A STUDY ON LEARNING MANAGEMENT SYSTEM (LMS) COURSE LEARNING EFFECTIVENESS IN THE USER EXPERIENCE CONTEXT

Authors

  • Blessy Doe M Ph.D. Research Scholar (P.T), Bharathiar School of Management & Entrepreneur Development-BSMED, Tamil Nadu, India. Author
  • K. Vivekanandan Professor (Rtd.), Bharathiar School of Management & Entrepreneur Development-BSMED, Bharathiar University, Tamil Nadu, India. Author

Keywords:

Edge Computing, Intrusion Detection Systems (IDS), Artificial Intelligence (AI), Machine Learning, Cybersecurity

Abstract

The goal of this study is to examine the effectiveness of a Learning Management System (LMS) Course among workplace users in terms of user experience. Precisely, to inspect the effectiveness of learning through the experiences and satisfaction gained from encountering LMS quality factors. For analysing the relationship among learner experience and leaner satisfaction on LMS quality factors such as pedagogical design, interface design, content presentation format, transfer of learning, and feedback of learning, their correlation significance were evaluated. Data was gathered from 474 banking professionals working in both the public and private sectors through a questionnaire. The banks chosen were those that already have LMS platforms in place for employee training. The study discovered a significant relationship in the correlation analysis of the factors pedagogical design, interface design, content presentation format, transfer of learning, and feedback of learning, as well as learner experience and satisfaction. It was also discovered that among all the LMS quality factors studied, there found a strong significant relationship between the factors content presentation format and the interface design of the LMS platform.

References

W.Shi, L.Cao, Q.Zhang, R.Li, L.Xu, and D.Zheng, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.

M. Satyanarayanan, “Edge computing, vision and challenges,” in Proceedings of the IEEE, vol. 105, no. 1. IEEE, 2017, pp. 4–12.

R. Mahmud, M.Saha, and A.V.Vasilakos, “Edge computing: A primer,” IEEE Communications Magazine, vol. 56, no. 1, pp. 34–39, 2018.

W.Zhang and Y.Chen, “A survey on intrusion detection systems in edge computing environments,” IEEE Access, vol. 8, pp. 214095–214115, 2020.

Z. Gao, Y. Qian, and Y. Yang, “Security and privacy in edge computing: Challenges and solutions,” Future Generation Computer Systems, vol. 95, pp. 674–686, 2019.

B.Liu,X.Zhang, and Y.Liu, “Security challenges in edge computing: A survey,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5341–5356, 2021.

A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2015.

N. Shone and D. Sharma, “A survey of intrusion detection techniques for cloud computing,” Journal of Network and Computer Applications, vol. 86, pp.1–27, 2018.

H. Kim and K. Pook, “Security issues and challenges in cloud computing,” Journal of Information Security, vol. 9, no. 3, pp. 123–130, 2018.

X. Tan, L. Wang, and Q. Zhang, “Machine learning for intrusion detection in edge computing: A survey,” IEEE Access, vol. 8, pp. 124 567–124 586, 2020.

V.Chandola, A.Banerjee, and V.Kumar, “Anomaly detection: Asurvey,” ACM computing surveys (CSUR), vol. 41, no. 3, pp. 1–58, 2009.

M. Li, W. Zhang, and Y. Liu, “Ai-based intrusion detection systems for IOT: A survey,” IEEE Access, vol. 8, pp. 145375–145392, 2020.

T. Nguyen, Q. Nguyen, and H. Nguyen, “Ai and machine learning for cybersecurity: A survey,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1234–1250, 2021.

P. Ren, S. Wang, and H. He, “Decentralized ai for edge computing: Opportunities and challenges,” IEEE Network, vol. 35, no. 1, pp. 78– 85, 2021.

J. Kim, S. Lee, and J. Park, “Edge intelligence: Paving the way for ai- powered IOT,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4313–4323, 2020.

R. Singh, A. Kumar, and A. Gupta, “Scalable ai models for intrusion detection in edge computing,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 1234–1247, 2022.

L. Zhao, Y. Wang, and X. Chen, “Lightweight machine learning algorithms for resource-constrained edge devices,” IEEE Transactions on Mobile Computing, vol. 19, no. 9, pp. 2003–2016, 2020.

X. Wang, W. Liu, and M. Zhang, “Privacy-preserving techniques for edge computing: A survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2708–2734, 2021.

Q. Yang, Y. Liu, T. Chen et al., “Federated learning: Challenges, methods, and future directions,” in IEEE Signal Processing Magazine, vol. 37, no. 3. IEEE, 2019, pp. 50–60.

C. Molnar, “Interpretable machine learning: Definitions, methods, and applications,” arXiv preprint arXiv:2010.09276, 2020.

A. B. Arrieta, N. Diaz-Rodriguez, J. Del Ser et al., “Explainable artificial intelligence (xai): Concepts, taxonomies, opportunities and challenges toward responsible ai,” Information Fusion, vol. 58, pp. 82–115, 2020.

N. Khattak, H.-I. Lee, and H. Park, “A survey on ai-based intrusion detection systems in edge computing environments,” IEEE Access, vol. 8, pp. 115345–115364, 2020.

J. Moody and M. Merkel, “Cicids2017: A comprehensive dataset for intrusion detection systems,” in Proceedings of the 2017 Annual Conference on Privacy, Security and Trust (PST). IEEE, 2017, pp. 6–16. [24]

B.Liu, X.Zhang, and Y.Liu, “Feature selection techniques for intrusion detection systems in edge computing environments,” IEEE Internet of Things Journal, vol. 8, no. 7, pp. 5341–5356, 2021.

D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in Proceedings of the 3rd International Conference on Learning Representations (ICLR), 2014.

I.Goodfellow, Y.Bengio, and A.Courville, “Deep learning,” MIT Press, 2016.

Downloads

Published

2022-03-07

How to Cite

Blessy Doe M, & K. Vivekanandan. (2022). A STUDY ON LEARNING MANAGEMENT SYSTEM (LMS) COURSE LEARNING EFFECTIVENESS IN THE USER EXPERIENCE CONTEXT. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS (IJITMIS), 13(1), 1-14. https://lib-index.com/index.php/IJITMIS/article/view/IJITMIS_13_01_001