Somya Agrawal

Somya Agrawal
Chaoyang University of Technology · Department of Information Management

PhD
Currently working on the topic of mental well-being in individuals

About

42
Publications
10,236
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
307
Citations
Introduction
Currently, I'm doing studies in the following areas. My research interests include: • Management education • Educational technology • Institutional Research • Team behavior/ team development • Expatriate studies • Mental well-being in individuals
Additional affiliations
August 2020 - present
Chaoyang University of Technology
Position
  • Professor (Assistant)
January 2019 - July 2020
Chaoyang University of Technology
Position
  • PostDoc Position
Education
September 2014 - June 2018
National Chung Hsing University
Field of study
  • Management education
June 2009 - March 2011
Symbiosis Institute of Telecom Management, Symbiosis International University
Field of study
  • Telecom Management (Systems and Finance)
June 2005 - June 2009
Cummins College of Engineering for Women
Field of study
  • Electronics and Telecommunication

Publications

Publications (42)
Article
Full-text available
Millennials and Gen Z now dominate the global workforce, each with distinct reward preferences influencing motivation and creativity. Understanding these distinctions is critical for improving employee retention and performance. This research aims to evaluate the efficacy of intrinsic and extrinsic rewards for both cohorts. The main goals are to de...
Article
The use of automated feedback (AF) has been increasing in English writing courses for emergency remote education (ERE) due to the escalating COVID-19 pandemic crisis in Vietnam. The ERE English writing courses for in-service bachelor programs demanded an effective, fast, free, and user-friendly AF tool that does not require a login ID, which can he...
Article
Full-text available
Due to the advances in internet communications technology (ICT), the use of digital devices, such as laptops, tablets, or smartphones, in the educational setting has become very common among young people. A considerable body of research has shown that there are adverse effects of in-class internet usage, termed “cyberloafing” on students’ academic...
Article
From an expatriate’s viewpoint, an international job assignment is a high-pressure situation that requires them to adjust as expeditiously as possible. Therefore, a considerable strand of the international human resource management (IHRM) literature is dedicated to the subject of expatriate adjustment. Drawing upon Folkman and Lazarus’ coping frame...
Conference Paper
Due to the rising growth of international collaboration, organizations have a higher need to employ expatriates. Both scholars and practitioners have acknowledged that skill development plays a crucial role in here to mitigate failures in the competitive international business environment. Within this paradigm, studies have highlighted that skill d...
Article
The global rise in energy consumption makes managing energy demands a priority. Here, the potential of Information and Communication Technology (ICT) in controlling energy consumption is still debated. Within this context, the main objective of the current study is to measure the impact of ICT, its potential benefit, and environmental factors on ho...
Article
With the advances of technology and the Internet, computer-based assessment (eassessment) has been in high demand in higher educational institutions (HEIs), especially during the Covid-19 pandemic lockdown, due to the convenience, ease of use, and accuracy. Consequently, this study aims to explore how MOODLE, an open-source learning management syst...
Conference Paper
Full-text available
Mental health conditions such as depression and anxiety have become very common in young individuals which often go unnoticed easily these days. Every year there is a rise in the number of individuals who have undiagnosed anxiety or depression, which can negatively impact their ability to learn and enjoy time in universities. Within this context, t...
Article
Full-text available
The current pandemic has modified how education, learning, and technology interact with one another inside universities. The usage of technology for instructional purposes raises the question of whether learning that happens in an online environment is as effective as traditional classroom models. Within this context, this study explores the psycho...
Article
Full-text available
Data hiding is a technique that embeds a secret message into a cover medium and transfers the hidden information in the secret message to the recipient. In the past, several data hiding methods based on magic matrix have used various geometrical shapes to transmit secret data. The embedding capacity achieved in these methods was often limited due t...
Conference Paper
Education is the key to the quality of human life in the future and providing quality education is the main aim of institutions. However, recently, the coronavirus pandemic (COVID-19) has transformed the mode of delivery of education in the world everywhere. Educational institutes are choosing to stay under a lockdown or have been forced to shift t...
Article
Full-text available
Due to the outbreak of coronavirus pandemic (COVID-19) in recent times, almost all countries have been affected in a drastic way, impacting delivery mode of education in world everywhere. Several schools, colleges and universities are under lockdown or have been forced to provide online education. To meet the existing challenges due to COVID-19, it...
Article
Full-text available
Nowadays, image authentication techniques are widely applied to digital multimedia to address their fraudulent and illegal use. Digital multimedia plays a vital role in various real time applications and therefore, there is a need for the development of more powerful and robust algorithms in order to strengthen their security. In this paper, we pro...
Article
Technology not only allows us to (co-)create, collect, store, and use knowledge and information, but it also enables us to connect with people and resources all over the world, to collaborate in the creation of knowledge, and to distribute and benefit from knowledge products. In this study, two visual and interactive pedagogies in information techn...
Article
Full-text available
Recently, Li et al. proposed a data hiding method based on pixel value ordering (PVO) and prediction error expansion (PEE). In their method, maximum and minimum values were predicted and the pixel values were modified to embed secret data. Thereafter, many scholars have proposed improvisations to the original PVO method. In this paper, a Reversible...
Chapter
Traffic flow is often affected by several stochastic factors and the timely availability of precise travel time data of moving automobiles is valuable for both drivers and the commuters. Public transportation system gives people an option of choosing busses to the passengers to commute which reduces their own vehicle use. However, it often encounte...
Chapter
In order to reduce the gap of digital skills between urban and rural, the ministry of education in Taiwan carried out an e-learning partner project in rural schools. The quality management of education in such schools can improve the performance of training. In the present study, Talent Quality-management System was used to explore the effect of th...
Article
Full-text available
In this paper, we proposed an improvisation to Li et al.’s pixel value ordering (PVO) method and called it as generalized PVO (GePVO), which provides a suitable expansion strategy using the image redundancy more abundantly. GePVO makes use of a reference pixel and calculates prediction errors using both sides of the block in different modes (one-wa...
Article
Full-text available
Medical records are extremely sensitive information and may cause a violation of patients’ rights if the data is captured or altered. Such data requires uncompromising security during transmission or when the data is stored in medical datacenters. The most commonly used procedure is to hide sensitive information inside a cover medium without incurr...
Chapter
With the development of computers and networks, digital data can be transmitted quickly to anywhere in the world. Information security has become the focus of research for several researchers as it is essential to protect the information that is being transferred over the Internet. In 1980, Linde et al. proposed vector quantization (VQ), a simple c...
Chapter
E-commerce has developed rapidly in recent years. Many services and applications integrate IOT technologies are offered. Logistics is a representative application which focuses on rapid delivery, integrity of goods, and the privacy of personal information. This study surveys logistics environment and lists security requirements of past scheme. The...
Article
Full-text available
In recent years, many reversible information hiding methods have been proposed. Among them, the pixel value ordering (PVO) method can be used to create high-fidelity camouflage images under good embedding capacity. The original PVO method adopted the block-by-block manner, and each block could embed only 2 bits. In this study, we propose an overlap...
Article
Full-text available
Recently, sensor networks have emerged as a high-impact research area, and a number of high profile applications have been proposed. Although significant progress has already been made on securing basic network protocols, additional research is needed to produce techniques and methods for protecting canonical tasks in wireless sensor networks. In t...
Article
Although researchers have highlighted that guanxi expedite the flow of resources, their impact on team learning performance is not fully understood. Drawing on data from student teams enrolled in an entrepreneurship program, we established and validated a model exploring interrelationships between guanxi, entrepreneurial leadership and team learnin...
Thesis
With a sharp increase in the number of entrepreneurship programs over the past few decades, researchers have put in more concerted effort to develop an empirically grounded research on the impact of entrepreneurship education. The notion that entrepreneurs are not essentially born but can be developed creates a window of opportunity for educationis...
Article
Full-text available
Purpose Based on group development theories, the purpose of this paper is to evaluate student’s team behavior during different stages of team development. Design/methodology/approach A time-lagged survey method was used to collect data over a period of 18 weeks from 40 undergraduate students enrolled in an entrepreneurship course. Hierarchical l...
Article
Creativity has become a topic of ever-increasing interest in educational settings. Previous researchers have purported that creativity can be learned and taught through training programs; however the question remains as to how it can be kindled within an entrepreneurial educational context. Although several factors shaping team creativity have been...

Questions

Questions (3)
Question
How to interpret the results for control variables if they become significant in Model 2 and Model 3 while doing hierarchical regression analysis? If anyone has a reference paper, please share it.
Question
I have done a short survey and until now, I was able to collect only 100 responses. Not sure if collecting more would be possible. So was wondering, what kind of statistical analysis would support a sample size of 100?
Or if you have any other suggestions, please provide.

Network

Cited By