This paper explores the design and implementation of a competitive two-player anti-phishing learning game on the topic of phishing emails, aiming to educate users on how to recognize and create phishing emails, levera...
ISBN:
(纸本)9783031490644;9783031490651
This paper explores the design and implementation of a competitive two-player anti-phishing learning game on the topic of phishing emails, aiming to educate users on how to recognize and create phishing emails, leveraging Cialdini's principles of persuasion. By moving towards a competitive environment, the game presents a more constructive learning environment, in which players can compete against each other during the game-based learning process. A preliminary user study investigates the new game mode and evaluates usability and user experience to further improve its implementation.
The injectivity problem of the Parikh matrix is closely related to the characterization of the M-equivalence. Current studies provide partial results such as a necessary condition of the M-equivalence or characterizat...
ISBN:
(数字)9783031661594
ISBN:
(纸本)9783031661587;9783031661594
The injectivity problem of the Parikh matrix is closely related to the characterization of the M-equivalence. Current studies provide partial results such as a necessary condition of the M-equivalence or characterization of the M-equivalence over a binary or ternary alphabet. While these studies give rise to rewriting rules that construct M-equivalent strings of a given string over a binary or ternary alphabet, it has been open to designing general rewriting rules for M-equivalence independent of the alphabet size. We propose rewriting rules using exponent-strings, which are an extension of strings, as an intermediate representation. We introduce a special normal form for an exponent-string and prove that any string can be rewritten into an M-equivalent exponent-string in this special form. Then, we show that our rewriting rules characterize M-equivalence over an ordered alphabet of an arbitrary size.
The ability to succinctly and effectively communicate complex ideas is increasingly recognized as a critical skill for engineering professionals, defining a realm of ill-defined learning tasks. The elevator pitch, par...
ISBN:
(纸本)9783031679971;9783031679988
The ability to succinctly and effectively communicate complex ideas is increasingly recognized as a critical skill for engineering professionals, defining a realm of ill-defined learning tasks. The elevator pitch, particularly, serves as a prime example of this necessity. This study explores the extension of the EPIC intelligent tutoring system, originally designed to enhance oral communication skills in development and performance of elevator pitches through individual learning, by integrating collaborative capabilities with a focus on peer-assessment. A pilot study with 24 engineering students was conducted to assess the user experience, usability and learning outcomes. Results indicate that students' experience and usability perceptions are generally positive. Moreover, students who positively rated the peer-assessment functionalities showed marked improvements in their abilities to deliver effective elevator pitches. Pedagogical implications and design criteria aiming to improve students' valuation of collaborative work are discussed.
This study explores the pivotal role of eye-tracking technology and physiological and behavioral signal recording in diverse research domains, notably cognitive science, and human-computer interaction (HCI). Addressin...
详细信息
ISBN:
(纸本)9783031601064;9783031601071
This study explores the pivotal role of eye-tracking technology and physiological and behavioral signal recording in diverse research domains, notably cognitive science, and human-computer interaction (HCI). Addressing various aspects such as usability testing, user experience research, accessibility, neuroadaptive interfaces, virtual and augmented reality, and user interface design, eyetracking technology emerges as a crucial tool for garnering nuanced insights into human behavior and cognition. The research specifically focuses on conducting a comparative analysis of single-column, two-column, and three-column document formats using the Gaze Point eye tracker. This integration of quantitative data and qualitative user feedback aims to enhance reading experiences by aligning document formats with user needs and preferences. The study employs eye-tracking technology to capture and analyze readers' eyemovements across different column formats, utilizing measures such as fixation time, number of fixations, blinking frequency, and pupil dilation. The comprehensive analysis delves into readers' interactions with text, measuring reading speed and assessing comprehension and information retention. Results reveal that a single-column layout optimizes reading performance, enhancing comprehension, and reducing visual fatigue. However, the study acknowledges the context-specific appropriateness of each layout. The research methodology involves 20 participants reading texts in different layouts while their eye movements are tracked, the study provides insights into reading complexities associated with distinct layouts, emphasizing the importance of eye-tracking technology in understanding visual attention patterns. Ultimately, the study contributes to the development of guidelines for creating clear and accessible printed and digital documents, with the goal of improving written communication efficiency based on readers' *** study explores the pivotal role of eye-
This paper outlines the challenges around communicating natural hazard risk to children, due to the nature and concept of risk. It utilizes trusted disaster risk reduction advice to form the learning objectives of a s...
ISBN:
(纸本)9783031490644;9783031490651
This paper outlines the challenges around communicating natural hazard risk to children, due to the nature and concept of risk. It utilizes trusted disaster risk reduction advice to form the learning objectives of a serious game prototype for tsunami hazard. The study proposes an activity model that could form the basis of a game applicable to twelve different natural hazard scenarios thereby reducing resource input and reaching a significant number of learners in the formal education system. Evaluation of the prototype using an attitudinal survey suggests an adventure role playing game centered on challenges which use risk information is a viable concept for a serious game for communicating natural hazard risk.
The availability of technological resources at homes does not correlate with the educational use of RICT by secondary school Mathematics students. The use of technological resources, their use in the classroom and the...
ISBN:
(纸本)9789819742424;9789819742431
The availability of technological resources at homes does not correlate with the educational use of RICT by secondary school Mathematics students. The use of technological resources, their use in the classroom and the educational level are some of the factors that could influence students' perceptions of RICT (Relationship, Information and Communication Technologies). This study evaluates the perceptions of Secondary Mathematics students towards the use of RICT for educational purposes, analyzing their relationship with the use of technological resources, their participation in the classroom activities and their educational level. A total of 2018 secondary school students were tested in this ex post facto cross-sectional study with a validated 6-item questionnaire extracted from the general instrument. Bayesian analysis suggests the existence of a predominantly positive perception in secondary school students' perception of the use of technologies. This perception decreases as the level of education increases. Furthermore, a significant positive correlation is observed between the perception that RICT can improve their grades and the use of technological resources in their studies.
The development and auditing processes around electronic voting implementations are much too often deficient;this is particularly true for the measures taken to prevent cryptographic errors - potentially with grave co...
ISBN:
(纸本)9783031488054;9783031488061
The development and auditing processes around electronic voting implementations are much too often deficient;this is particularly true for the measures taken to prevent cryptographic errors - potentially with grave consequences for security. To mitigate this, it is common to make the code public in order to allow independent experts to help uncover such flaws. In this paper we present our experiences looking at the IVXV system used for municipal and national elections in Estonia as well as European parliament elections. It appears that, despite the code being public for over five years, the cryptographic protocol has not seen much scrutiny at the code level. We describe in detail the (lack of) auditability and incentives which have contributed to this situation. We also present a previously unknown vulnerability which contradicts the claimed individual verifiability of the system;this vulnerability should be patched in the next version of IVXV system.
This study investigates the effects on different racial/ethnic groups of middle school students when learning with a digital learning game, Decimal Point, and a comparable computer tutor. Using data from three classro...
详细信息
ISBN:
(纸本)9783031723148;9783031723155
This study investigates the effects on different racial/ethnic groups of middle school students when learning with a digital learning game, Decimal Point, and a comparable computer tutor. Using data from three classroom studies with 835 students, we compared learning outcomes and engagement among students from racial/ethnic groups that are well-represented in STEM (white and Asian) to those that are underrepresented in STEM (Black, Hispanic/Latine, Indigenous, and multiracial). Relative to students from underrepresented groups, students from well-represented groups in STEM scored higher on all tests (pre, post, and delayed, despite similar learning gains from pre-to-post and pre-to-delayed) and showed more engagement and less anxiety. The game also enhanced the experience of mastery only among students from well-represented groups. At the same time, students from underrepresented groups learned from the intervention and matched students from well-represented groups in learning efficiency. In short, we found similar learning gains from the game and tutor interventions among students from well-represented and underrepresented racial/ethnic groups, despite the lower performance and lower engagement among students from underrepresented groups. These insights highlight how students from diverse backgrounds may engage differently with educational technology, guiding future efforts in making Decimal Point - as well as digital learning tools in general - more inclusive.
In this paper we study finite higher-dimensional automata (HDAs) from the logical point of view. Languages of HDAs are sets of finite bounded-width interval pomsets with interfaces (iiPoms <=(k)) closed under order...
ISBN:
(数字)9783031661594
ISBN:
(纸本)9783031661587;9783031661594
In this paper we study finite higher-dimensional automata (HDAs) from the logical point of view. Languages of HDAs are sets of finite bounded-width interval pomsets with interfaces (iiPoms <=(k)) closed under order extension. We prove that languages of HDAs are MSO-definable. For the converse, we show that the order extensions of MSO-definable sets of iiPoms(<= k) are languages of HDAs. Furthermore, both constructions are effective. As a consequence, unlike the case of all pomsets, the order extension of any MSO-definable set of iiPoms(<= k) is MSO-definable.
Three counterexamples are presented against the idea that obligatory additive marking is directly motivated by exhaustivity implicatures. It is argued that it is the notion of potential question that is crucial. A dis...
ISBN:
(数字)9783031608780
ISBN:
(纸本)9783031608773;9783031608780
Three counterexamples are presented against the idea that obligatory additive marking is directly motivated by exhaustivity implicatures. It is argued that it is the notion of potential question that is crucial. A discourse semantic and pragmatic theory is submitted, implemented with the notion of attention proposed by Westera [63,64].
暂无评论