2012 15th International Conference on Interactive Collaborative Learning (ICL) 2012
DOI: 10.1109/icl.2012.6402213
|View full text |Cite
|
Sign up to set email alerts
|

Applying JESS rules to personalize Learning Management System(LMS)using online quizzes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 3 publications
0
1
0
Order By: Relevance
“…Although many studies have tackled the importance of e-learning platforms in educational environments, exploring students' perception [6,[12][13][14][15][16][17], few have investigated the effectiveness of online classes once traditional classes are resumed, with emphasis on the information richness (IR) of the three dimensions of situation awareness (SA). SA can be defined as the perception of information that ensures that users can interpret the content presented in an online class.…”
Section: Introductionmentioning
confidence: 99%
“…Although many studies have tackled the importance of e-learning platforms in educational environments, exploring students' perception [6,[12][13][14][15][16][17], few have investigated the effectiveness of online classes once traditional classes are resumed, with emphasis on the information richness (IR) of the three dimensions of situation awareness (SA). SA can be defined as the perception of information that ensures that users can interpret the content presented in an online class.…”
Section: Introductionmentioning
confidence: 99%
“…Zero-trust architecture (ZTA) signifies a significant evolution in the approach to banking security. Unlike traditional perimeter-based security models (AlHamad et al, 2012), ZTA hinges upon the core concept of "never trust, always verify." This approach mandates the continuous authentication and authorisation of all users and actions seeking to interact with data.…”
Section: Methods Big Data In Bankingmentioning
confidence: 99%
“…Banks can leverage differential privacy to generate insights that are compliant with privacy regulations, maintaining customer trust while driving informed decision-making. The strategic adoption of these advanced encryption techniques significantly bolsters banks' security posture (AlHamad et al, 2012;Zhang et al, 2019). By safeguarding the privacy and integrity of financial records during various stages of use -whether in transit, at rest, or during collaborative processing -these techniques proactively mitigate the risk of unauthorised data access and breaches.…”
Section: Methods Big Data In Bankingmentioning
confidence: 99%
“…Zero-trust architecture (ZTA) signifies a significant evolution in the approach to banking security. Unlike traditional perimeter-based security models (AlHamad et al, 2012), ZTA hinges upon the core concept of "never trust, always verify." This approach mandates the continuous authentication and authorisation of all users and actions seeking to interact with data.…”
Section: Methods Big Data In Bankingmentioning
confidence: 99%
“…Banks can leverage differential privacy to generate insights that are compliant with privacy regulations, maintaining customer trust while driving informed decision-making. The strategic adoption of these advanced encryption techniques significantly bolsters banks' security posture (AlHamad et al, 2012;Zhang et al, 2019). By safeguarding the privacy and integrity of financial records during various stages of use -whether in transit, at rest, or during collaborative processing -these techniques proactively mitigate the risk of unauthorised data access and breaches.…”
Section: Methods Big Data In Bankingmentioning
confidence: 99%