PeriodicalId":510141,"journal":{"name":"Frontiers in Computer Science","volume":"10 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141035973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}