Proceedings
Online ISSN: 1535-0703
The IT workforce of a company is an important strategic asset, an asset that needs to be managed. This paper details the results of a survey administered to 200 employees across 39 software companies in Ireland between July and August 2001, with a response rate of 102 (51 %). It presents a descriptive study, which assesses the impact that training practices have on employee retention. It also gath ...
The idea of using white box data flow information to select test cases is well established and has proven an effective testing strategy. This paper extends the concept of data flow testing to the case in which the source code is unavailable and only black box information can be used to make test selection decisions. In such cases, data flow testing is performed by constructing a behavior model of ...
The purpose of this paper is to highlight an often-neglected area of teaching, namely assessment of student performance. Many courses now incorporate some form of continual assessment to establish the overall student grade. While the percentage weighting given to continual assessment and the final exam may vary, it is usual that all assessment components are compulsory. This paper reports the resu ...
The paper presents the two perspectives of IT in the Palestinian schools. The basic IT literacy - based courses have been introduced in most of private schools since 1985, and formally started in all public as well private schools in 1999. This covers eight grades from the fifth up to the twelfth. An additional two classes per week have been introduced to the weekly school program. The main object ...
Due to business innovation and IT, information systems (IS) are made up of distributed autonomous subsystems running on heterogeneous IT platforms. These subsystems implement differently same business objects and processes. Thus pieces of data and processes are overlapping and replicated. Moreover, informational and computational resources are locked i.e. they do exist, but they are not accessible ...
Feedback from three Masters courses in which students were required to produce assessments in the form of a ‘balanced argument’ suggested that a significant number of students found this to be an extremely difficult task. It would appear that they had not previously developed the ability to present a balanced and critical view of a topic, instead being more used to presenting a single, uncritical ...
This paper presents an information-client strategy for an academic department’s use of the web. The goals of this strategy are to maintain the department’s range of course offerings in the face of low enrollments and budget constraints, serve different student constituencies, and engage faculty who have diverse web-capabilities and interests in web-sites and web courses. The paper illustrates web- ...
This paper tells about the need for security on the Internet, SSL Protocol, and how a Certificate is used to meet the demand for safe interaction over the Internet.
Virtual corporations can be viewed as a network of creative people, resources and ideas connected by interorganizational information systems and/or by on-line services. Information systems makes virtual corporations more successful, because the communication and collaboration among dispersed business partners are key to making it happen. Virtual corporations can use different information systems o ...
Universities need to respond to a change in student profile from the traditional academically committed student to a student who seeks a qualification for a job. This study reports on the application of educational research to the redesign of a single subject (or course). The aims were to engage students in deep learning; increase a learner's responsibility for learning; and encourage better study ...
The rise of an ostensibly customer-centred corporate culture in the 1980s recogised the importance of “knowing the customer”. As a result, customer information systems and associated practices of marketing, customer segmentation, and customer accounting have become significant elements in corporate customer-focus strategies. This paper discusses a range of ethical considerations that flow from the ...
As student access to computers and the Internet becomes more commonplace, professors have come to rely on a variety of tools to deliver course materials for both classroom-based and distance learning courses. Software products such as WebCT, Learning Space, and Blackboard are among the most popular. They all provide the instructor with an easy-to-use environment for delivering content and communic ...
The promise and potential of the new business paradigm labeled “e-business” is the driving force behind the tremendous demand for accounting professionals with both a technology background and a traditional accounting background. Where will these professionals come from? This paper lays out in detail the foundation for a new undergraduate academic program which is designed to both attract students ...
This paper describes the challenges experienced by Academics and Instructional Designers when creating quality, innovative and accessible educational materials for the University sector in 2001 and beyond. These two roles, which play a crucial part in the development and delivery of the new educational experience, are vital to the success of the student and ultimately, the University. Are we explo ...
Export education forms a major part of the Australian economy. Australian universities are now not only accepting overseas students into Australian campuses; they are setting up overseas-based campuses. This is often through an arrangement with a local educational institution or organisation. Subjects in these institutions are delivered by a combination of Victoria University Australian-based staf ...
The rapidly changing environment of the information age and the need to provide a well-rounded education, often times, are diametrically opposed. Local, regional, national, and international industry needs and pressures interact with school and discipline tradition. The basic requirements of a school’s degree often account for over half of the courses required for graduation. Administrations often ...
Being on the wrong side of the digital divide limits the life chances of the socially excluded, who have had neither the wherewithal nor the opportunity to obtain highly paid, skilled positions in IT. Irish policy makers see education as the solution to this problem. However, providing institutional support for third level education in IT for the socially disadvantaged poses significant challenges ...
Higher education institutions in Australia are increasingly embracing the Internet as a tool to support academic programs offered in the Asian region. The purpose of this study is to describe a low cost internet-based international video conferencing system and to assess staff attitudes toward its use to deliver lectures and tutorials to Hong Kong. The students are enrolled in undergraduate busine ...
Information privacy is the primary issue discussed in the majority of papers about e-commerce security. We observed and confirmed from literature that while privacy is a voiced concern of consumers, it is not the insurmountable barrier to doing business. There are other information accuracy and operational issues that add or detract from consumer experience. We will discuss these using real-life a ...
This paper evaluates a studio based teaching model in a core first year subject of a traditionally delivered IT degree. It reports on first year students’ reactions to four aspects of the studio-based teaching and learning environment; the physical learning space, IT tools and infrastructure, teaching philosophy and portfolio assessment. Data was obtained through online Web-based surveys, issued m ...
After an introduction and a short description of the research methods usually adopted in scientific disciplines and particularly in palaeography, some hypotheses on the influence of new technologies on human learning and some examples of the use of Web technologies in manuscript cataloguing are proposed. The reasons for the project of an information system adopting Web technologies for manuscripts ...
The paper reports first of all the results of several studies on misconceptions and mental schemes many researchers carried out in different disciplines and several countries. At the end of this section an overview of open questions and unresolved problems concerning knowledge construction is reported. The paper continues describing the different ways computers entered in education and how they we ...
This paper reviews the digital divide in Western Europe, as well as policy options for combating that divide. While age, income and gender are significant predictors of the digital divide in Western Europe, geography plays a crucial role. The countries in Southern Europe have less computer and Internet penetration than their Northern European counterparts. The paper then discusses four policy opti ...
The result of misunderstanding science by students is their inability as future citizens to impact science public policies. The solution argued last year included creating courses in science studies serving two purposes: destroy students’ stereotypical certainties about science and help them become “historical realists” in regard to scientific practices. But we also speculated that dismissing the ...
Database Design discipline involves so different aspects as conceptual and logical modelling knowledge or domain understanding. That implies a great effort to carry out the real world abstraction task and represent it through a data model. CASE tools emerge in order to automating the database development process. These platforms try to help to the database designer in different database design pha ...
There is an increasing demand for what we can call pop-science that is pertinent scientific information dedicated to the non-specialists. This demand comes both from professional categories and the general public. Simultaneously in the scientific community there is an increasing consciousness that diffusion of the scientific information is an asset the scientific community cannot afford to overloo ...
In the past decade, the context of Information Technology (IT) management changed in seminal areas: the circle of players, the tools, the emergence of Internet technologies, the evolution of information societies and digital economies, and critical questions of ethics and equity. These seismic changes can be captured if corresponding shifts occur in the content and context of IT education. A shift ...
This paper considers a functional framework that creates a usable authoring support environment (ASE) for digital course design, and outputs reusable components. Within the context of considering the courseware domain as a domain of interactive software systems, we developed an ASE prototype. The objectives of this prototype include the provision of a usable authoring tool to develop interactive c ...
The research reported in this paper investigated and compared the experience of learning about the concept of an information system (IS) at a scholarly, and an undergraduate level. A scholarly level learning experience was developed from the literature and represented a benchmark against which students’ learning experiences could be compared. A group of undergraduate students’ learning experiences ...
The paper presents how to select modules of an information system, applying a multicriteria decision approach, using the interactive multicriteria decision making method - TODIM. The problem is to assign priorities for information modules in the planning stage of information systems. These priorities should be attributed in agreement with the decision makers’ preferences, considering the impact on ...
Deciding what to teach novice programmers about programming and, in particular, which programming language to teach to novice programmers, and how to teach it, is a common topic for debate within universities. Should an industry relevant programming language be taught, or should a language designed for teaching novices be used? In order to design tools and methodologies for the teaching of novice ...
This paper presents a case study of the Malaysian technical education system. The Technical and Vocational Department (TVED) is designated to prepare skilled technical and intelligent workforce to Malaysia in order to meet the goals of Vision 2020. For that reason, a web-based management support system is proposed to TVED for its planning, management and decision-making activities. e-BME is a syst ...
It is difficult to teach data communications because it involves complex, dynamic processes which are not visible to students and are hard for them to conceptualise. This paper describes a project to improve the learning of students enrolled in the data communications courses. In this project the traditional mode of teaching data communications was supplemented by a problem solving approach using ...
In a distributed eLearning environment, the development of learning objects is a participative task. We consider learning objects as knowledge pieces, which are subject to the management processes of acquisition, delivery, creation and production. A multiple-tier architecture for participative knowledge production tasks is introduced, where knowledge-producing agents are arranged into knowledge do ...
The shortage of Information Technology (IT) professionals is a recognised world wide problem. During the last ten to fifteen years we have seen the introduction of computers into high school and also primary school. These computers are now being used, not only as an adjunct to school subjects, but for the study of IT as a subject in its own right. As we begin this new millennium, this study aims t ...
This article presents the results of a comparative study of various user interfaces used to obtain search results from textual databases. This study is one of a series carried out at the Hebrew University of Jerusalem. It focuses on the display of text elements in search results and their impact on user behavior. The findings indicate several distinct benefits in the interface developed for the ex ...
Globalization is the perception of the world as one big market place. The notion of the boundariless world is expected to produce dramatic changes in key markets, major competitors, and Information Technology products. As a result, organizations are encouraged to rise above the national boundaries and change their orientation to global corporations. Further, the increased spending in Global Inform ...
This paper summarizes findings of teaching four sections of the same college course in the same style with one exception. Section 1, 3, and 4 had notes available for reference during the final exam whereas Section 2 did not. The author’s hypothesis that students in the 3 sections using notes would perform significantly better than Section 2 on the exam was disproved.
This paper explores processes and outcomes from virtual teamwork in a university course in Human-Computer Interaction. The course has students both on- and off-campus, with a very wide geographic distribution. The novel approach adopted in the course organized students into both small teams (three students) and into larger units (a group of six teams). Teams worked collaboratively, using a variety ...
Information for Decision Support, Information for Performance Evaluation - But Don’t Mix Your Drinks
When the same information is used to support decisions and to evaluate performance, a falsely optimistic view of performance may result. An example occurs in quality control during ship loading for iron ore export. Ore quality depends upon consistent composition. Ore is sampled periodically during reclamation from stockpiles. The ship loader was moved from between source stockpiles when the sample ...
Information Technology (IT) has significant impacts to modern organizations especially in assisting daily operations and meeting business targets. Main contributions of IT to organizations are increased efficiency, effectiveness and competitiveness. Non-profit organizations can also benefit as much as for-profit organizations from IT. Education Organizations (EOs) for example, would benefit in ter ...
Internet and Java technology have developed enormously in recent years. These dramatic developments have provided opportunities and challenges in all fields, particularly in the field of education. What we could not imagine doing just a couple years back has been made possible by these technologies. This short paper illustrates one such example. The example we will discuss is an examination system ...
The explosion of the Internet has lead to a revolutionary way of doing business. Electronic commerce is currently estimated at $30 billion, but analysts predict that figure to grow to $400 billion by the year 2002. This leads to a tremendous need for skilled personnel who can handle both the technical and business aspects of e-commerce. One magazine article heading reads: "Looking for a New Job? H ...
In this paper we present a methodology for the teaching of programming applied to an elementary course of the System Engineering career at the Universidad Nacional del Centro de la Provincia de Buenos Aires. This methodology starts with the formal specifications of abstract data types and concludes with an implementation of an efficient algorithm in C++ language. We describe the methodology, and a ...
It is typically difficult or impractical to teach troubleshooting skills in a classroom or lab setting. A computer-based training software package was designed and developed to teach students the problematic skill of how to troubleshoot malfunctions in hydronic heating systems. A summative evaluation was needed to ascertain whether the skills learned on the computer would transfer to the real worl ...
The importance of information technology (IT) for modern business and, indeed, research in general cannot be questioned, as its sheer pervasiveness adequately attests. However, simplistic views of technological utopianism are now being offset by accounts of technological dystopianism. Clearly organizational management have wholeheartedly subscribed to an IT future as a staggering 41 percent of tot ...
Two studies were conducted to examine the expectations computing students had held before they commenced their degree. We examined whether reality matched their expectations, how and whether they had tried to obtain information before enrolling in their degree, and how they were coping with their studies. Results showed that, for many students, reality did not match their expectations even when th ...
In the wake of the Digital Millennium Copyright Act, of 1998, Digital Rights Management systems are beginning to provide copyright protection for digital content which magazine and book publishers, music companies, software and game producers, and business-to-business participants place online. Creators and providers of digital content are now increasingly able to control end users’ use of, and ac ...
The paper presents an overall, practicing educational model for designing IT systems for undergraduates. Students are awaked to the target consideration to learn IT in familiar cases, and they are motivated to design IT systems. A unifying theme is established, students execute investigation, research, and designing to achieve that theme. [Locally situated E-business] is taken up in this paper. In ...
The term “Supply Chain Management” (SCM) denotes the creation, integration, planning and control of all elements of universal added-value chains, from the procurement of raw materials to the final delivery to the customer. IT offer huge potentials for Small and Medium-sized Enterprises to activate effective SCM mechanisms. Even though experts estimate the potential saving that can be achieved thro ...
In recent years the evolution of highly developed and complicated computerization has boosted the importance to business of IT infrastructure. Enhancement of business agility is not possible unless greater flexibility is built into IT infrastructure. More often than not, MIS’s today are not flexible enough in this sense to agilely accommodate demands for system change incessantly confronting them. ...
Learning introductory software development is a difficult task and students often perceive programming subjects as requiring significantly more work than others. This paper describes a learning model for programming that has its basis in cognitive load theory. This theory suggests that there are three types of cognitive load that learners experience: intrinsic which is determined by the mental dem ...
This paper examines the various regimes that are used to protect databases to suggest that the continued progress o' science and technology that has enabled economic prosperity will be fostered by less regulation. The diversity between and within each of these regimes reflects fundamentally different views of intellectual property. Technology, specifically digitalization that has facilitated the c ...
Web Technology has changed conventional Information Systems (IS) and conventional Information Technology (IT) as we know it. There is no doubt that Web technology will provide the foundation for most future software systems. IS curriculum therefore needs to be brought up to date to reflect this reality. In this paper we update our earlier research leading to the design of a graduate model curricul ...
As the global economy has expanded, the demand for quality information systems (IS) people increased globally. Ascertaining the quality of education in IS programs at colleges located within and outside the boundaries of the USA has become increasingly important to employers, students and the public. Accreditation is the quality assurance dimension of IS. IS accreditation is a reality in the USA a ...
End-user computing (EUC) has led to increased end-user productivity and satisfaction. In order to reduce the risks inherent to EUC, organizations should better manage EUC. As a first step different groups of end-users must be identified. Existing classification schemes have weaknesses and fail to capture the different roles contemporary end users play. Cotterman and Kumar (1989) proposed a user cu ...
End-User Computing (EUC) influences user productivity, information systems backlogs and user satisfaction. An exploratory study of 192 Midwest end-users was undertaken to investigate support services and end-user types superimposed on support sources. The results of this integrated review offer a richer understanding of end-user dynamics. Data collection occurred through a three-part questionnaire ...
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN ...
The present work is an attempt to develop a conceptual framework for evaluating the impact of information systems implementations on Mergers and Acquisitions (referred to as M&A). Although this work focuses on vertical M&A, the framework can easily be extended to horizontal and conglomerate mergers. We begin by attempting to understand what M&A really are. We then move on to understand information ...
Effective and efficient training is a key factor in determining the success of end user computing (EUC) activities in organisations. This study examines the influences of two application interfaces, namely icons and menus, on training outcomes. Training outcomes were measured in terms of effectiveness, efficiency and perceived ease of use. Effectiveness included the keystrokes used to accomplish t ...
WIP-Austria is an internet portal developed by Austrian Research Centers and by HM&S GmbH Graz. It gives access to databases, electronic and printed documents as well as to consultancy and services. The WIP database is based on “knowledge objects”: the contents of a document or service are defined by a two dimensional matrix (knowledge map) based on a decimal classification scheme and a set of pra ...
Faculty in the Computer Information Systems department at the authors’ institution is in the process of developing a new Computer Information Systems degree with several areas of emphasis. One of the proposed areas of emphasis will be to prepare students for a career as a web developer. As part of the curriculum development process, the authors collected data regarding the current demand for web d ...
This paper discusses a professional development program in the area of technology integration for teacher education faculty. The program was funded by a Preparing Tomorrow's Teachers This initiative involved one assistant professor of educational technology and five doctoral students as Tech Guides as the professional development team. Twenty-five faculty members who teach methods courses for lice ...
Most Japanese enterprises are confronted with a rapid decline of business performance due to the long time recession of the Japanese economy. They gradually lost their competitive advantages in global marketplaces especially in the business domains of matured products including PCs. Most of them are forced to take prompt measures to respond to their business environment. For the past few years, we ...
In an effort to provide knowledge and skills essential for successful careers, the College of Business Administration (CBA) designed and offered a course in Fall 2000 consisting of four classes (marketing, management, computer information systems, and business communication) taught together in a block by a faculty team. The overarching goal of this course format was to present business as an inter ...
At the University of Cape Town, females and students disadvantaged under the previous South African apartheid education system are under-represented in Information Systems (I.S.) classes. This research shows that these are also the groups most ignorant about I.S. at the school-leaving stage. After being informed about the discipline through a small intervention, a significant increase in enthusias ...
Many universities around the world have formed strategic alliances with Enterprise Resource Planning (ERP) systems vendors to incorporate these types of systems into their curriculum. Over the past few years the sharing of curriculum resources between universities has facilitated this process. Universities are now struggling with the concept of how to develop e-business curriculum incorporating th ...
Enterprise Resource Planning (ERP) systems offer a software-based system that handles an enterprise’s total information system needs in an integrated fashion. These systems are purported to incorporate “best business practice”. Many universities have realized the potential of these systems as educational tools and have developed curriculum accordingly. Many companies in recent times have identifie ...
The paper describes knowledge portals as providing services that can be customized to a variety of learning environments. It defines portals to be made up of three main components, a community of practice, a body of knowledge, and services to maintain the body of knowledge. The body of knowledge is organized around a knowledge map, which can be accessed through a number of services. The services s ...
The international media continually reports a worldwide shortage of skilled information technology literate people. An intermediary role or disciplinary area between business requirements and computer science has been identified in the past. A number of institutions have developed information systems education programs to fill this role. A survey of pasl graduates and employers evaluates the perfo ...
The National Science Foundation has recently funded a variety of projects through the National Science, Mathematics, Engineering, and Technology (SMET) Digital Library initiative, coined NSDL. One such project is the Computing and Information Technology Interactive Digital Educational Library project, also known as CITIDEL, which is part of NSDL’s Collection Track activities. CITIDEL is a consorti ...
Increasingly, organizations take decisions on the application of e-learning. In this paper we assert that the specific added values of the e-learning application depend on the type of learning. From a didactical perspective three types of learning are distinguished. These three forms of learning are ‘ideal types’, consisting of a combination of variables which collectively provide an effective way ...
Both practitioners and academics have recognized the importance of Data Communications and Networking (DCN) in undergraduate and graduate Information Systems education. This is confirmed, in particular, by the content of IS’97 and MSIS 2000 model curricula for degree programs in Information Systems (note IS’97.6 and MSIS2000.3). Experience shows that one of the most effective ways to teach Informa ...
This research explores the argument that developing countries (DC) need effective and good quality C&IT policies as a strategy for socio-economic growth. It focuses on Venezuela and attempts to gain an understanding of the current and potential impact of national C&IT policies and strategies in the C&IT diffusion process and globalisation arena. It is suggested that a shift is needed towards a wid ...
The "Research Paper" is a classic assignment in many IT courses. We explore its pedagogical advantages and weaknesses, especially since most students have career goals in the workplace rather than in academia. It is proposed that the research paper assignment be reformulated as a rhetorical case. This is a case-teaching device which is similar to, but distinct from the business case. We conclude b ...
The use of information technology over the last two decades has been growing in different sectors and industries tackling many issues in the economy and penetrating many aspects of decision-making and organizational development. Information and communication technologies are also seen as a building block that can support socioeconomic development. Therefore, nations around the world have been atte ...
The paper reports the results of a quantitative, survey-based study which investigates the use of an IT supported knowledge management system (KMS) which is embedded in knowledge management framework in a large, global IT consulting company. The main findings are that the majority of the IT users are not familiar with the KMS framework. Still, the KMS is used by 3/4 of all respondents, but mainly ...
Languages and the thinking they reflect stem mainly from cultural needs for expression. A controlled vocabulary, thesaurus, can be seen as a cultural product. The focus of this study is the translatability of British-English social science indexing terms into Finnish language and culture on a conceptual, term and indexing term level. The emphasis is on Finnish language and human factors. The study ...
The Internet is shaping the ways journalists communicate, construct their stories, publish their material and interact with their audiences. Journalism produced for text, audio and television is increasing digitised; converging on the Internet to create a new hybrid professional practice, eJournalism. This paper considers how traditional forms of advanced reporting, such as investigative journalis ...
This panel discusses the use of action-research in doctoral programs. Three researchers, from three different continents, speaking three different languages, and representing three different cultures, provide their view, based on the actual work they carried out, using this approach, to obtain their PhDs. The fourth member of the panel - a senior IS researcher - will provide the advisor’s perspect ...
We present some thoughts about devising educational designs for experiments with the use of e-tools in computer science education. We stress that the focus should not be on technological issues but on educational design issues. Our intention is twofold. First of all it is proposed to gather information about the use of such tools, in order to compose guidelines and hints for computer science lectu ...
Driven by the incredible pace of technological change the Information and Communication Technology (ICT) vendors have led the charge in promoting industry based technical certifications. Today, there are a plethora of instructor led, intensive, short courses that provide training in an ICT vendor’s product and prepare participants to sit a certification exam. Increasingly, vendors are developing e ...
Higher education in Croatia, as well in the other transitional countries, is undergoing significant changes. Those reforming activities affect not only institutions directly but also their relationship to society at large. Recognizing that higher education plays also a crucial role in the various aspects of transitional transformation, many scientist and expert’s reviews place it in the current po ...
Panel on: Global Perspectives and Partnership on the Information and Communication Technology Divide
This paper explores the contours of old age as it meets up with new technologies in contexts of work. Old age is a problematic field, always subject to renegotiation of meaning due to changes in life expectancy and never more so than in the critical first three decades of the 21st century, when the proportion of older people is dramatically increasing, with the West in the lead. I attempt to provi ...
In this paper, we describe an evolving adaptive multimedia learning environment that utilises multimedia presentation techniques in its interface while still providing Internet connectivity for management and delivery purposes. The structure of the domain is based on concepts that can be presented in a variety of ways; multimedia players display the content on the client computer. A student and co ...
Because research findings often do not have direct or immediate relevance to practitioners, the question arises as to how those findings should be disseminated to them in a suitable form at such time as they do become relevant. A central argument of this paper is that the traditional mechanisms whereby IS researchers disseminate their work are prone to numerous communication breakdowns, and that m ...
Hypermedia systems design presents challenges that are not normally encountered with the development of orthodox ‘traditional’ information systems. In recognition of these challenges, and of the purported inadequacy of conventional software engineering techniques, there is much support in the literature for the view that new, specialized methods are needed. The question must therefore be asked: do ...
As Developing Nations seek to leverage scarce resources toward the goal of achieving a developed status they must reevaluate past practices and explore available and affordable technologies. Where information and communication infrastructures are weak, use of low-cost, easily distributed technologies have proven effective. Still, many developing nations have failed to incorporate a resource in gre ...
Computer science programs in many universities are reacting to pedagogical initiatives to improve and broaden the education, particularly in the domain of adding less quantitative and more humanistic studies to a curriculum that is predominately technical. Integrating these concepts into the syllabus of computer science courses can be extremely difficult especially in the light of the lack of prep ...
This workshop is on designing dynamic Blackboard courses. The purpose of this workshop is to teach professors how to create a "one click" to all information course. The workshop will teach professors how to create drop down menus and how to create lecture notes with outlines on the side of the page. The workshop will also teach professors how to create hyperlinks from their course lecture notes to ...
With the introduction of the World Wide Web, the learning environment is changing. Online courses allow learners, once bound by place and time constraints in the traditional classroom, new access to education and collaborative learning. Technology enables this method of delivering education. Selection of technology and software needs to be based on the needs and objectives of the online programs a ...
Knowledge is a category that includes many past decisions. They could be good for the past but it is a question if they can work in the future. We can talk about programmed and non-programmed decisions. When a predetermined situation triggers a predetermined response we can talk about a programmed decision. If one wants to make a non-programmed decision he/she must search for information, identify ...
This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections. First, a brief history of the legal attempts to regulate defamatory Int ...
Electronic business transactions have exploded in the 21st century. End users rely on Internet security and privacy systems for safeguarding personal information and protection from unauthorized use. While these systems focus on safety, security and privacy, infrastructures supporting predictability, reliability and utilization of technology, classified as technology trust, are underdeveloped. Thi ...
Credits are the one of the most important functions in bank management, because, from one side, thanks to a good credit policy a bank can earn money, but from the other side, in the case of weak or wrong credit policy the bank can make substantial losses. Therefore in the field of credit policy management, intelligent information systems can be very helpful, as it is a complex and heterogeneous fi ...
This paper is about the online newspaper industry and the organisational changes that have been necessitated by economic downturn and natural evolution. It explains how online newspapers were created as virtual organisations (VO) by publishers to protect valuable franchises and in the early stages of the technology boom were replicas of their traditional newspaper counterparts. It describes two VO ...
This paper describes the experiences of Victoria University in adopting and adapting web-based technology to enhance the teaching of SAP’s ABAP programming language. The involvement of SAP relates to Victoria University integrating Enterprise Resource Planning (ERP) systems into their curricula and research programs through a strategic alliance with SAP. The SAP technical infrastructure facilitate ...
Student centered. Demonstrable outcomes. Center of gravity shifting from learned to learner. Learn by doing. Collaboration. Critical thinking. Student responsible for learning. Deeper learning. Ongoing feedback. Outcome assessment. Priority on how, not where, a student learns. Life-long learning opportunities. Global access 24/7/365. Effectiveness. Efficiency. Revolution. These are but a few of th ...
This paper reviews the inventiveness of faculty combined with the resources of the World-Wide-Web in creating a just-in-time course for seniors studying e-Business. Additionally, the instructor incorporated cooperative learning adhering to a constructivist teaching approach. Adherence to just-in-time teaching using cooperative learning following a constructivist approach supports the goals of rapi ...
The purpose of this paper is to open a discourse on the broad scope of e-Learning. The authors provide an overview of a much larger debate—mindful that the consequential topics are far reaching. The discussion first deals with the need to utilize meta-knowledge within the context of Web-based learning providing the background for the process of scoping e-Learning. The e-Learning phenomenon we expe ...
While there has been a great deal of research on the application and implementation of IS, there is less research on the variables which can contribute to the successful strategic implementation of IS and its relation to the cultural/work values of the people involved in the implementation. We are familiar with the two paradigms for evaluating IS, the first calls for the evaluation to be based on ...
A major concern facing system developers is how well the system will operate for the intended user. The aspect which allows a user to interact the system is referred to as the Human-Computer Interface (HCI). This paper discusses the various approaches advocated by researchers in an attempt to explore the issues surrounding HCI.
A Network Monitoring Tool “NETMON” is presented in this paper We have developed the tool that will Monitor the Network of any company say “XYZ” by performing certain Tests. NETMON will monitor the network by performing certain tests such as ping test, memory test, disk test, uptime test and URL test that would help to analyze where exactly the problem lies in the Network. The Results of the Tests ...
This paper is about information systems (IS) academics. It seeks to suggest a unique core competency they may wish to consider developing in order to differentiate themselves from practioners. So, this paper will explore the argument that the core competency of IS academics should be a unique insight into how to critique technology related problems. There are multiple disparate critique methods th ...
Victoria University offers a Computer Science degree in Hong Kong. The Hong Kong program matches the one in Melbourne, but both the content coverage and the delivery model of the Hong Kong program are affected by expectations and demands of the Hong Kong government and students. The paper outlines challenges, legislative, cultural, quality, time and distance that shaped the program delivery model. ...
This paper investigates the concerns consumers have with respect to security and privacy when determining purchasing intent in the Web environment. The online retailing environment (e-retailing) is examined and various issues relating to security and privacy are identified as potential inhibitors for e-retailing. The paper then presents a model of the interaction between online security and online ...
A continuing challenge for university lecturers is to develop successful programs that challenge students whilst at the same time responding to a ‘customer’ driven market place. In 2000, two new courses were introduced into a business degree program as a result of feedback from past and present students and the business community. These courses aimed to explore the wider issues of end-users develo ...
Information systems (IS) professionals have consistently expressed the need for good communication skills in IS graduates and universities have responded by providing communication components within their curriculum and coursework. However, the typical understanding and execution of communication skills revolve around teaching presentation skills. While presentation skills are important components ...
In most disciplines, research findings take a long time to filter into practice, if they ever do at all. The result of this is under-utilisation of research results and sub-optimal practices. There are a number of reasons for the lack of knowledge transfer. Firstly, practitioners don’t have the time to keep up with the latest research%in professional practice, there is little time available to rea ...
Systems theory has become a worldview aimed at holism, and a methodology supportive of holism. But it has also become a sophisticated mathematical and philosophical approach, which limits it to rather few intellectuals and systems theorists. This is not enough for humankind to do well. An insight into the most successful companies, called the visionary companies in the analysis briefed here, let u ...
Content analysis of media coverage provided a setting for group work, critical thinking, research, and data analysis. The analysis was motivated by a series of news stories that had damaged the reputation of the local community. The question was whether local news coverage was negative toward the business community. A business class addressed the problem and found that articles that business would ...
Developing and providing information technology (IT) education that is current and strikes a balance between theory and practice is challenging. Incessant changes and innovations in computer hardware, software, and communication technologies coupled with ever-evolving business practices, make the task of teaching IT courses daunting. One approach to addressing this problem is the formation of acad ...
The RION project (financed by BMBF) aims at improving Computer & Law (C&L) teaching in Germany while implementing Web-based media. For the fluid and interdisciplinary field of C&L, educational material is very scarce. Furthermore, educational cultures differ according to the divers affiliations of C&L. Therefore, the RION platform will present a variety of documents online, which have not been acc ...
Learning to learn is the theme of the current educational reform in the Hong Kong Special Administrative Region. Learners should be well equipped with collaborative skills, communication skills, creativity, critical thinking skills, and skills in using information technology to be responsive to the changing requirements of the workplace and the society. We have drawn the elements of collaborative ...
Creating a realistic learning environment for Systems Analyst and Design (SAD) students is a challenge. Integrating discipline-oriented courses is one way of creating such an environment. This paper discusses a possible integration between two courses where the courses provide a basis for experiences that enrich the learning environment and give the students important competence in the IS field. T ...
This study looks at both MBA and MS E-business programs. Specifically it looks at the number and types of courses offered in these programs and compares and contrasts what is offered between the MS and MBA programs, and also between the different groups of schools being studied. Results indicate that there is no real consensus in what knowledge is core to the concentration. The programs offered at ...
The 2001 foot and mouth disease (FMD) outbreak in the UK had a significant impact on the economic and social wellbeing of rural communities. This paper examines the FMD pages of four local government websites in Northern England: Cumbria, Durham, Northumberland and North Yorkshire County Councils. Each county was badly affected by FMD. The contents of the FMD webpages are analysed and compared: wh ...
The opportunities provided by the continuous growth in computer storage capacity have led to the development of methods to investigate large databases. However, while industry is heavily involved in research using databases, primarily for marketing purposes, the university academic component of the marketing research discipline has not yet caught up with industry practice. This study discusses dat ...
In this paper, we describe the Hyperguide project, an interactive push XML application for digital collection access, designed as a tool to know invisible resources in the web. Hyperguide enhances the accessibility of cultural and scientific webs for all users, overcoming present barriers in information seeking, addressing the need of improving web access, selection and filtering and usability of ...
Automated Essay Grading System Applied to a First Year University Subject - How Can We Do It Better?
Automated marking of assignments consisting of written text would doubtless be of advantage to teachers and education administrators alike. When large numbers of assignments are submitted at once, teachers find themselves bogged down in their attempt to provide consistent evaluations and high quality feedback to students within as short a timeframe as is reasonable, usually a matter of days rather ...
The Faculty of Informatics and Communication at Central Queensland University (CQU) is well known for providing a quality product and service to its customers. CQU’s central campus is located in Rockhampton. CQU operates within a complex tertiary environment, and offers its programs and courses from a multitude of campuses around the world. The organization of information and procedures that defin ...
This paper describes a continuing study which uses a mixture of qualitative and quantitative research methods to identify factors which facilitate organizational and other types of collaborative learning. In this study, such learning is termed ‘social learning’, and refers to those factors which enable the sharing of knowledge and practice, and which foster generative learning. This paper’s specif ...
Issues of IT Ethics have recently become immensely more complex. The capacity to place material on the World Wide Web has been acquired by a very large number of people. As evolving software has gently hidden the complexities and frustrations that were involved in writing HTML, more and more web sites are being created by people with a relatively modest amount of computer literacy. At the same tim ...
In the mid 1990s people became fascinated with the Internet, a fact which has not only redesigned the geographic borders of communication within a totally new dimension, but has also created new profiles of personal identities. This paper aims to describe how identities are constructed in cyberspace and outline the risks and the opportunities of such an evolution of human identity. Moving from the ...
The conditions of globalization require companies to transform from the traditional industrial enterprises into the modern post-industrial ones, which are becoming open, flexible and innovative. The focus on knowledge has lead to increase attention towards information technology (IT) as one of the main source of competitive advantages. Organizational starting points for their functioning lead to a ...
The aim of this research was to produce interactive, dynamic, collaborative, engaging, realistic scenes that could be used for educational or community purposes. The visualisations were based on the Macedon Ranges, a scenic area 80 km to the north west of Melbourne. The pedagogical foundations of good practice for on-line leaning and cooperative work were examined. Informing Science provided a fra ...
This paper presents our template-based approach in building a web-based system titled "Dynamic curriculum Organisation by Innovation through Technology (DoIT)". We have considered the meta-environment of any course development process and found that we can produce two kinds of knowledge assets from this environment. A delivery (asset) environment forms the basis of our traditional course delivery ...
Ahmedabad Municipal Corporation (AMC) in the state of Gujarat, India looks after the basic needs of its four million citizens. AMC offers primary, secondary, and tertiary healthcare services at subsidized rates. The load on AMC tertiary healthcare hospitals has been increasing rapidly, stretching the hospital resources beyond limits. Insufficient resources at these hospitals call for increased all ...
Website design practitioners and researchers have proposed criteria for effective website design based on experience and common sense, intuition, rules-of-thumb, and empirical studies of website usability. Typically, published checklists for evaluating websites emphasize design features such as information layout, navigability, and the technical performance of the website. University undergraduate ...
In this paper we discuss the use of modern information and communication technologies for distance education (DE) purposes. We argue that current technologies and implementations do not adequately support the key concepts of communication and community that many practitioners believe to be important, particularly if modern pedagogies such as constructivism are to be supported. We propose that coll ...
There have been many articles written which describe the changing financial environment currently faced by tertiary institutions. In New Zealand our Universities and Polytechnics have faced a gradual per-student reduction in government funding over the past decade and, despite the public utterances of ministers of education, there is little evidence that this is anything but a continuing trend. Th ...
Repositories provide mechanisms to encourage the discovery, exchange and re-use of learning objects. This paper describes Portals for On-line Objects in Learning (POOL), a consortium project of the TeleLearning NCE to build a learning object repository scalable to the national level. Funded in part by the Canarie Learning Program, POOL contributes to the development of two focal technologies: “POO ...
The vision of providing clients with information that is tailored to their needs has sparked off a tremendous interest in languages that are on the one hand standardized and hence widely applicable but which are on the other hand also highly flexible and can hence be customized to specific applications. The universal exchange format XML (eXtended Markup Language) is a candidate for such a language ...
The theory of organisational knowledge creation indicates the distinction between tacit and explicit knowledge is extremely important in corporate knowledge management efforts. Additionally, in this context, the sharing of tacit knowledge is considered to be a critical component of successful knowledge management initiatives. This paper explores the value of using collaborative technologies as ena ...
Advances in information technology provide opportunities to inform users in ways that were only imagined twenty years ago. However, information providers need to inform themselves concerning the best way to deliver resources tc these users. Often assumptions are made about users that are inaccurate and untrue. With a view to these shortcomings, a team came together to collect information from user ...
1994 the Austrian Federal Economic Chamber has started to build an interactive portal on the internet (wko.at). This portal is at the moment one of the greatest information and know-how platforms in Europe and a combination betweer eGovernment and eBusiness. More than 370.000 companies have access to an extranet which includes more than 700.000 pages online. More than 1.000 organisations within th ...
A method to create more effective Web search queries is to combine elements of a semantic approach with a template that requests specific details about the searcher’s information need. Fundamental to this process is the use of semantics. Nouns, key phrases, and verbs are scored according to their frequency of use, then ranked as keywords and used to create the query. Key phrases and words in the q ...
This paper discusses the results of an investigation into the skills gap between Information Systems (IS) graduates at the University of Cape Town (UCT) and the South African Systems Development Industry. Three objectives were defined for this study. Firstly to measure the alignment between the level of skills possessed by students and the level of skills demanded by development companies. Secondl ...
The purpose of this paper is to serve as a departure point for a discussion on the design of a course in Advanced Information Technologies, with a special emphasis upon providing students with the tools to identify new, emerging technologies. The paper also shares the experience of offering such a course to graduate students in Information Systems during the Spring of 1999, the Spring of 2001, and ...
The goal of this paper is to produce an evaluation of IT-based support of human decision capabilities, as seen by the decision makers themselves. Recent research efforts, conducted in communication with actual decision makers in business and public administration, have been directed at the evaluation of potential of information technologies (IT) in supporting high-level information activities and ...
The purpose of this paper is to elaborate the theme of the relevance of IS research. Based on recent experiments and experiences in the borderland between research and practice and politics we suggest some additions to the discussion of the IS research relevance in Fitzgerald (2001). One addition concerns relevance to whom, where we suggest considering a regional relevance, through cultivation of ...
One of the most evident premises for successful E-Commerce transaction should lie in as much detailed recognition of personal customers’ differentiation as it becomes possible through the usage of multiple data resources available over the Internet. The methodical basis for the evaluation and subsequent utilization of all available data may be formed under the well known concepts of the utility th ...
Worldwide demand for qualified IT workers has employers exploring under-represented segments of the workforce. The percentage of women IT workers is not keeping pace with the growth of the industry. Minority populations, which are country specific, are also under-represented segments. This paper focuses on three significant minority segments in the United States: women, African Americans and Hispa ...
Lack of implementation of instructional technology either to improve the classroom or to reform educational practice stimulated a study of the diffusion of innovation, which in turn led to creation of a new theory of reform through IT. This was followed by development of a model to test the theory. This paper describes the theory, the model and evaluative results from implementing the model. The m ...
This paper looks at the development of Electronic Commerce specialisations in an MBA program, and particularly at a recent specialisation developed at Victoria University, Australia for its local and overseas MBA students. These MBA specialisations are very popular in Australia, and half of the MBA programs with specialisations have one in an e-Commerce related field. An examination of some of the ...
Curriculum Development in the Informing Sciences: Ecological Metaphor, Negotiation or Actor-Network?
Change in higher education information systems, and other informing science curricula is inevitable. This paper offers a brief consideration of three different models that can be used to describe how this change occurs. Most curriculum texts give prime consideration to approaches to curriculum change based on research, development and diffusion models, and the paper outlines some objections to the ...
This study is an exploratory review of the determinants and extent of information technology’s influence on the operations of material handling dealerships in the USA. The goal is to develop an analysis framework specifying which factors contribute to the transformation of the material handling industry’s practices in relation to using information technology to optimize transactions in goods, know ...
Despite the promise of community involvement, cohesion and empowerment offered by local community networks (CN) using Internet Technologies, few communities in regional Australia have been able to demonstrate sustainable and vibrant CN which demonstrate increased social, cultural or self-reliance capital. The Faculty of Informatics and Communication at Central Queensland University (CQU) and a loc ...
In this paper, the authors describe the process of converting from a microfinance organization to a regulated bank in Haiti. The literature was helpful as far as some of the procedures were concerned, and the organization was able to use the recommendations. However the researchers found some major omissions in those recommendations as far as infrastructure was concerned. In some developing countr ...
This paper describes the initiative to incorporate the practice of quality software development (QSD) into our undergraduate curriculum concerning the engineering of software. We discuss how the constructivist’s method of problem-based learning (PBL) helps develop this QSD practice into our students’ daily learning. This paper expounds the idea of an architectural approach to building software sol ...
Increasingly, large organizations are engaging in data warehousing projects in order to achieve a competitive advantage through the exploration of the information as contained therein. It is therefore paramount to ensure that the data warehouse includes high quality data. However, practitioners agree that the improvement of the quality of data in an organization is a daunting task. This is especia ...
IT managers within financial institutions must understand and be able to respond to the operational, financial and regulatory impacts that will result from a loss of critical business functions. The Basel Committee on Banking Supervision, through the Bank for International Settlements (BIS) has circulated a consultative paper which, if eventually adopted by nation-state bank supervisors, will impo ...
In this paper, we first introduce the readers about the main function of a computer auditor. This is followed by a description of auditing the usage of stationeries in the Faculty of Computer Science and Information Technology, University of Malaya. It is a very time consuming process to audit all stationeries. Therefore, we introduce the data mining techniques to help us find the relevant station ...
The paper discusses the Multimedia Educational Resource for Learning and Online Teaching (MERLOT) project http://www.merlot.org, which is designed to provide faculty with a source for peer evaluations of online learning modules in specified disciplines. The various aspects of the web based MERLOT are explained and suggestions are made as to how librarians and educators can use MERLOT in their work ...
It is widely accepted amongst tertiary educators that IT students need first hand experience of working in teams and in managing projects if they are to be effective in the workplace. In 2001 the School of Computer and Information Science at Edith Cowan University undertook a major restructure of its courses that resulted in the development of eight ‘core’ units that are taught in a range of cours ...
The growth of the Internet and the impact of the Community College system in Indiana have had a profound impact or the traditional two and four year programs in Computer Information Systems (CIS). Purdue University Calumet has recognized this impact and has revised and implemented an innovative Internet/Web B.S. program and related courses to support it. The B.S. program was developed and refined ...
Investigative activities involving computer related cases occasionally encounter files that have been encrypted. Encryption is a valid and legal process that enables anyone to protect the privacy of his or her data and/or communications. If the suspect is cooperative and provides not only the key but also the specific encryption software, investigation is simple. However, without that cooperation, ...