About
294
Publications
87,266
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,407
Citations
Introduction
I am an Information Systems Engineer with research interests in Computer Science Education, Educational Technology, and Functional Programming.
Current institution
Publications
Publications (294)
Purpose
This study investigates the effectiveness of problem-based learning (PBL) in information literacy curricula using library e-resources to enhance information literacy self-efficacy (ILSE) of students in two universities in Indonesia, in Java Island (University A) and Sumatra Island (University B).
Design/methodology/approach
A comparison of...
This study analyzed anonymous peer feedback among two groups of university students—a lower-performing class and a higher-performing class. Students used an audience response system to anonymously comment on each other’s work. Each peer feedback or comment was categorized into one of seven types: Praise+, Praise−, Criticism+, Criticism−, Combined P...
Active learning is increasingly of interest within Higher Education. The use of technology provides, in theory, the opportunity for more effective active learning, but in practice the majority of learning technology usage is still for “traditional” approaches. Conventional staff training is failing to address this. The authors’ university has provi...
Reflection writing is a common practice in higher education. However, manual analysis of written reflections is time-consuming. This study presents an automated analysis of reflective writing to analyze reflective writing in CS education based on conceptual Reflective Writing Framework (RWF) and application of natural language processing and machin...
New advances in technology have brought challenges and opportunities for education and instructional methods. Compared with traditional education, the increased use of technology-enhanced blended learning in healthcare and nursing education requires students to take more responsibility for their learning. The use of advanced technology has resulted...
The objectives of this study were threefold: to understand students’ perceptions of activities in a blended learning environment; to determine their preferred learning activities in this context, paralleling the four stages of Kolb’s learning cycle; and to determine the effectiveness of the blended learning used, based on scores achieved in an e-bu...
The growth of textual content in various languages and the advancement of automatic translation systems has led to an increase of cases of translated plagiarism. When a text is translated into another language, word order will change and words may be substituted by synonyms, and as a result detection will be more challenging. The purpose of this pa...
Automatic text summarization is a very complex problem. Despite being intensively researched, automatic summaries are still considered to be of lower quality than manual summaries. This paper introduces a novel HCI approach to web page summarization. The proposed Crowd-Copy Summarizer follows the extractive text summarization approach of summarizin...
Mouse events are widely used as implicit indicators of user attention on web pages. In this study, we investigated a particular pattern of mouse movements, Horizontal Mouse Movements (HMMs), consisting of series of mouse move events in the same horizontal direction, as indicators of users’ current interest. We formally defined HMMs and analyzed HMM...
This paper explores Pointer Assisted Reading (PAR), a reading behavior consisting of moving the mouse cursor (also known as the pointer) along sentences to mark the reading position, similarly to finger-pointing when reading a book. The study shows that PAR is an uncommon reading technique and examines methods to extract and visualize the PAR activ...
Automatic text summarization is a very complex problem. Despite being intensively researched, automatic summaries are still considered to be of lower quality than manual summaries. This paper introduces a novel HCI approach to web page summarization. The proposed Crowd-Copy Summarizer follows the extractive text summarization approach of summarizin...
This paper explores Pointer Assisted Reading (PAR), a reading behavior consisting of moving the mouse cursor (also known as the pointer) along sentences to mark the reading position, similarly to finger-pointing when reading a book. This study shows that PAR is an uncommon reading technique and examines methods to extract and visualize the PAR acti...
Mouse events are widely used as implicit indicators of user attention on web pages. In this study, we investigated a particular pattern of mouse movements, Horizontal Mouse Movements (HMMs), consisting of series of mouse move events in the same horizontal direction, as indicators of users' current interest. We formally defined HMMs and analyzed HMM...
Web analytics Key Performance Indicators (KPIs) are important metrics used to evaluate websites and web pages against objectives. The power of KPIs is in their simplicity. Every web page can be assessed by numeric KPI values, which can be easily calculated, compared, and tracked over time. KPIs highlight the strengths and weaknesses of individual w...
Heatmaps are widely used in web analytics to visualize certain user activities within web pages, including mouse clicks, mouse moves and page scrolling. We propose Copy to Clipboard Heatmaps (CTCHs), to visualize what users copy from web pages. We present an implementation of CTCHs, demonstrate various types of useful information that CTCHs expose...
The need for effective Intelligent Tutoring Systems (ITSs) and automated assessment is increasing. One area of ITSs has become urgent is that of the automated assessment of reflective writing. The reflective writing has been promoted, in higher education, in order to encourage students to think critically about their learning. However, many framewo...
This paper describes the development of a knowledge sharing system architecture based on the knowledge sharing behavior (KSB) of real academicians in public institutions. Semi-structured interviews were conducted with 22 academics who work in Saudi universities to investigate current academics’ KSB and explore academics’ needs for a new knowledge m...
An attractive approach to sharing knowledge in Higher Education Institutions (HEIs) is offered by Best Teaching Practices (BTPs), which results from the accumulation of academics’ experiences gained through years of teaching. Many universities still struggle in documenting, sharing and applying the knowledge gained by instructors. Low quality BTP d...
The accuracy of a framework for annotating reflective writing can be increased through the evaluation and revision of the annotation scheme to ensure the reliability and validity of the framework. To our knowledge, there is a lack of literature related to the accuracy of any reflective writing framework in Computer Science (CS) education. This pape...
Knowledge management (KM) is considered as a significant source of success in many organisations, specifically higher education institutions. Instructors generate a considerable amount of valuable teaching-related knowledge that should be identified and shared among communities of instructors to enhance informal learning and deliver better quality...
Automatic analysis of reflective writing involves identifying indicator strings and using string matching or rule matching processes, which flag sections of a text containing reflective material. The problem with the string-based approach is its inability to deal with knowledge inference from the text, such as the content, context, relevance, clari...
The use of mobile technology to support teaching and learning in schools, has extended technology learning tools in schools across different socio economic divides. There have been various studies throughout the world which reflect the improvement of such technology in schools. In this chapter we reflect on a series of studies conducted in developi...
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these technique...
E-learning, as a direct result of the integration of technology and education, has emerged as a powerful medium of learning particularly using Internet technologies. The undeniable significance of e-learning in education has led to a massive growth in the number of e-learning courses and systems offering different types of services. Thus, evaluatio...
In this poster we present a novel conceptual framework for enhanc- ing the sharing of best teaching practices among academics. The proposed framework is constructed based upon the understanding and mapping of the [1] knowledge creation theory.
Many disciplines already embed reflective practice in their curriculum as it is important for the professional development of their students. Many frameworks have been developed to capture reflective practice, but there is a lack of knowledge about what constitutes it in computer science education (CSE). This poster introduces a reflective writing...
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers. T...
The Koli Calling International Conference on Computing Education Research is a single-track conference dedicated to publishing high quality work on teaching and learning in the computing disciplines. The 18th Koli Calling will be held from 22-25 November 2018 in the Koli National Park in Finland, organized by the University of Warwick, the Universi...
Open responses form a rich but underused source of information in educational data mining and intelligent tutoring systems. One of the major obstacles is the difficulty of clustering short texts automatically. In this paper, we investigate the problem of clustering free-formed questionnaire answers. We present comparative experiments on clustering...
The Koli Calling International Conference on Computing Education Research is a single-track conference dedicated to publishing high quality work in all areas of teaching and learning in the computing disciplines. The 17th Koli Calling was held in November 2017, as per tradition, in the Koli National Park in Finland, organized by the University of E...
This study proposes a semantic-based approach for reflective writing analysis to overcome the limitations of existing shallow processing approaches. The semantic analysis examines the meaning of linguistic input that depends mainly on transferring words, phrases and sentences into concepts in knowledge sources, such as WordNet-Affect and analysing...
Activities of prominent terrorist groups like Boko Haram, Al-Shabaab, Ansaru, and Ansar Dine have left thousands of people dead and properties destroyed for a number of decades in some developing nations. The high level of insecurity occasioned by operations of terror groups has impacted negatively on the socio-economic development of these nations...
Activities of prominent terrorist groups like Boko Haram, Al-Shabaab, Ansaru, and Ansar Dine have left thousands of people dead and properties destroyed for a number of decades in some developing nations. The high level of insecurity occasioned by operations of terror groups has impacted negatively on the socio-economic development of these nations...
Knowledge sharing has become a significant source of success in knowledge management. In many organizations, knowledge management is often inadequate when it comes to web-based knowledge sharing, particularly among academics who work in Saudi universities. To ensure that a knowledge sharing system can be well implemented when communicating internal...
Recent research has led to the emergence of ontology-based question generation and aims to benefit instructors by providing support and intelligent assistance for the automatic generation of questions. However, existing ontologies are not designed mainly for this purpose, and the concern is that an ontology will not be competent enough to act as a...
Recent research has led to the emergence of ontology-based question generation and aims to benefit instructors by providing support and intelligent assistance for the automatic generation of questions. However, existing ontologies are not designed mainly for this purpose and the concern is that an ontology will not be competent enough to act as a s...
The gamification of e-portfolio is an educational approach to motivate students to learn by using game elements in online portfolios. The goal is to increase enjoyment and engagement through capturing the interest of learners and encouraging them to continue learning. This preliminary survey is important to better understand the intended users in a...
The gamification of e-portfolios is an educational approach to motivate students to learn by using game elements in online portfolios. The goal is to increase enjoyment and engagement through capturing the interest of learners and encouraging them to continue learning. This preliminary survey is important to better understand the intended users in...
Computer Science Educationalists have implemented educational taxonomies which enhance the pedagogy for introductory programming modules. The SOLO taxonomy has been applied to measure students’ cognitive abilities in programming by classifying students’ exam answers. However, SOLO provides a generic framework that can be applied in different discip...
The dramatic growth and rapid expansion in providing online courses together with the increasing interest in distance learning and budget restrictions have resulted in increasing adoption of various kinds of online learning systems in Higher Education (HE) institutes. This introduces new challenges, redefining the roles of learning stakeholders in...
This article theorises the functional relationship between the human components (i.e., scholars) and non-human components (i.e., structural configurations) of academic domains. It is organised around the following question: in what ways have scholars formed and been formed by the structural configurations of their academic domain? The article uses...
Providing online course materials on the course website has become standard practice in most institutions. These materials are intended to support students’ study after class and especially revision before an examination. Most students download and print out these online materials uploaded by teacher, which reduces the advantages of being online. B...
The use of mobile technology to support teaching and learning in schools, has extended technology learning tools in schools across different socio economic divides. There have been various studies throughout the world which reflect the improvement of such technology in schools. In this chapter we reflect on a series of studies conducted in developi...
Open data are playing a vital role in different communities, including governments, businesses and education. This revolution has had a high impact on the education field. Recently, Linked Data are being adopted for publishing and connecting data on the web by exposing and connecting data, which were not previously linked. In the context of educati...
Mobile devices have been playing vital roles in modern day education delivery as students can access or download learning materials on their smartphones and tablets, they can also install educational apps and study anytime, anywhere. The need to provide adequate security for portable devices being used for learning cannot be underestimated. In this...
Mobile devices have been playing vital roles in modern day education delivery as students can access or download learning materials on their smartphones and tablets, they can also install educational apps and study anytime, anywhere. The need to provide adequate security for portable devices being used for learning cannot be underestimated. In this...
M-learning plays a progressively significant role in the advancement of teaching and learning in higher education. However, the effective implementation of m-learning in higher education will be based on users' experiences and motivation to use this technology. Though m-learning has become global, developing countries such as Nigeria are yet to enj...
Mobile devices such as smartphones and tablets are becoming increasing popular among students, setting out a new way to communicate, collaborate and learn. The use of portable devices has the capability to inspire new approaches to learning. It is therefore important to examine the students " viewpoints about the educational use of mobile technolog...
South Africa’s classrooms are characterised by a wide variety of cultural and linguistic differences, providing teachers with educational challenges, particularly in mathematics and science subjects. In response, various mobile learning systems have been developed and piloted in the North West and Gauteng Provinces of South Africa. A framework has...
This article theorizes the functional relationship between the human components (i.e., scholars) and non- human components (i.e., structural configurations) of academic domains. It is organized around the following question: in what ways have scholars formed and been formed by the structural configurations of their academic domain? The article uses...
The use of online course material is the approach adopted by most universities to support students’ revision, and teachers usually have the responsibility for designing or uploading online materials on their own course websites. However, some teachers might lack programming skills or motivation, and most current online materials are just uploaded i...
This article theorizes the functional relationship between the human components (i.e., scholars) and non-human components (i.e., structural configurations) of academic domains. It is organized around the following question: in what ways have scholars formed and been formed by the structural configurations of their academic domain? The article uses...
Generally, mathematical abilities have a certain degree of importance in computer science education and a correlation between mathematics and programming, derived from small samples, had been suggested. However, our study investigates whether the correlation is statistically significant or not by analysing a large data set spanning nineteen years f...
In this paper, the researchers present a novel framework which derives from the TAM model by testing security and trust effects on the ease of use and on usefulness. A "one shot" case study has been conducted using a new secure email instructional model in order to validate the framework. The study found that security and trust affects the perceive...
Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet students' needs and make knowledge delivery easier. The technology could play a pivotal role in extending the possibilities for teaching, learning , and research in educational institutions. M-learning emerged from this...
Educational content available on the web is playing an important role in the teaching and learning process. Learners search for different types of learning objects such as videos, pictures, and blog articles and use them to understand concepts they are studying in books and articles. The current search platforms provided can be frustrating to use....
Plagiarism has become an increasing problem in higher education in recent years. A number of research papers have discussed the problem of plagiarism in terms of text and source code and the techniques to detect it in various contexts. There is a variety of easy ways of copying others’ work because the source code can be obtained from online source...
Integrating high performance computing (HPC) into a Tanzanian computer engineering curriculum poses a number of challenges. Those challenges arise partly from the students' educational background, and the country's educational history. In this research, the challenges of integrating HPC into Dar es Salaam Institute of Technology (DIT) in Tanzania w...
The massive open online course (MOOC) has seen a dramatic rise in prominence over the last five years and is heralded by some as disrupting existing pedagogy and practices within the education sector, while others are far more sceptical about the impact of MOOCs. Numerous courses are now being offered on a number of different platforms, with partic...
Multilingual classrooms in developing countries are often challenged by a lack of digital resources and technology which supports their multilingual learning process. Code-switching is a phenomenon common to multilingual schools where learners are taught in a language which is not their first language. In these environments, code-switchers frequent...
Digital materials not only provide opportunities as enablers of e-learning development, but also create a new challenge. The current e-materials provided on a course website are individually designed for learning in classrooms rather than for revision. In order to enable the capability of e-materials to support a students revision, we need an effic...
Mobile learning is becoming popular among educators as academic technologies advance. Mobile devices used in mobile learning can potentially become vulnerable if the security aspects are neglected, thereby putting personal information of users at risk. Therefore, for mobile learning applications to work effectively as valuable tools, the security a...
The emerging use of mobile and portable devices in education has potential to motivate new approaches to learning and the prospects of implementing m-learning are already obvious and are public knowledge through many research articles. However, the challenges of adopting m-learning in Nigerian universities are enormous. Apart from security issues t...
The use of mobile devices as learning aids is increasing due to availability and affordability of mobile phones, smartphones and tablets among students. Many learners use their handheld devices not only for calling and texting, but also for educational purposes. Some promoters and developers of mobile learning in universities are developing and del...
The keen adoption of m-learning by higher education institutions on a global scale because of widespread use of mobile devices requires proper security considerations in order not to expose m-learning systems to cyber-attack. M-learning systems normally comprise three components which are the mobile device, one or multiple servers and network devic...
With the emergence of Linked Data principles for achieving web-scale interoperability, and the increasing uptake of open educational content across institutions, Linked Data (LD) is playing an important role in exposing and sharing open educational content on the web. The growing use of the internet has modified quickly our learning habits. Learnin...
With the advent of modern technology, mobile phones and smartphones are used not only for calling and text messages but also for banking and social networking. Recent developments in technology have made the use of mobile devices feasible in other sectors such as education and government. While educators are using mobile devices as teaching aids, s...
The phenomenon of the Massive Open Online Course (MOOC) has spread with amazing speed. Many universities in the USA and Europe are now joining up with MOOC providers to allow free access to courses. Participant numbers for an individual course may reach hundreds of thousands. Expectations are high for what these courses can achieve in terms of open...
The demand for mobile learning has continued to increase due to recent advances in modern technologies. Mobile learning advocates in universities focus their attention mainly on course development, deployment and delivery on handheld devices but they pay little or no consideration to security and privacy of stakeholders' data in the design of mobil...
Perspectives of students on what constitutes source-code plagiarism may differ based on their educational background. Surveys have been conducted with home students undertaking computing and joint computing subject degrees at Higher Education Institutions throughout the UK, China and South Cyprus, and a total of 984 responses have been statisticall...