The Role of IT in Transforming Traditional Education to Digital Learning
Mohammed Fareed Mahdi
International Journal of Computational and Electronic Aspects in Engineering
Volume 4: Issue 4, December 2023, pp 134-147
Author's Information
Mohammed Fareed Mahdi 1
Corresponding Author
1Department of Computer Science, University Of Thi-Qar , 64001 – Iraq
mfmsprof@utq.edu.iq
Abstract:-
This comprehensive research delves into the intricate metamorphosis of conventional education into dynamic digital learning arenas, placing a glaring emphasis on the pivotal role that information technology (IT) assumes in adeptly accommodating the ever-evolving needs of both students and educators. Employing a methodological fusion, this research intricately melds nuanced qualitative insights with meticulously gathered survey data from 30 university students and 30 educators ensconced in the academic bastions of Iraq, subjecting these responses to scrupulous examination through the lens of SPSS. The findings underscored the reverberating impact of IT tools on both the engagement and performance of students, shedding the light on the formidable barriers impeding the embracement of digital learning, and, indispensably, elucidating the transformative role played by IT in amplifying the adaptability of educational practices. This research aspires, with precision and finesse, to contribute calibrated insights geared towards enhancing and elevating the contours of digital learning, within the ambit of advanced and innovative strategies.Index Terms:-
IT Information Technology, Educational Transformation, Traditional Education, Digital EducationREFERENCES
- C. B. Hodges, S. Moore, B. B. Lockee, and M. Bond, "The difference between emergency remote teaching and online learning," ResearchGate, March 2020.
- L. Johnson, NMC Horizon Report: 2016, Higher Education Edition, 2016.
- B. Means, M. Bakia & R. Murphy , Learning online: What research tells us about whether, when and how, Routledge, 2013.
- Dewey, J., Experience and education, The Educational Forum, 1986, pp. 50(3), 241–252.
- Cuban, L, Oversold and underused, 2009.
- Rethinking education in the age of technology, the digital revolution and schooling in America., Choice Reviews Online, 2010, pp. 47(09), 47–5154.
- Selwyn, N, Education and Technology: key issues and debates., 2011.
- K. C. Laudon and J. P. Laudon, Management Information Systems: Managing the Digital Firm.Global Edition, Pearson Higher Ed, 2019.
- W. F. Pinar, What is curriculum theory?, Routledge, 2012.
- B. Means, M. Bakia, and R. Murphy, Learning online: What Research Tells Us About Whether, When and How?, Routledge, 2014.
- Dede, C., Enabling distributed learning communities via Emerging Technologies--Part One., T.H.E. Journal, 2004, pp. 32(2), 12.
- Rideout, V. J., & Katz, V. S., Opportunity for all? Technology and learning in lower-income families, 2016.
- Beatty, Brian, Hybrid-Flexible Course Design: Implementing student-directed hybrid classes., 2019.
- Pane, J. F., Steiner, E. D., Baird, M. D., & Hamilton, L. S., Informing progress: Insights on personalized learning implementation and effects, RAND Corporation, 2017.
- J. Gikas and M. M. Grant, "Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones & social media, vol. 19, The Internet and Higher Education, 2013, pp. 18-26.
- J. Reich and J. A, Ruipérez-Valiente, "The MOOC pivot, vol. 363, Science, 2019, pp. 130-131.
- Al-Hunaiyyan, A., Al-Sharhan, S., & Alhajri, R, A new mobile learning model in the context of the Smart Classrooms environment: a Holistic approach, International Journal of Interactive Mobile Technologies, 2017, pp. 11(3), 39.
- Hamari, J., Koivisto, J., & Sarsa, H., Does Gamification Work?, A Literature Review of Empirical Studies on Gamification, 2014.
- Tirthali, F. M. H. a. D, MOOCs: Expectations and Reality, 2014.
- Tondeur, J., Van Braak, J., Ertmer, P. A., & Ottenbreit-Leftwich, A., Understanding the relationship between teachers’ pedagogical beliefs and technology use in education: a systematic review of qualitative evidence, Educational Technology Research, 2016, pp. 65(3), 555–575.
- Noh, Y, A comparative study of public libraries’ contribution to digital inclusion in Korea and the United States, Journal of Librarianship and Information Science, 2013.
- Albrecht, D. , Financing Universities In Developing Countries, In Routledge eBooks, 2013.
- Hanus, M., & Fox, J. , Assessing the effects of gamification in the classroom: A longitudinal study on intrinsic motivation, social comparison, satisfaction, effort, and academic performance, Computers & Education, 2015, pp. 80, 152–161.
- Chiku E. by D. B. M. ; F. by K. S., , Development of digital libraries : an American perspective, CiNii Books, 2001.
- L. S. Connaway, T. J. Dickey, and M. L. Radford, “‘If it is too inconvenient I’m not going after it:’ Convenience as a critical factor in information-seeking behaviors, vol. 33, Library & Information Science Research, 2011, p. 179–190.
- P. Južnič and B. Pymm, , Practicums as part of study programmes in library and information studies, vol. 22 , AS: Andragoška Spoznanja, 2016, pp. 91-99.
- A. Ansari and N. A. Pm, “Usage of digital library services during COVID-19 pandemic: a study of Indian Institutes of Management (IIMs), Digital Library Perspectives, 2029.
- AUGMENTED STARTUPS, Computer Vision/ AI , "The role of artificial intelligence in cybersecurity," 2023.
Online - A. Kuppa and N.-A. Le-Khac, Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security, 2020 International Joint Conference on Neural Networks (IJCNN), 2020, pp. 1-8.
- A. Kim and B. A. Anderson, Threat reduces value-driven but not salience-driven attentional capture, Vols. 20, no. 5, Emotion, 2020, p. 874–889.
- I Radu, "The impact of AI on cybersecurity: Advantages and disadvantages," 2023.
- A. Yayla, L. Haghnegahdar, and E. Dincelli, Explainable artificial intelligence for smart grid intrusion detection systems, Vols. , vol. 24, no. 5, Sep. 2022: IT Professional, p. 18–24.
- J. Li, Z. Zhao, R. Li, and H. Zhang, AI-Based Two-Stage intrusion detection for software defined IoT networks, Vols. vol. 6, no. 2, IEEE Internet of Things Journal, 2019, p. 2093–2102.
- P. Singh, S. Krishnamoorthy, A. Nayyar, A. Kr. Luhach, and A. Kaur, , Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system, Vols. 15, no. 10, International Journal of Distributed Sensor Networks, 2019, p. 155014771988313.
- W. Samek, T. Wiegand, and K.-R. Müller, “Explainable Artificial intelligence: Understanding, visualizing and interpreting deep learning models, ResearchGate, 2017.
- N. Shone, T. N. Ngoc, P. V. Dinh, and Q. Shi, A deep learning approach to network intrusion detection, Vols. 2, no. 1 , IEEE Transactions on Emerging Topics in Computational Intelligence, 2018, p. 41–50.
- M. Wang, K. Zheng, Y. Yang, and X. Wang, An explainable machine learning framework for intrusion detection systems, vol. 8 , IEEE Access, 2020, p. 73127–73141.
- F. Yan, S. Wen, S. Nepal, C. Paris, and Y. Xiang,, Explainable machine learning in cybersecurity: A survey, Vols. vol. 37, no. 12, International Journal of Intelligent Systems, 2022, p. 12305–12334.
- A. A. Bhalerao, B. R. Naiknaware, R. R. Manza, V. Bagal, and S. K. Bawiskar, "Social media mining using machine learning techniques as a survey," in Advances in computer science research, p. 874–889. , 2023.
- P.- Sneha, Natural Language Processing (NLP), Pianalytix: Build Real-World Tech Projects, 2020.
- H. S. Lallie, K. Debattista, and J. Bal, An empirical evaluation of the effectiveness of attack graphs and fault trees in Cyber-Attack perception, Vols. 13, no. 5, EEE Transactions on Information Forensics and Security, 2018, p. 1110–1122.
- A. Almalaq, S. Albadran, and M. A. Mohamed, Deep Machine Learning Model-Based Cyber-Attacks detection in smart power systems, Vols. vol. 10, no. 15, Mathematics, p. 2574.
- J. Van Der Waa, E. Nieuwburg, A. Cremers, and M. A. Neerincx, Evaluating XAI: A comparison of rule-based and example-based explanations, vol. 291, Artificial Intelligence, 2021, p. 103404.
- F. Xu, H. Uszkoreit, Y. Du, W. Fan, D. Zhao, and J. Zhu, “Explainable AI: A brief survey on history, research areas, approaches and challenges,” in Lecture Notes in Computer Science, 2019, p. 563–574.
- M. Kuzlu, Ü. Cali, V. Sharma, and Ö. Güler, “Gaining insight into solar photovoltaic power generation forecasting utilizing explainable artificial intelligence tools, vol. 8 , IEEE Access, 2020, pp. 187814–187823, .
- S. B. Atiku, Survey On The Applications Of Artificial Intelligence In Cyber Security, 2020.
- C. Rudin, Please stop explaining black box models for high stakes decisions, ArXiv, abs/1811.10154., 2018.
To view full paper, Download here