Journal of Excellence in Social Sciences
https://journals.smarcons.com/index.php/jess
<p>Journal of Excellence in Social Sciences is the flagship journal of the Society of Management Research and Consultancy (SMARCONS). The main goal of the Journal of Excellence in Social Sciences (JESS) is to publish original articles (Quantitative and Qualitative), book reviews and case studies in the field of social sciences with the aim to reduce the gap between academics, research and practice. JESS is open access, international, scholarly peer-reviewed research journal which publishes original research after double-blind peer review process.</p>Society of Management Research and Consultancy, London, UKen-USJournal of Excellence in Social Sciences2755-3876 The effectiveness of educational software and applications for primary students' learning outcomes: A systematic review
https://journals.smarcons.com/index.php/jess/article/view/347
<p>In the ever-evolving field of primary education, effectively integrating innovative teaching techniques and technology is crucial. This systematic review explores how educational software and applications impact primary students' learning outcomes. We searched several academic databases, including PubMed, PsycINFO, ERIC, Web of Science, and Google Scholar, focusing on research articles published between 2018 and 2023. Among 150 initially identified studies, 35 met the inclusion criteria after carefully screening and removing duplicates. These studies, which used both qualitative and quantitative methods, were analyzed to uncover key themes and insights. This review reveals that educational software positively impacts students' cognitive, behavioral, and emotional development. Mobile applications and computer-assisted learning (CAL) tools notably improve mathematics, science, and literacy outcomes. Key features such as autonomous learning, personalization, and feedback are critical. Additionally, gamified learning and interactive apps boost motivation, engagement, and self-directed learning, enhancing academic performance and satisfaction. However, effectiveness varies by software type, subject, and student demographics. Challenges include design flaws, implementation issues, and accessibility barriers. Recommendations emphasize integrating key pedagogical features, continuous teacher training, and tailored interventions for diverse needs.</p>Muhammad Tahir Khan FarooqiZafar SiddiqueSher Muhammad Awan
Copyright (c) 2024 Zafar Siddique , Sher Muhammad Awan, Muhammad Tahir Khan Farooqi
https://creativecommons.org/licenses/by/4.0
2024-08-222024-08-2234Organizational Environment, Protection Motives, Adoption of Machine Learning, and Cybersecurity Behavior
https://journals.smarcons.com/index.php/jess/article/view/352
<p>The research presented in this intensive study uncovers the complex interaction between organizational and individual drivers affecting cybersecurity behavior within organizations. Its major focus is analyzing the impact of organizational policies and culture, training, and awareness programs on the cybersecurity conduct of employees. This paper also examines self-protective behavior related to risk perception, perceived self-efficiency, and response efficacy, which explains how these variables may influence self-protective behaviors. According to the Protection Motivation Theory (PMT), the study unravels how individuals' different elements of threat appraisal, coping appraisal, and cost-benefit analysis contribute to their decisions to apply cybersecurity behaviors. It also underlines that machine learning is being used more and more in cybersecurity and demonstrates some important ML concepts in modern cybersecurity, such as picking up the right data to train with, coping with adversarial attacks, and, last but not least, making the models interpretable. Ultimately, having a comprehensive understanding of these cybersecurity behaviors may shed new light on mechanisms that can be used to develop cybersecurity strategies and technologies to help protect against the rapidly changing landscape of cyber threats. All research papers have an abstract. It can be created by simply compiling the main points (summary) of each section of the research paper.</p>Syed Gulfraz NaqviAlishbaM Asghar MughalKhurram ShehzadRana Tayyab Noor
Copyright (c) 2024 Syed Gulfraz Naqvi, Alishba, M Asghar Mughal, Khurram Shehzad, Rana Tayyab Noor
https://creativecommons.org/licenses/by/4.0
2024-09-152024-09-1534112510.69565/jess.v3i4.352A Critical discourse analysis (CDA) of Obama and Trump’s speeches on Afghan policy
https://journals.smarcons.com/index.php/jess/article/view/344
<p>This research analyzes the persuasive appeals President Obama and Donald Trump used in speeches regarding the Afghan policy using American Exceptionalism, Power and Ideology. The research used critical discourse analysis (CDA) within this study. For this purpose, the key speeches by both presidents were chosen: pronouns, voice, nominalization, word choice, and metaphors. The findings reveal that while both leaders aimed to justify America’s prolonged military involvement in Afghanistan, they employed distinct approaches. While Obama was politer and more appealed to ethical considerations pointing to the mission’s just nature, Trump was more forceful and utilitarian, framing the conflict as an endeavor for which the cost and benefits are clear. Thus, the study shows the significance of the CDA method of political speech analysis for ideology and hegemony detection and stresses that the problem of power usage accountability remains actual on the international level. The research also advocates the exploration of the speech acts towards a narrower range of power and the utilization of more kinds of analyses on a greater selection of speeches for a better understanding of the multifaceted connection between language, power, and international relations.</p>Rameen Fatima
Copyright (c) 2024 Rameen Fatima
https://creativecommons.org/licenses/by/4.0
2024-08-192024-08-193411010.69565/jess.v3i4.344