incollections by Jason Wells
Papers by Jason Wells
When a student commences a course of study that includes an online component the initial feedback... more When a student commences a course of study that includes an online component the initial feedback academics receive can reflect their fear of the online concept, their bias against the use of technology, as well as difficulties they may have encountered with using the supporting technologies rather than with online learning per se. In second semester 2002, an evaluation of an online unit in the B. Computing was conducted at the end of the semester to gain a better understanding of students’ perceptions of online learning as well as the effectiveness of the technologies that support these activities. We report some preliminary results from the evaluation. Initial indications are that poor first impressions are reflected in students’ perceptions of the overall online learning experience. We highlight some areas, normally considered outside the immediate domain of eLearning, that must be attended to in order to minimise the potential negative impact on students, maximise th...
Journal of Information Technology Education: Research, 2021
Aim/Purpose: This paper focuses on understanding undergraduate computing student-learning behavio... more Aim/Purpose: This paper focuses on understanding undergraduate computing student-learning behaviour through reviewing their online activity in a university online learning management system (LMS), along with their grade outcome, across three subjects. A specific focus is on the activity of students who failed the computing subjects. Background: Between 2008 and 2020 there has been a multiplicative growth and adoption of Learning Analytics (LA) by education institutions across many countries. Insights gained through LA can result in actionable implementations at higher institutions for the benefit of students, including refinement of curriculum and assessment regimes, teacher reflection, and more targeted course offerings. Methodology: To understand student activity, this study utilised a quantitative approach to analyse LMS activity and grade outcome data drawn from three undergraduate computing subjects. Data analysis focused on presenting counts and averages to show an understandi...
International journal on e-learning, 2006
Technology-mediated instruction is changing the educational environment by adding another dimensi... more Technology-mediated instruction is changing the educational environment by adding another dimension to teaching and learning. Despite the advances in technology and the way we use technology, little attention has been given to providing technology solutions that help create, conduct, and manage the central task of assessment. Software to manage and conduct assessment presents many challenges. This article examines a stand-alone, flexible software environment designed to provide all the tools required to view, mark, store, and deliver results efficiently while improving the feedback to the students. A description of the software and its functions, the techniques and methods developed to overcome the limitations that software presents when used to conduct assessment is examined. Case studies are presented that describe: (a) the types of assessment the software has been used to conduct and manage; (b) the types of problems that were encountered; and (c) the solutions and techniques tha...
Quality Education @ a Distance, 2003
When a student commences a course of study that includes an online component the initial feedback... more When a student commences a course of study that includes an online component the initial feedback academics receive can reflect their fear of the online concept, their bias against the use of technology, as well as difficulties they may have encountered with using the supporting technologies rather than with online learning per se. In second semester 2002, an evaluation of an online unit in the B. Computing was conducted at the end of the semester to gain a better understanding of students' perceptions of online learning as well as the effectiveness of the technologies that support these activities. We report some preliminary results from the evaluation. Initial indications are that poor first impressions are reflected in students' perceptions of the overall online learning experience. We highlight some areas, normally considered outside the immediate domain of eLearning, that must be attended to in order to minimise the potential negative impact on students, maximise the benefits of learning online and improve the learning experience for students.
IEEE Transactions on Education, 2012
Traditional teaching styles practiced at universities generally do not always suit all students l... more Traditional teaching styles practiced at universities generally do not always suit all students learning styles. Students enrolling in university courses are not always engaging in the learning for many reasons. New methods to create and deliver educational material are available but do not always improve the learning outcomes. Acknowledging these truths and developing and delivering educational material that provides diverse ways for students to learn is a constant challenge. This study examines the use of video tutorials within a university environment in an attempt to provide a model that is valuable to all students and in particular those students that are not engaging in the learning. The results of the study have demonstrated that the use of video tutorials that are well designed, assessment focused and readily available enable and encourage students to learn how they want, when they want, at a pace that suits their needs and based on a three year study have the potential to improve results, student satisfaction and attract those students not engaging in the learning back from failure.
Machine learning and knowledge acquisition from experts have distinct capabilities that appear to... more Machine learning and knowledge acquisition from experts have distinct capabilities that appear to complement one another. We report a study that demonstrates the integration of these approaches can both improve the accuracy of the developed knowledge base and reduce development time. In addition, we found that users expected the expert systems created through the integrated approach to have higher accuracy than those created without machine learning and rated the integrated approach less difficult to use. They also provided favorable evaluations of both the specific integrated software, a system called The Knowledge Factory, and of the general value of machine learning for knowledge acquisition.
4Th International We B Conference 24 25 November 2003 Perth Western Australia, 2003
Goward, Penelope and Wells, Jason 2003, An on-line assessment management system, in 4th Internati... more Goward, Penelope and Wells, Jason 2003, An on-line assessment management system, in 4th International We-B Conference (working with e-business), 24-25 November 2003, Perth, Western Australia, Edith Cowan University, Perth, WA. ... Unless expressly stated otherwise, the ...
Advances in Web Based Learning Icwl 2003 Second International Conference Melbourne Australia August 18 20 2003 Proceedings, 2003
Abstract. Web based learning is providing new and innovative environments to facilitate the deliv... more Abstract. Web based learning is providing new and innovative environments to facilitate the delivery of course material to increasing numbers students, but most of the effort is centered around the presentation of the learning material and creating environments where student interact ...
Proceedings of the 2nd Australian Information Security Management Conference Securing the Future, 2004
Page 49. 49 Graphical Authentication: Justifications and Objectives Justin D. Pierce1, Matthew J.... more Page 49. 49 Graphical Authentication: Justifications and Objectives Justin D. Pierce1, Matthew J. Warren1, David R. Mackay1, and Jason G. Wells2 1: School of Information Systems Faculty of Business and Law 2: School of ...
Infosec03 1st Australian Information Security Management Conference, 2003
Reasons for the adoption of smart cards and biometric authentication mechanisms have been discuss... more Reasons for the adoption of smart cards and biometric authentication mechanisms have been discussed in the past, yet many organisations are still resorting to traditional methods of authentication. Passwords possess several encumbrances not the least of which includes the difficulty some users have in remembering them. Often users inadvertently write difficult passwords down near the workstation, which negates any security password authentication, may provide and opens the floodgates to identity theft. In the current mainstream authentication paradigm, system administrators must ensure all users are educated on the need for a password policy, and implement it strictly. This paper discusses a conceptual framework for an alternative authentication paradigm. The framework attempts to reduce complexity for the user as well as increase security at the network and application levels.
Knowledge acquisition remains one of the primary constraints on the development of expert systems... more Knowledge acquisition remains one of the primary constraints on the development of expert systems. A number of researchers have explored methods for allowing a machine learning system to assist a knowledge engineer in knowledge acquisition. In contrast, we are exploring methods for enabling an expert to directly interact with a machine learning system to collaborate during knowledge acquisition. We report recent extensions to our methodology encompassing a revised model of the role of machine learning in knowledge acquisition; techniques for communication between a machine learning system and a domain expert and novel forms of assistance that a machine learning system may provide to an expert.
Webct 04 5th Annual Webct Asia Pacific User Conference, 2004
Coldwell, Jo, van der Klooster, Marie, Goold, Annegret, Wells, Jason and Craig, Annemieke 2004, M... more Coldwell, Jo, van der Klooster, Marie, Goold, Annegret, Wells, Jason and Craig, Annemieke 2004, Managing very large classes in WebCT Vista, in WebCT'04 : 5th Annual WebCT Asia Pacific User Conference, pp. 1-1. ... Unless expressly stated otherwise, the copyright for items in Deakin Research Online is owned by the author, with all rights reserved. ... Deakin University acknowledges the traditional land owners of present campus sites.
2Nd Australian Computer Networks Information Forensics Conference Proceedings, 2004
Graphical authentication is proposed as an alternative to password, smartcard, and biometric auth... more Graphical authentication is proposed as an alternative to password, smartcard, and biometric authentication as it uses the innate ability of humans to recognise visual stimuli. Despite passionate debate surrounding their privacy and invasiveness issues, smartcards and biometrics ...
Protecting the Australian Homeland Conference Proceedings of the 6th Australian Information Warfare Security Conference Geelong November 24 25th 2005, 2005
Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason 2005, A review of Australian internet... more Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason 2005, A review of Australian internet banking client-side authentication models, in Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference, Geelong, ...
Aism 2011 Proceedings of the 9th Australian Information Security Management Conference, 2011
There are two fundamental challenges in effectively performing security risk assessment in today'... more There are two fundamental challenges in effectively performing security risk assessment in today's IT projects. The first is the project manager's need to know what IT security risks face the project before the project begins. At this stage IT security staff are unable to answer this question without first knowing the system requirements for the project which are yet to be defined. Second organisations that deal with a large project throughput each year find the current IT security risk assessment process to be tedious and expensive, especially when the same process has to be repeated for each individual project. This also makes it difficult for an organisation to prioritise which projects require more investment in IT security in order to fit within budget constraints. This paper presents a conceptual model that is based on an agile approach to alleviate these challenges. We do this by first analysing two online database resources of vulnerabilities by comparing them to each other, and then compare them to the agile criteria of the conceptual model which we define. The conceptual model is then presented and an example is given of how it can be applied to an actual project. We then briefly discuss what further work needs to be done to implement the conceptual model and validate it against an existing IT project.
ABSTRACT The naive Bayesian classifier provides a simple and e#ective approach to classifier lear... more ABSTRACT The naive Bayesian classifier provides a simple and e#ective approach to classifier learning, but its attribute independence assumption is often violated in the real world. A number of approaches have sought to alleviate this problem. A Bayesian tree learning algorithm builds a decision tree, and generates a local naive Bayesian classifier at each leaf. The tests leading to a leaf can alleviate attribute inter-dependencies for the local naive Bayesian classifier. However, Bayesian tree learning still su#ers from the small disjunct problem of tree learning. While inferred Bayesian trees demonstrate low average prediction error rates, there is reason to believe that error rates will be higher for those leaves with few training examples. This paper proposes the application of lazy learning techniques to Bayesian tree induction and presents the resulting lazy Bayesian rule learning algorithm, called Lbr. This algorithm can be justified by a variant of Bayes theorem which supports a weaker conditional attribute independence assumption than is required by naive Bayes. For each test example, it builds a most appropriate rule with a local naive Bayesian classifier as its consequent. It is demonstrated that the computational requirements of Lbr are reasonable in a wide cross-section of natural domains. Experiments with these domains show that, on average, this new algorithm obtains lower error rates significantly more often than the reverse in comparison to a naive Bayesian classifier, C4.5, a Bayesian tree learning algorithm, a constructive Bayesian classifier that eliminates attributes and constructs new attributes using Cartesian products of existing nominal attributes, and a lazy decision tree learning algorithm. It also outperforms, although the result is not statisticall...
Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason 2005, An observational survey of Aust... more Pierce, J., Mackay, David, Warren, Matthew and Wells, Jason 2005, An observational survey of Australian internet banking authentication and client-side security: does it merit the fees?, in E-links : community, business and university : proceedings of the 6th International ...
There is increasing coverage in the literature relating to the different facets surrounding the s... more There is increasing coverage in the literature relating to the different facets surrounding the security service of authentication, but there is a need for further research into the usability of graphical authentication. Specifically, the usability and viability of graphical authentication techniques for providing increased security needs to be further explored. There is a significant amount of evidence relating to traditional authentication techniques which highlight the fact that as technological advances grip modern societies, the requirement for more advanced authentication and security approaches increases. The exponential growth in the number of people using the Internet carries with it the high potential for increased security threats, suggesting that there are needs for further techniques to increase security in online environments. This paper presents the findings of how various interface design approaches affect the usability of a previously developed alternative graphical authentication technique called AuthentiGraph. The security design provided by Authentigraph has been established and justified in previous research by the authors. The primary focus of this paper is the usability of this technique. Using an experimental laboratory based approach, combined with an online survey, 20 university students evaluated a combination of five varying graphical interfaces in three different screen sizes. The outcome provides the interface design criteria best suited for the implementation and use of the AuthentiGraph technique.
6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Worms and other forms of malware have been considered by IT Security firms and large companies fo... more Worms and other forms of malware have been considered by IT Security firms and large companies for many years as one of the leading threats to the integrity of their data and security. However, several researchers over recent years have been working on creating worms ...
Uploads
incollections by Jason Wells
Papers by Jason Wells