Debajyoti Pal

Debajyoti Pal
Verified
Debajyoti verified their affiliation via an institutional email.
Verified
Debajyoti verified their affiliation via an institutional email.
  • PhD
  • Lecturer at King Mongkut's University of Technology Thonburi

Looking for bright and motivated PhD scholars interested to work in the broad area of HCI and Information Systems

About

92
Publications
102,952
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,213
Citations
Introduction
QoS and QoE of various emerging application areas, Human Computer Interaction, Scale development for voice-based interactions, Educational Data-mining (specially MOOCs)
Current institution
King Mongkut's University of Technology Thonburi
Current position
  • Lecturer
Additional affiliations
January 2020 - present
King Mongkut's University of Technology Thonburi
Position
  • Lecturer
August 2016 - December 2019
King Mongkut's University of Technology Thonburi
Position
  • Researcher
December 2008 - August 2014
Camellia Institute of Technology
Position
  • Professor (Assistant)
Education
August 2014 - August 2017
King Mongkut's University of Technology Thonburi
Field of study
  • Information Technology
August 2004 - September 2006
March 2000 - March 2004
Rashtrasant Tukadoji Maharaj Nagpur University
Field of study
  • Electrical Engineering

Publications

Publications (92)
Article
Full-text available
The field of information security is experiencing growing popularity within Higher Education Institutions (HEIs), reflecting the increasing recognition of its importance in safeguarding sensitive data, and mitigating cyber risks. This shift highlights the critical need for effective security practices within educational environments, where data pro...
Article
Full-text available
The study investigates the influence of gamification on the education sector, focusing on increasing metaverse-based learning among university students. Using technology for student engagement, retention, and acquisition could give the Indian education system a competitive edge, especially in a growing country like India. The education system may a...
Article
Conversational agents are growing in popularity, and as such they must provide a good user experience and meet the needs of the users. Yet, how to measure the user experience in the conversational AI scenario remains an open and urgent question to be solved, which may hinder further empirical studies on human-agent interactions. In fact, there have...
Article
Full-text available
The use of Voice Assistants (VA) in both commercial and personal contexts has experienced significant growth, emphasizing the importance of assessing their user experience (UX) for long-term viability. Currently, the development of appropriate scales that capture user viewpoints after interacting with a system has become a popular method for measur...
Conference Paper
Full-text available
With the gaining popularity of generative AI tools like ChatGPT and their usage across several domains and disciplines, the question that naturally arises is how it can help the Information Systems (IS) researchers? Measuring hidden or latent constructs is one critical and primitive aspects of the IS domain that has always been challenging due to i...
Conference Paper
Full-text available
The emergence of ChatGPT as a generative AI tool has revolutionized the educational scenario by bringing in unprecedented changes. In this respect exploring the factors that affect the adoption and acceptance of ChatGPT services for educational purpose is of utmost importance. Accordingly, in this work we take a hybrid psycho-technical approach by...
Conference Paper
Full-text available
Although effective technical countermeasures play a pivotal role in safeguarding organizations’ digital assets, the persistent challenge of human factors in cybersecurity cannot be underestimated. This study aims to identify the human factors employed within the cybersecurity research community and the relevant human-centric security practices. The...
Article
Metaverse is envisioned to be a shared, immersive, and persistent 3D virtual place where humans can experience life as they do in the physical world and much beyond. This alternate “virtual world” is one key aspect of the metaverse, yet an often neglected factor while considering what might prompt the users from switching from a real to a virtual w...
Article
Full-text available
Recently there has been a tremendous growth in the popularity of artificial intelligence (AI) based conversational agents (CA). Their support for anthropomorphism and human-likeness makes them popular. However, being anthropomorphic raises a question - do these agents have a personality? Moreover, what effect may personality have on the different t...
Chapter
Technology enhanced learning (TEL) has come into prominence and become more relevant after the onset of COVID-19 pandemic. However, it is not known that whether TEL will be socially sustainable, and what factors can affect its sustainability. Therefore, in this work we propose a new research model based on UTAUT2 and the Big 5 Personality Framework...
Conference Paper
Full-text available
Metaverse is an emerging 3D digital space that augments the real world and the virtual world. It has been envisioned to be the trendsetter for future education having tremendous potential. However, the success of any new technology depends on its mass adoption and widespread societal diffusion. Therefore, it becomes important to understand the fact...
Article
Full-text available
Adoption of Voice Assistants (VA) has been a hot topic of research currently. However, the existing studies are based on traditional models like the Technology Acceptance Model that is less suitable for investigating adoption of AI-based technologies like VAs. This is because the conventional models do not consider the anthropomorphic nature of AI-...
Article
Full-text available
A more interactive learning environment is made possible by the metaverse, a made-up world with vastly expanding digital spaces. The metaverse is a development in synchronous communication that enables many users to share different experiences. This study proposes a research framework for adopting metaverse in education. A systematic literature rev...
Preprint
Full-text available
Child dehydration is a significant health concern, especially among children under 5 years of age who are more susceptible to diarrhea and vomiting. In Afghanistan, severe diarrhea contributes to child mortality due to dehydration. However, there is no evidence of research exploring the potential of machine learning techniques in diagnosing dehydra...
Article
Artificial-intelligence (AI) powered conversational (CAI) agents have been growing in popularity. Like human personality, CAI agent personality can also impact the relationship users develop with them. In this work we adopt a multi-methodological systematic approach for generating CAI agent personality descriptors. 235 unique descriptors are obtain...
Article
Full-text available
Information Security Awareness (ISA) is a significant concept that got considerable attention recently and can assist in minimizing the risks associated with information security breaches. Several measurement scales have been developed in this regard, as measuring users’ ISA is paramount. Although ISA specific scales are very important, yet what me...
Conference Paper
Full-text available
The demands for information security in Higher Education Institutions (HEIs) are expanding as HEIs are vulnerable because of the involvement of human factors. Hence, maintaining data privacy is paramount, where most individuals interacting with systems and applications are the main stakeholders (lecturers, students, and non-academic staff). In this...
Conference Paper
Full-text available
The COVID-19 pandemic has resulted in a rapid growth of online learning. While majority of the current research focus on different learning management systems, massive open online courses, or even specific softwares like Zoom and Microsoft Teams, the use of artificial-intelligence (AI) based voice assistants (VAs) for the purpose of online educatio...
Article
Full-text available
Technology adoption is accepting, integrating, and using the latest innovative technologies in society. Artificial intelligence (AI) and robotics are changing the face of the industrial and service sectors. There is a need to change the traditional way of teaching by introducing the latest innovative methods. This study aims to measure the intentio...
Chapter
Full-text available
Online learning has been a challenge for the students in times of the pandemic. In this context, academic self-concept (ASC) is an important aspect that has been under-researched. We develop a research model in this work based upon the Stimulus Organism Response (SOR) framework for explaining student’s ASC, and how it is formed from four unique eng...
Article
Full-text available
Voice Activated Personal Assistants (VAPA) are unique and different from other Information Systems (IS) due to their personalized, intelligent, and human-like behavior. Given the unique characteristics of these VAPA’s, current technology adoption models are not comprehensive enough for explaining the usage of these systems. While trust and privacy...
Article
Full-text available
Although there has been a growing interest for conversational AI (CAI) agents in the consumer electronics (CE) community, how these agents are personified by humans has been an unexplored area. Creating personality traits for CAI agents is important as it will enable providing more personalized services. Accordingly, we propose a multi-dimensional...
Article
Full-text available
Voice assistants (VA) are an emerging technology that have become an essential tool of the twenty-first century. The VA ease of access and use has resulted in high usability curiosity in voice assistants. Usability is an essential aspect of any emerging technology, with every technology having a standardized usability measure. Despite the high acce...
Article
Full-text available
Advances in artificial intelligence (AI) have ushered in a new era of consumer electronic (CE) devices: the voice-based CE devices (VCED’s). A striking feature that separates these from other CE devices are their anthropomorphic capabilities. While current CE research has given a strong focus on improving various technical and security aspects of t...
Conference Paper
Full-text available
Smart-village is an emerging paradigm that tries to digitize various aspects of rural activities using various IoT technologies. Different activities like smart-agriculture, waste-management, irrigation-management, livestock management, smart energy, smart-healthcare, and smart-education fall under its purview. However, infrastructure and cost are...
Conference Paper
Full-text available
Digital technologies are changing the way people live and work. Despite the many benefits of digital technologies, they expose users to sophisticated security threats, both in home networks and in enterprise networks. User awareness of security issues surrounding their networks, hardware devices, and software is one of the best practices for mitiga...
Article
Full-text available
The use of personal voice-assistants like Amazon Alexa and Google Assistant has been on the rise recently. To ensure a long-term success and widespread diffusion of these products it is important to evaluate their continued usage scenario instead of the initial adoption intention. Majority of research evaluating the continuance usage scenario do so...
Conference Paper
Full-text available
Cybersecurity is paramount for all public and private sectors for protecting their information systems, data, and digital assets from cyber-attacks; thus, relying on technology-based protections alone will not achieve this goal. This work examines the role of human factors in cybersecurity by looking at the top-tier conference on Human Factors in C...
Article
Full-text available
The market for voice assistants (VAs) and other allied voice-based smart-home products is gradually emerging. The initial growth has been slower than expected; therefore, an in-depth simultaneous intention and diffusion analysis is needed for identifying the relevant factors along with finding out the target consumers. This work uses technology acc...
Article
Full-text available
Consumer Internet of Things (CIoT) is an emerging area being represented by a variety of smart consumer electronic (CE) devices. Often times, there are significant security and privacy issues with these devices, which are unknown to the users when they decide to purchase. While existing CE literatures have investigated the technical aspects of secu...
Article
Full-text available
Online food delivery applications (OFDA) are an emerging area of an online-to-offline (O2O) service delivery platform. In times of the COVID-19 pandemic the OFDA apps can help the restaurant and catering industry to thrive by allowing the consumers to order food from the safety of their homes. In this aspect evaluating the end-to-end service qualit...
Article
Full-text available
The high dropout rate, lack of learners’ motivation, and MOOC users’ diversity are significant issues in MOOCs. In this sense, gamification is used to investigate if it can help to increase MOOC learners’ motivation and engagement, leading to a continued usage scenario. Further, this article aims to propose a theoretical model to identify the facto...
Article
Full-text available
With the growing popularity of the consumer Internet of Things (IoT) devices in the society, there is an urgent need to understand the associated security and privacy risks. Currently, the consumer electronics (CE) community largely ignore the humans in the loop, while framing cybersecurity solutions in the IoT context. In this work, we stress on t...
Conference Paper
Full-text available
Humans are often considered to be the weakest link in the cyber-security chain. However, traditionally the Computer Science (CS) researchers have investigated the technical aspects of cybersecurity, focusing on the encryption and network security mechanisms. The human aspect although very important is often neglected. In this work we carry out a sc...
Article
With the advent of various Internet of Things (IoT) technologies, smart-homes have become an important application area. However, the low end-user penetration of the smart-home market as of 2021 points out towards the fact that the users are resistant to use home IoT and smart-home solutions. Privacy concerns is an important factor that hinders the...
Article
Full-text available
Studying computer programming requires not only an understanding of theories and concepts but also coding adeptness. Success in studying or conducting such a course is definitely a challenge. This paper proposes a systematic learning style recommendation. The model is designed to evaluate students’ attributes and ongoing or formative learning outco...
Article
Full-text available
The Voice Assistant (VA) market is emerging rapidly. Considering the unique features of voice technology, primarily with respect to its ability to provide a total hands-free way of communication, existing technology acceptance models might not be comprehensive enough to explain the users’ attitudes towards using this technology. Moreover, extant re...
Conference Paper
Full-text available
Voice Assistants (VAs) have grown in popularity over recent years and forecasted for exceptional growth over the coming years. Yet many issues still exist which prevent their adoption. Therefore, the usability of VAs is the crucial area that recent research should focus on, keeping in mind their commercialization aspect. This study aims to construc...
Article
Online shopping is an emerging trend throughout the world. Likewise, it is used in China among Chinese consumers, but not all foreigners use it frequently due to several factors. This study discussed those factors which cause hindrance for foreigners to use online shopping and their behavior towards it. To do so, the authors have proposed the model...
Article
Drawing on the social exchange theory, this research examines how inclusive leaders foster innovative work behavior and creativity in employees. Data were collected in two steps from the 320 employees working in Chinese R&D organizations to draw the result for this research. The findings indicate a positive impact of inclusive leadership on innovat...
Article
Full-text available
Currently, the use of voice-assistants has been on the rise, but a user-centric usability evaluation of these devices is a must for ensuring their success. System Usability Scale (SUS) is one such popular usability instrument in a Graphical User Interface (GUI) scenario. However, there are certain fundamental differences between GUI and voice-based...
Article
Full-text available
This work proposes a theoretical framework for explaining the end users’ willingness to disclose their personal information to the IoT service providers, despite the known privacy risks. The Communication Privacy Management Theory and Privacy Trust Behavioral Intention Model are used as the backbone for the presented framework. The model is empiric...
Conference Paper
Full-text available
The growing participation of educational institutions in the movement of massive open online courses (MOOCs) generates a great multitude of opportunities and challenges. Firstly, the high dropout rate and the lack of learners' motivation are significant issues in MOOCs, which cast doubt on the quality of teaching and learning. Secondly, MOOC users'...
Article
Full-text available
Physical closure of educational institutes worldwide due to the COVID-19 pandemic has resulted in the emergence of a new era of video-based learning. The current circumstances are unique that have forced students to use digital technologies for their learning purpose. However, the successful usage of such a system relies on the understanding of the...
Article
Full-text available
Rapid enhancements in the Internet of Things (IoT) and other technologies have resulted in the emergence of various types of smart IT products like the voice assistants (VAs). Accordingly, several attempts have been made through extant research for explaining the acceptance of these devices by using different models related to technology acceptance...
Article
The COVID-19 pandemic has resulted in a physical shutdown of all types of educational institutes worldwide due to which the education delivery has now shifted to an "online only" exclusivity model. In this perspective, perceived usability of the online learning platforms that are currently being used is an important aspect, especially due to the ab...
Article
The use of commercially available voice assistants (VA) that enable personal data collection on a large scale is on the rise. However, knowledge discovery on such data can lead to the violation of various privacy issues. This article presents the various stakeholders who are a part of this privacy regime, along with a detailed taxonomy of the vario...
Article
Full-text available
The purpose of this research is to examine the factors affecting the willingness to disclose personal information based upon the privacy calculus framework and its relation to the continued usage of the Voice Assistant (VA) devices. The information disclosure is analyzed from a dual channel benefit/risk perspective through the calculus lens. Partic...
Conference Paper
Full-text available
Massive Open Online Courses (MOOC) are gaining in popularity in recent years. However, there are certain well-known drawbacks of MOOCs like lack of student motivation, student engagement, and high dropout rates, which cast doubt on the success of MOOCs. Gamification, on the other hand, uses the concept of games but applied to a non-gaming context p...
Article
Full-text available
This work aims to examine the underlying factors associated with the continuous usage of smartwatches and propose a relevant theoretical framework. In order to understand and correlate the exact user motivations and expectations before and after using a smartwatch, a dual approach is taken comprising of a detailed literature review with thematic an...
Article
Full-text available
This work develops a theoretical model to examine the trust building process in an Internet of Things (IoT) based wearable platform. Specifically, various antecedents of trust are considered and its mediating role in the continuance usage intention of the wearables is studied. We also consider the moderating effect of personal innovativeness. An em...
Article
Of late, there has been a steep rise in the smart-wearable market. To continue this growth, it is necessary to maintain a certain level of quality of experience (QoE) as perceived by the end-users. This article attempts to create a QoE model based upon the end-user perception of using smartwatches and fitness-trackers. The QoE is evaluated from a d...
Article
Full-text available
A rapid growth in the smart-wearable industry is making it increasingly important to cater to the Quality of Experience (QoE) requirements of the end-users. In this work, we try to model the relationship between human experience and quality perception in relation to the smart-wearable segment. For this, the concepts of Quality of Data (QoD) and Qua...
Article
Full-text available
There has been a rapid growth in the Internet of Things (IoT) enabled smart-homes recently. Although, these IoT powered smart-homes offer new opportunities, their household penetration is quite low. The main objective of this research is to develop a better understanding of the reasons underlying the end user resistance to the adoption of the IoT e...
Conference Paper
Full-text available
Recently there has been a tremendous growth in various Internet of Things (IoT) applications like healthcare, surveillance systems, environment monitoring, smart grids, and much more. These applications vary significantly not only with respect to their functionalities, but also in terms of the underlying technologies. The traditional approaches of...
Article
Full-text available
Smart-cities are an emerging paradigm containing heterogeneous network infrastructure, ubiquitous sensing devices, big-data processing and intelligent control systems. Their primary aim is to improve the quality of life of the citizens by providing intelligent services in a wide variety of aspects like transportation, healthcare, environment, and e...
Article
Full-text available
Smart-cities are an emerging paradigm containing heterogeneous network infrastructure, ubiquitous sensing devices, big-data processing and intelligent control systems. Their primary aim is to improve the quality of life of the citizens by providing intelligent services in a wide variety of aspects like transportation, healthcare, environment, and e...
Article
Full-text available
A rapid increase in the percentage of elderly people over the past few years has been a cause of serious concern among the research fraternity worldwide. Active research is being carried out to leverage the benefits of information and communication technologies that enable them to live independently and promote a sense of overall well-being. Smart-...
Conference Paper
Full-text available
Over the past few years there has been a steady increase in the number of videos being watched online on a mobile device. This is evident from the widespread popularity of streaming services like YouTube, Netflix, Hulu, etc. The underlying streaming technology is also gradually shifting from the classic non-adaptive form to a more adaptive one. In...
Article
Full-text available
Over the past few years there has been an exponential increase in the amount of multimedia data being streamed over the Internet. At the same time, we are also witnessing a change in the way quality of any particular service is interpreted, with more emphasis being given to the end-users. Thus, silently there has been a paradigm shift from the trad...
Article
Full-text available
Although an Internet-of-things (IoT) based smart home solution can provide an improved and better approach to healthcare management, yet its end user adoption is very low. With elderly people as the main target, these conservative users pose a serious challenge to the successful implementation of smart home healthcare services. The objective of thi...
Article
Full-text available
The percentage of the elderly population has been on the rise steadily over the past few years across the globe, which is a cause of serious concern among the research fraternity. A lot of research is going on that tries to harness the benefits of the various information and communication technologies to enable these elderly people to live independ...
Article
Full-text available
This paper presents a novel acceptance model for an online music streaming scenario of Thailand. The music streaming industry has been gaining in popularity in the recent times. This research has been conducted in order to measure the user attitude towards the use of this relatively new service using a modified version of the popular Technology Acc...
Article
Full-text available
Online video streaming is one of the most popular yet challenging services being used today where the Internet Service Providers (ISP’s) need to guarantee certain assured service quality level for the end user. However, as the data transmission takes place over an unreliable error-prone channel; it is a challenging task for the ISP’s. Normally, the...
Article
Full-text available
The primary aim of this paper is to propose a non-linear regression based technique for mapping different network Quality of Service (QoS) factors to an integrated end-user Quality of Experience (QoE) or Mean Opinion Score (MOS) value for an online video streaming service on a mobile phone. We use six network QoS factors for finding out the user Qo...
Article
Full-text available
We propose a modular no-reference video quality prediction model for videos that are encoded with H.265/HEVC and VP9 codecs and viewed on mobile devices. The impairments which can affect video transmission are classified into two broad types depending upon which layer of the TCP/IP model they originated from. Impairments from the network layer are...
Conference Paper
Full-text available
In the recent times there has been a lot of effort to use the various ICT technologies available to monitor and improve the lifestyle of the older generation. In most of the countries across the globe, these elderly people have to stay alone especially during the daytime, when other family members go out for work. Thus, monitoring their presence an...
Conference Paper
Full-text available
Online video streaming is one of the most promising applications that is being widely used today. Such streaming videos at high definition (HD) resolution or up consume a large network bandwidth. Current generation video codecs like H.265/High Efficiency Video Coding (HEVC) and VP9 are expected to reduce this bandwidth requirement while providing a...
Article
Full-text available
HD video streaming, which is gaining in popularity these days requires a large amount of bandwidth. This has resulted in the emergence of newer codecs like H265/High Efficiency Video Coding (HEVC) and VP9 from Google. These codecs are supposed to provide an excellent video compression to quality ratio. ITU-T describes a standardised parametric mode...
Article
Full-text available
With the introduction of new technologies like the Near Field Communication (NFC), payment today can be done very easily and conveniently using any NFC enabled mobile phone. Although the potential of NFC mobile payment system is tremendous, yet its use is still not widespread and popular. In general, the mobile payment system allows the users to pa...
Article
Transmission Control Protocol(TCP) is implemented in the transport layer of a MANET, which enjoys the advantage of reliable data transmission over the Internet. However, due to certain unique characteristics of a MANET, modification of classical TCP has been done so as to improve its performance in such an environment. Accordingly, several MANET sp...
Article
The complexity of home networks has evolved to a greater level of sophistication and complicacy in the recent times comprising of heterogeneous components like at least two computers, web-enabled high-definition television sets, net-enabled blue ray disc players, iPods and many other such devices. Troubleshooting such a sophisticated smart home net...
Article
Full-text available
It is a very common practice to use network simulators for testing different network performance parameters before the real-life deployment of such a network. Simulation results across different simulators should be in close agreement with each other and must be dependable. Apart from ns-2, few other recent network simulators have come into existen...
Article
Full-text available
The complexity of home networks has evolved to a greater level of sophistication and complicacy in the recent times comprising of heterogeneous components like at least two computers, web-enabled high-definition television sets, net-enabled blue ray disc players, iPods and many other such devices. Troubleshooting such a sophisticated smart home net...

Network

Cited By