Claim Missing Document
Check
Articles

Found 3 Documents
Search

Learnings, Issues, and Challenges Encountered by Students and Faculty Members in the Implementation of Small Private Online Courses (SPOCs) Geronimo, Cecilia A.; Adriano, Raquel C.; Celestino, Joseph Roy F.
International Journal of Multidisciplinary: Applied Business and Education Research Vol. 5 No. 2 (2024): International Journal of Multidisciplinary: Applied Business and Education Rese
Publisher : Future Science / FSH-PH Publications

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11594/ijmaber.05.02.28

Abstract

Consistent with the Plan-Do-Check-Act (PDCA) design of ISO 9001:2015, performance evaluation of policies pertaining to the University’s main functions, i.e., instruction, research, and extension, should be pursued, especially for a newly implemented policy. Small Private Online Courses (SPOCs) at Bulacan State University were crafted, developed, and enhanced not only in compliance with the demands of continuing education but also to suit the standard of learning that is equal to classroom instruction catered physically. Whether these courses became effective and efficient within the duration of implementation remains to be determined. In the hope of having a fair and honest assessment that willlead towards relevant refinement of offering SPOCs, this mixed method of research undertaking aims to re-examine its efficiency and effectiveness, specifically, the learnings, issues and challenges encountered by the facultymembers and students when using SPOC as modality. Thesurvey questionnaire and interview questions were developed and validated and the interview among faculty members were face to face while the survey questionnaire for the SPOC students was through Google form for answering online, and the respondents were five thousand and eight students and twenty-five faculty members were interviewed. The findings indicate the factors that may impede the success of the implementation of SPOCs, aside from personal logistic challenges, the lack of discipline to manage time and sustain the interest in a given lesson are problems that require attention and further innovation. While connectivity can be identified as a personal logistic challenge, it can also be a challenge on the part of the University. The problem of connectivity may be seen as an opportunity for the University to create its own Learning Management System that can be customized to suit fit according to bandwidth, accessible and affordable to students. It can be concluded that SPOC is a promising learning platform in a world where hybrid interactions are highly relevant and can help save a lot of time and resources which brings in the recommendation to revisit, redesign, and recalibrate it for the ever-changing landscape of education.
Practices and Challenges of Academic Managers of a State Institution: Inputs for Succession Plan Adriano, Raquel C.; Geronimo, Cecilia A.; Inasoria, Romeo D. C.; Maroma, Dolly P.
International Journal of Multidisciplinary: Applied Business and Education Research Vol. 6 No. 3 (2025): International Journal of Multidisciplinary: Applied Business and Education Rese
Publisher : Future Science / FSH-PH Publications

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11594/ijmaber.06.03.32

Abstract

The study focuses on the practices and challenges of academic man-agers of a state institution and consequently the results can be used as inputs for a succession plan. The study is a descriptive research and utilized mixed method of both quantitative and qualitative analy-sis. Survey questionnaire and questions for interviews were con-structed and utilized purposive sampling technique for respondents and participants. All of the management practices were regularly exe-cuted while the challenges encountered were perceived demanding extra efforts to accomplish. Academic managers are expected to pos-sess various characteristics such as competency, community assis-tance, accountability, dependability, conscientiousness, familiariza-tion, and consistent struggle. The different ways of handling com-plaints/issues were as follows: organization resolution, objectivity, general references, and dialogue. The initiated programs/projects for improvement/enhancement were as follows: partnership and benchmarking, training, extension, internship programs, upgrading, support and upgrading. The training programs/ seminars needed to be attended were upgrading or professional development, and the plans for improvement were upgrading, support upgrading, and pro-ficiency.
Identifying Research Trends and Gaps in the Context of Linux and Unix Security Adriano, Raquel C.; Calayag, Jahleine Marielle M.; Cruz, Marian Minelli S.; Concepcion, Anthony U.
International Journal of Multidisciplinary: Applied Business and Education Research Vol. 6 No. 6 (2025): International Journal of Multidisciplinary: Applied Business and Education Rese
Publisher : Future Science / FSH-PH Publications

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11594/ijmaber.06.06.14

Abstract

Linux and Unix operating systems are fundamental to modern computing infrastructures, including cloud platforms, mobile devices, and supercomputers. With their increasing adoption, security has remained a persistent and evolving concern over the past two decades. This study conducts a systematic bibliometric analysis of 50 peer-reviewed journal articles and conference papers published between 2001 and 2020, segmented into four time periods: 2001–2005, 2006–2010, 2011–2015, and 2016–2020. Using citation analysis and co-word mapping via Mendeley and VOSviewer, the study identifies four main thematic clusters: (1) access control and authentication, (2) kernel-level vulnerabilities, (3) cloud and container security, and (4) mobile and Android-related threats. Early research focused on foundational topics such as system architecture and access control mechanisms, while more recent studies emphasized cloud-native security, virtualization, and mobile platform vulnerabilities. The analysis also reveals a significant disparity in research volume, with Linux-related studies dominating the field and Unix security receiving less than 20% of the total focus. This underrepresentation of Unix indicates a critical gap in the literature. These findings highlight not only the shifting priorities in open-source operating system security but also the need for renewed attention to Unix-specific threats and cross-platform security strategies in future research.