Anastasios A. Economides

Learn More
The effective development of a computer based assessment (CBA) depends on students’ acceptance. The purpose of this study is to build a model that demonstrates the constructs that affect students’ behavioral intention to use a CBA. The proposed model, Computer Based Assessment Acceptance Model (CBAAM) is based on previous models of technology acceptance(More)
The use of computerized-adaptive testing (CAT) has expanded rapidly the last years mainly due to the advancements in communication and information technology. Availability of advanced mobile technologies provides several benefits to e-learning by creating an additional channel of access with mobile devices such as PDAs and mobile phones. This paper(More)
This paper aims to provide the reader with a comprehensive background for understanding current knowledge on Learning Analytics (LA) and Educational Data Mining (EDM) and its impact on adaptive learning. It constitutes an overview of empirical evidence behind key objectives of the potential adoption of LA/EDM in generic educational strategic planning. We(More)
Collaborative learning outside the classroom is vital for many educational disciplines. Three educational scenarios held outdoors are analysed. In the first scenario, students investigate the ancient architecture, archaeological artefacts and historical location at an archaeological site. In the second scenario, students investigate the environmental and(More)
This paper presents an evaluation instrument for hypermedia courseware. Its design is based on an evaluation framework developed from the integration of a number of important issues emerged from research on instructional design and system evaluation the past fifteen years and is concerned with both social and practical acceptability of hypermedia(More)
Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises, and as such, they(More)
Security is becoming a major concern for many mission-critical applications wireless sensor networks (WSNs) are envisaged to support. The inherently vulnerable characteristics of WSNs appoint them susceptible to various types of attacks. This work restrains its focus on how to defend against a particularly harmful form of attack, the Sybil attack. Sybil(More)