Search Results

Now showing 1 - 2 of 2
  • Article
    Citation - WoS: 27
    Citation - Scopus: 43
    User Acceptance of Social Learning Systems in Higher Education: an Application of the Extended Technology Acceptance Model
    (Routledge Journals, Taylor & Francis Ltd, 2017) Akman, Ibrahim; Turhan, Cigdem
    This study aims to explore the users' behaviour and acceptance of social media for learning in higher educational institutions with the help of the extended Technology Acceptance Model (TAM). TAM has been extended to investigate how ethical and security awareness of users affect the actual usage of social learning applications. For this purpose, a survey was conducted and the Structural Equation Model approach was utilised to investigate the direct and indirect causal relationships among the constructs in the research model. Interestingly, the findings from the analysis reveal that, except ease of use', TAM's core and external constructs are significant predictors of actual behaviour towards using social media for learning.
  • Article
    Citation - WoS: 6
    Citation - Scopus: 10
    Lpwan Cyber Security Risk Analysis: Building a Secure Iqrf Solution
    (Mdpi, 2023) Bouzidi, Mohammed; Amro, Ahmed; Dalveren, Yaser; Cheikh, Faouzi Alaya; Derawi, Mohammad; Alaya Cheikh, Faouzi
    Low-power wide area network (LPWAN) technologies such as IQRF are becoming increasingly popular for a variety of Internet of Things (IoT) applications, including smart cities, industrial control, and home automation. However, LPWANs are vulnerable to cyber attacks that can disrupt the normal operation of the network or compromise sensitive information. Therefore, analyzing cybersecurity risks before deploying an LPWAN is essential, as it helps identify potential vulnerabilities and threats as well as allowing for proactive measures to be taken to secure the network and protect against potential attacks. In this paper, a security risk analysis of IQRF technology is conducted utilizing the failure mode effects analysis (FMEA) method. The results of this study indicate that the highest risk corresponds to four failure modes, namely compromised end nodes, a compromised coordinator, a compromised gateway and a compromised communication between nodes. Moreover, through this methodology, a qualitative risk evaluation is performed to identify potential security threats in the IQRF network and propose countermeasures to mitigate the risk of cyber attacks on IQRF networks.