scholarly journals Toward Social Media Content Recommendation Integrated with Data Science and Machine Learning Approach for E-Learners

Symmetry ◽  
2020 ◽  
Vol 12 (11) ◽  
pp. 1798 ◽  
Author(s):  
Zeinab Shahbazi ◽  
Yung Cheol Byun

Electronic Learning (e-learning) has made a great success and recently been estimated as a billion-dollar industry. The users of e-learning acquire knowledge of diversified content available in an application using innovative means. There is much e-learning software available—for example, LMS (Learning Management System) and Moodle. The functionalities of this software were reviewed and we recognized that learners have particular problems in getting relevant recommendations. For example, there might be essential discussions about a particular topic on social networks, such as Twitter, but that discussion is not linked up and recommended to the learners for getting the latest updates on technology-updated news related to their learning context. This has been set as the focus of the current project based on symmetry between user project specification. The developed project recommends relevant symmetric articles to e-learners from the social network of Twitter and the academic platform of DBLP. For recommendations, a Reinforcement learning model with optimization is employed, which utilizes the learners’ local context, learners’ profile available in the e-learning system, and the learners’ historical views. The recommendations by the system are relevant tweets, popular relevant Twitter users, and research papers from DBLP. For matching the local context, profile, and history with the tweet text, we recognized that terms in the e-learning system need to be expanded to cover a wide range of concepts. However, this diversification should not include such terms which are irrelevant. To expand terms of the local context, profile and history, the software used the dataset of Grow-bag, which builds concept graphs of large-scale Computer Science topics based on the co-occurrence scores of Computer Science terms. This application demonstrated the need and success of e-learning software that is linked with social media and sends recommendations for the content being learned by the e-Learners in the e-learning environment. However, the current application only focuses on the Computer Science domain. There is a need for generalizing such applications to other domains in the future.

2018 ◽  
Vol 44 (2) ◽  
pp. 433-454 ◽  
Author(s):  
Corinne Amel Zayani ◽  
Leila Ghorbel ◽  
Ikram Amous ◽  
Manel Mezghanni ◽  
André Péninou ◽  
...  

Purpose Generally, the user requires customized information reflecting his/her current needs and interests that are stored in his/her profile. There are many sources which may provide beneficial information to enrich the user’s interests such as his/her social network for recommendation purposes. The proposed approach rests basically on predicting the reliability of the users’ profiles which may contain conflictual interests. The paper aims to discuss this issue. Design/methodology/approach This approach handles conflicts by detecting the reliability of neighbors’ profiles of a user. The authors consider that these profiles are dependent on one another as they may contain interests that are enriched from non-reliable profiles. The dependency relationship is determined between profiles, each of which contains interests that are structured based on k-means algorithm. This structure takes into consideration not only the evolutionary aspect of interests but also their semantic relationships. Findings The proposed approach was validated in a social-learning context as evaluations were conducted on learners who are members of Moodle e-learning system and Delicious social network. The quality of the created interest structure is assessed. Then, the result of the profile reliability is evaluated. The obtained results are satisfactory. These results could promote recommendation systems as the selection of interests that are considered of enrichment depends on the reliability of the profiles where they are stored. Research limitations/implications Some specific limitations are recorded. As the quality of the created interest structure would evolve in order to improve the profile reliability result. In addition, as Delicious is used as a main data source for the learner’s interest enrichment, it was necessary to obtain interests from other sources, such as e-recruitement systems. Originality/value This research is among the pioneer papers to combine the semantic as well as the hierarchical structure of interests and conflict resolution based on a profile reliability approach.


2013 ◽  
Vol 4 (2) ◽  
pp. 9-18
Author(s):  
Mohd Faiz Hilmi ◽  
Shahrier Pawanchik ◽  
Yanti Mustapha ◽  
Hafizi Muhamad Ali

The advancement of information technology has changed the education landscape. The process of teaching is no longer the same. Information technology has made e-learning possible and available on a large scale. The main component of an e-learning is a learning management system (LMS). LMS has been widely used and are accessible through the Internet. By connected and accessed to the Internet, LMS are exposed to various threats. Proper understanding of these threats combined with strategy and best practices countermeasures will ensure a safe learning environment. Therefore this study will look into the information security aspect of LMS. There are two main purpose of this study. First, this study provides a review of information security in e-learning environments and explains the important of information security. Confidentiality, integrity and availability are considered to be the primary pillars of information security. In addition to these pillars, the International Information Systems Security Certification Consortium introduced a common body of knowledge (CBK) comprised of ten domains relating to specific information security topics. These domains are the foundation of security practices for those involved in information security. In this article, each of these is explained within an e-learning context. It is recommended that institutions employing e-learning adhere to these domains. By applying the principles and practices associated with each domain, e-learning institutions should be able to provide an e-learning system with high confidentiality, integrity and availability. The second purpose of this study is to understand student perception of an information security perspective of an e-learning management system. To achieve this purpose, a survey was conducted targeted at undergraduate students in a distance learning program. 497 students responded to a survey questionnaires. Apart from demographics information, the survey asked the respondent to rate six statements related to how they perceived security of the learning management system which they are currently using. All six statements are rated using a five point Likert scale anchored at 1 (Not at all) to 5 (Very much). Frequencies analysis was conducted to show the profile of the respondent. Overall, respondent has strong positive perceptions towards security of their LMS. This study provides an overall picture of information security elements of a learning management system. It can serve as an introduction which help LMS administrator to understand the issues and possibilities related to the safety of LMS.


2019 ◽  
Vol 31 (2) ◽  
pp. 83-104 ◽  
Author(s):  
Silvester Ivanaj ◽  
Grâce-Blache Nganmini ◽  
Alain Antoine

This article examines the factors of e-learners' perceptions of service quality in terms of the physical appearance of the learning management system, students' assurance of personnel's level of knowledge, and the customized attention to students' needs. The authors use a survey to measure the five dimensions of the SERVQUAL scale, adapted to the e-learning context. A total of 325 responses were obtained. To validate their scale, the authors performed exploratory and confirmatory factor analyses. They found that the most important determining factors for e-learning are: ergonomics, corresponding to the attractiveness of the e-learning system; assurance, corresponding to instructors' ability to satisfy students' needs; and empathy, corresponding to the attention given to each individual student. The authors also found that in the context of e-learning, the relative importance of the dimensions of perceived quality is different from what is typically observed in more traditional services. Their findings enable educational institutions to improve their understanding of the expectations and perceptions of e-learners.


Author(s):  
Ismail M. Romi

E-learning is used by higher education institutions and corporate training institutes as a means of solving performance problems, and the accessibility to educational technology which considered as vital for acquisition and dissemination of knowledge to students, as well as interaction between instructors and students. To determine technological solutions for those institutions, an analysis to the literature, and related theories have been conducted depending on the context impact to e-learning system, as well as the interrelationship between e-learning system components and its impact on learner performance. The main findings show that e-learning system is composed of four components, mainly; the instructor, learner, course, and information and communication technologies (ICT), in addition to the context determinants of e-learning system success. The current study, proposed a model for e-learning success, which incorporates eight factors, mainly; e-learning context that include individual, institutional, and environmental determinants to e-learning success. In addition to e-learning components which include instructor, learner, course, and ICT. As well as the learner performance, that aims to measure e-learning success. The proposed model was designed to integrate prior research in the area of e-learning, where it adds set of determinants to e-learning systems success, and find out the best fit of e-learning system components. Moreover, educational institutions can use this proposed model.


2020 ◽  
Vol 9 (3) ◽  
Author(s):  
Tri Padila Rahmasari ◽  
Gesty Mika Juwani ◽  
Pupe Piliani ◽  
Roza Linda

Today, in a pandemic situation, the learning system in schools is now being diverted through Distance Learning (PJJ). The challenge that must be resolved by educators are to present a PJJ concept that is in the line with the free learning policy. The success of education today is largely determined by the approach used, especially for chemistry subjects that have high urgency at the SMA/MA level. One approach that is considered suitable to be applied is the heutagogy approach, integrated with using social media in learning. YouTube can be used as publication media in Project-Based Learning (PjBL). The form of research that used is library research and descriptive analysis methods as technique analysis. This application helps increase creativity because it starts with fundamental questions that encourage students' curiosity. This learning concept can still be used as alternative learning that can increase creativity when this pandemic over.


2017 ◽  
Vol 1 (2) ◽  
Author(s):  
Akbar Akbar ◽  
Nugroho Nugroho ◽  
Lazuardi Lazuardi

Information technology can not be denied that it has proved to be very large in the advancement and improvement of the quality of education in this country. Development towards e-learning education is a must for the quality standards of education can be improved because e-learning is a use of digital technology that can deliver a wide range of information in learning. The availability of hardware, software and other supporting facilities such as the internet network at the Faculty of Public Health University Muhammadiyah Aceh can be used as much as possible so that the transformation of education from the conventional learning system into a digital learning system by using e-learning is based on information technology.The design of this study was quantitative and qualitative research with action research approach. The subjects in this study purposive sampling determined by the number of 33 people consisting of elements of the leadership, faculty, and students. Instrument research include guidelines for in-depth interviews, observation guides, brainstorming guides, questionnaires, field notes and other devices in accordance with the development course of study. Has developed a digital learning system using the Dokeos. From the aspect of technology has been supported for the hardware and software. Overall the respondents have used e-learning system and no major obstacles. The results of the evaluation of the degree of ease of reaching the average value of 4.25 with a range from 4.18 to 4.36, the willingness of the average utilization reached a value of 3.89 with a range from 2.29 to 4.75 and also the willingness to support an average of value of 4.83 with a range between 4.39 to 5.0. Thus, it can be seen that the whole has a value above the median number = 3, which means the respondents felt a satisfaction which is felt by the high compliance is expected.Keywords: E-Learning, Dokeos Platform, Information Technology, Education


Processes ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 1454
Author(s):  
Aziz Ilyosov ◽  
Alpamis Kutlimuratov ◽  
Taeg-Keun Whangbo

Recently proposed recommendation systems based on embedding vector technology allow us to utilize a wide range of information such as user side and item side information to predict user preferences. Since there is a lack of ability to use the sequential information of user history, most recommendation system algorithms fail to predict the user’s preferences more accurately. Therefore, in this study, we developed a novel recommendation system that takes advantage of sequence and heterogeneous information in the candidate-generation process. The principle underlying the proposed recommendation model is that the new sequence based embedding layer in the model catches the sequence pattern of user history. The proposed deep-learning model may improve the prediction accuracy using user data, item data, and sequential information of the user’s profile. Experiments were conducted on datasets of the Korean e-learning platform, and the empirical results confirmed the capability of the proposed approach and its superiority over models that do not use the sequences of the heterogeneous information of users and items for the candidate-generation process.


Author(s):  
Cerstin Mahlow

In this chapter the author discuss the introduction of an e-learning system to enhance teaching and learning at a university. The focus is on the decision process choosing a system. Abstract criteria and feature lists are not sufficient for choosing the right e-learning software, even if all stakeholders and their respective requirements are heard. The author argues that “soft” factors should be considered when evaluating e-learning software: (1) The age of the students and their level of education, (2) the pedagogical guidelines and the culture of teaching and learning of the university, and (3) the educational scenarios in lectures and seminars. These factors seem to be only small details and are typically neither mentioned in the requirements nor in the feature lists of e-learning software. Therefore the author proposes that institutions should evaluate prospective systems in real-world scenarios. As a case in point, the author will outline a number of significant differences between two e-learning systems with a focus on pedagogical aspects. The systems can be seen as representative for a certain class of systems; both offer all features that are commonly seen as the most relevant when making a decision for a university e-learning system.


Author(s):  
Rezky Dwi Amaliah Nadir ◽  
Hisyam Athaya ◽  
Dana Indra Sensuse ◽  
Kautsarina ◽  
Ryan Randy Survono

2019 ◽  
Vol 7 (1) ◽  
pp. 9-17
Author(s):  
Rio Wirawan

Abstract.  Weak security of information in particular in e-learning systems can open the risk of harming the elements that exist within the system environment. So this research has the purpose to analyze the fraud or attacks that are usually done by users and identify patterns of behavior or attitudes that allow damage to the security system in e-learning. This study aims to identify the level of awareness of users, especially students in using e-learning system. This study uses an experimental method of user e-learning in computer science faculty UPN "Veteran" Jakarta where the end result of this research is to identify the level of awareness of the user to the security of e-learning system.Abstrak. Lemahnya keamanan informasi pada khususnya dalam sistem e-learning dapat membuka resiko yang merugikan elemen-elemen yang ada didalam lingkungan sistem tersebut. Sehingga penelitian ini memiliki tujuan untuk menganalisa kecurangan maupun serangan yang biasa dilakukan oleh pengguna dan mengidentifikasikan pola perilaku ataupun sikap yang memungkinkan merusak sistem keamanan pada e-learning. Penelitian ini memiliki tujuan untuk mengidentifikasi tingkat kesadaran pengguna terutama mahasiswa dalam menggunakan sistem e-learning. Studi ini menggunakan metode eksperimental terhadap user e-learning di lingkungan fakultas ilmu komputer UPN “Veteran” Jakarta dimana hasil akhir dari penelitian ini adalah pengindentifikasian tingkat kesadaran user terhadap keamanan sistem e-learning.


Sign in / Sign up

Export Citation Format

Share Document