Proceedings
Online ISSN: 1535-0703
Highs and Lows of Implementing a Management Strategy Eliminating 'Free Passengers' in Group Projects
In attempting to give students the opportunity to work on group projects with other students, yet ensuring students receive the marks that they each deserve, a management strategy for dealing with group work initially proposed by Ford and Morice (2003) was implemented. The present paper discusses the implementation of this strategy with its positive and negative outcomes. While good students were, ...
This article describes the emergence of collaborative work between researchers and information professionals through the presentation oftwo tools developed within Cemagref. The first tool is a traditional database and the second a Wiki; they were both implemented by information professionals with the contribution of information technology (IT) experts. The role of Cemagref information professional ...
Pedagogically-driven support for groups is a continuing challenge as we move forward in embracing technology in an ever changing educational environment. SecondLife (www. SecondLife.com) is a virtual environment that is receiving global attention and recognition. In this paper, we compare SecondLife to other group support technologies through an extended T echnology Acceptance Model (TAM) lens. Th ...
The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emergence of Internet and W ...
This paper deals with the basic aspects of Honeypots, their use in modem computer networks and their implementation in educational environments. Initially, the implementation of Honeypots solves a common problem of Information Security and Forensics: The dissection of the elements that make up an attack against a computer system. Next, the paper explains the different types and functions of Honeyp ...
This paper presents the proposed IT Control objectives for implementing the Public Finance Management Act of 1999 (PFMA) for the Republic of South Africa. The aspects covered in this paper show the main concerns of accounting officers in implementing the PFMA. The ability of IT Control Objectives for Information and related Technology (COBIT) to enable the participation of IT in the design and imp ...
Despite government oversight, consumers continue to be concerned about the security of personal information used by corporations. Consumer concerns give rise to the necessity for corporations to manage information security. Navigating the multitude of existing security standards, including dedicated standards for information security and frameworks for controlling the implementation of information ...
Academic computing programs often want to keep pace with technological changes by frequently updating their program contents. These program changes are often reactionary and lack uniform standards. Thus some of the changes are often rolled back and, as a result, face additional changes shortly after their implementation. A helpful strategy in computer program updates is to utilize a standard curri ...
Despite the availability of numerous methods and publications concerning the proper conduct of information security risk analyses, small and medium sized enterprises (SMEs) face serious organizational challenges managing the deployment and use of these tools and methods to assist them in selecting and implementing security safeguards to prevent IS security compromises. This paper builds a case for ...
This paper reports on the work of a European Commission DG Education and Culture cofinanced project PBP-VC, Promoting Best Practice in Virtual Campuses, which is aimed at providing a deeper understanding of the key issues and critical success factors underlying the implementation of virtual campuses. The paper outlines a tentative model of issues underpinning best practice in virtual campuses deri ...
The paper shares experience accumulated in launching and implementing a curriculum model for bachelor level training of professionals - Information Brokers - to serve as mediators and consultants to different kind of clients. This requires that professional possess knowledge and skills in several areas as information technology, mathematics and statistics, business and economics, and consulting sk ...
This panel will inform the audience about an undergraduate IT program's preparation and process for ABET accreditation. The School of Information Technology at Macon State College is seeking accreditation from the Accreditation Board of Engineering and Technology (ABET). ABET accredits academic programs that prepare graduates for entry into the following professional disciplines: 1) applied scienc ...
This paper reflects on the skills required by university graduates to participate successfully in today’s global economy. The development of these skills in students throughout Australian universities has been guided by Core Graduate Attributes (CGA) policies. While information literacy skills have been recognised in most policies, more advanced information technology and communication (ICT) skill ...
In an ideal world, review and changes to computing curricula should be driven solely by academic concerns for the needs of students. The process should be informed by industry accreditation processes and international best practice (Hurst et al., 2001). However, Australian computing curricular review is often driven by the need for financial viability of programs with declining student numbers as ...
E-business courses were introduced in many universities around the world about ten years ago. Sometimes they were introduced at the undergraduate level, sometimes at postgraduate level and sometimes at both. This paper will present a case study examining the postgraduate e-business courses in two Australian universities and how they have changed over the last few years. The paper describes factors ...
The numbers of Computer Science professionals are rapidly increasing in Pakistan. Earlier revisions ofthe CS curriculum made by Higher Education Commission (EEC), Pakistan were based upon the critical skills needed for the professionals according to the demands of market. Unfortunately no effort was made to determine the critical skills needed for computer academicians. As part of the course devel ...
This paper highlights the rationale for all IT degrees being focused on Information Assurance holistically throughout the entire degree. It takes a look at the failure of industry to produce an operating system that provides user control of system activities and primarily serves the user rather than other special interest groups (Microsoft, Digital Rights Management, other applications vendors, et ...
Most universities where students study informational technologies and computer science have an introductory course dealing with the development and design of databases. These courses often include usage of database design tools. In this paper, the #EER tool is presented, the task of which is to make the process of relational databases design easier for the students and partially automatize it. The ...
We describe a project to evaluate an image database within an educational context. The partners in the EURIDICE project were educational institutions in a number of countries, together with other agencies and one commercial partner. Input to the database was provided by the commercial partner, a public library, and state archives. Evaluation was guided through a workshop in which all institutions ...
Electronic Data Capture (EDC) is increasingly being used in the pharmaceutical, biotech and medical device industries to gather research data worldwide from doctors, hospitals and universities participating in clinical trials. In this highly regulated environment, all systems and software must be thoroughly tested and validated, a task that is burdensome in terms of time and cost. Starting with da ...
This paper presents a virtual learning environment for HIP (Host Identity Protocol). HIP is a potential future Internet protocol currently under research. The main idea with HIP is the separation between the location and identity information by introducing a new cryptographic name space, called Host Identity (HI). This feature provides enhanced network security as well as easy management of mobili ...
This study surveyed how students’ backgrounds prepare them for online education. The study compared learning outcome between traditional and non-traditional (adult) undergraduate students in online and face-to-face sessions; the difference in learning over time; and the effect of prior online experience. Student learning measurements included: pre-test, final examination (post-test), and final let ...
Learning that is facilitated by electronic technologies, otherwise known as e-Leaming, can be either fully online, mixed mode (also known as hybrid), or web assisted; however, regardless of the delivery method, there are numerous tools and features at the disposal of students and instructors, and it is important for the e-learning community to examine both preferences and usage of these features. ...
The extensive introduction of online technologies to support teaching and learning is impacting how teachers teach and students learn. It is also affecting both teaching staff s and students’ perceptions of what each others’ roles are. The research reported here is part of a larger study that explored different aspects of teaching and learning in online environments. This study was undertaken with ...
Providing students in an asynchronous learning network (ALN) a rich learning environment is not easy, especially in terms of promoting higher cognitive functioning such as analysis and evaluation. The use of project-based, collaborative assignments has been demonstrated to foster greater depth of learning in traditional classroom settings, but this type of assignment is very difficult to plan, dev ...
How, where, when, and what we teach has been significantly influenced by technological innovation. Radio, television, and computers have all altered how information is presented and how students interact with that information. This paper describes how virtual worlds provide a mechanism to incorporate constructivist, experiential, and student-centered learning practices into the classroom. The auth ...
The review of literature pertaining to systems analysis and design and the design of systems for online teaching and learning has identified some “gaps” and has shown the need for a more specialised and specific method for the design of such systems. This paper presents research that was conducted to collect information to assist in the filling of the gaps of the systems analysis and design knowle ...
The aim of the project is the development of an innovative, Open Source-based eLearning portal, which provides high scalability and versatility, as well as it is easy to upgrade; it aims at meeting some changeable requirement in the field of distance learning (yearly or even monthly innovation). The modular structure and flexibility provided by the portal makes this system adaptable to any kind of ...
Based on recent proliferation of online education and ongoing technological revolution, this research focuses on interaction of students and faculty as a main contributor to the success of online education. A survey of 22 items was distributed to faculty members and students from the Midwest of the U.S. and 3 Eastern European countries during the period of 2002-2003. The data collected reflects st ...
In modem learning environments, the lecturer or educational designer is often confronted with multi-national student cohorts, requiring special consideration regarding language, cultural norms and taboos, religion, and ethics. Through a somewhat provocative example we demonstrate that taking such factors into account can be essential to avoid embarrassment and harm to individual learners’ cultural ...
This study is one of the few empirical studies to examine students’ acceptance of a web-based learning system (WLS). By incorporating intrinsic motivator into the technology acceptance model, our model attempts to explain students’ behavioral intention in using the system from a motivational perspective. Unlike most studies using subjects from developed countries, this study aims to extend knowled ...
This document presents a five year development initiative that sought to implement a learning management system clearly differentiated from the CMS domain. The present article reports on our research work showing our effort towards a design of a true learning management system which entails pedagogical strategies embedded into the system design and the online learning environment. This is characte ...
As more and more colleges and universities offer courses designed in the e-leaming format, quality of instruction and student performance are becoming, progressively more, issues that need to be addressed. This study is an attempt to add to the literature on student performance in traditional and e-learning environments as well as exploring student-centered and learner-centered as an instructional ...
Lean manufacturing has been widely adopted by many production companies. Apart from the operational difficulty associated with conversion from a traditional, functional based operation, adoption of Lean manufacturing involves significant organizational transformations. It requires formation of work teams, comprised of multi-skilled workers. The work teams are preferably self directed and need to c ...
The idea of the paper is to investigate how much the online user privacy is respected by website owners, and how online privacy can be improved. We first focus ourselves on issues like possibilities of misusing personal data, data collecting and user-tracking. Then we give a short report about legislation in the EU concerning user privacy. Some facts about user confidence are given as well. They a ...
This study looks at web use in hotels using a set of dimensions developed by Hashim, Murphy & Law (2007). The study investigates future directions of web use by looking at trends in one of the most established web communities. We found that the web features in the Hashim et al. dimensions model were universal across all types of hotel accommodation. We also found that directions such as disinterme ...
This study surveys forty four project leaders of recently completed e-commerce sites regarding customer participation in e-commerce development activities. Throughout the literature for four decades, a commonly cited factor pertaining to system success has been user participation in the systems development process. The business need for a rewarding customer experience on an e-commerce site would s ...
The current research aims to explore and analyze the application and use of a wiki, in a knowledge-management academic course. The research will focus on the level of collaboration among students and on the kind of interaction that takes take place during the learning process. The population of this study was comprised of wiki pages which were gathered from a knowledge-management wiki course in Is ...
This paper discusses the pedagogical considerations and the steps that have been taken by faculty members within a technology program to update their web design courses. The department of T echnology Support and Training (TST) - Eberly College of Business and Information Technology (ECOBIT) at Indiana University of Pennsylvania (IUP) has been updating their courses in response to technological cha ...
The first documented day-long program to encourage girls to consider computing as a career was held in 1987 in the U.K. Over the last 20 years these one-day events, labeled Girls into Computing days, have been conducted by academics and professionals to foster female-student interest in information technology (IT) degrees and careers. This paper charts the growth and popularity of these types of e ...
The paper examines the presence of knowledge-related wisdom in student assignments by applying the constructs of wisdom developed by researchers at the Max Plank Institute for Human Development in Berlin. They are factual knowledge, procedural knowledge, contextualisation, relativism, and uncertainty. Reciprocal instructor wisdom was operationalised as intellectual excellence, inter-personal skill ...
This paper reports on the findings from a quantitative research study into the use of a software tool that was built to support a part-complete solution method (PCSM) for the learning of computer programming. The use of part-complete solutions to programming problems is one of the methods that can be used to reduce the cognitive load that students experience during their learning. The tool that wa ...
The rapid evolvement of the computing domain has posed challenges in attempting to bridge the gap between school and the contemporary world of computing, which is related to content, learning culture, and professional norms. We believe that the interaction of high-school students who major in computer science or software engineering with leading representatives ofthe computing community of practic ...
Despite the importance of ICT (Information and Communication Technology) as a school subject in secondary education, there is a lack of an integrated ICT pedagogy that is elucidated within a broad framework of educational practice. The focus is still on technicalities and reproduction of knowledge rather than conceptual understanding of ICT. To realize the potential inherent in ICT, there is a nee ...
The study investigates the nature of relationship between ICT attitudinal constructs and use level of Nigerian teachers. A total of 467 teachers randomly drawn from teacher-training institutions participated in the study. Two research instruments; Teachers ICT Attitudinal Scales and Teachers’ Use of ICT Checklist were employed in collecting relevant information. Data collected were analysed using ...
Both industry and education struggle to foster the development of human resources who can manage and design information systems at an advanced level. Human resources, particularly within the field of business modeling, must develop the competency to conduct business in the real world. Determining how to foster competent human resources is an urgent and important issue for all educational programs ...
The concept of pedagogical content knowledge has been explored in the context of several disciplines, such as mathematics, medicine and chemistry. In this paper the concept is explored and applied to the subject matter of computer science, in particular to the subdomain of building UML class diagrams. It is argued that the identification and analysis of problems that students experience with impor ...
Abstract Debugging skill is an essential part of the programming skills. It is also highly related with program comprehension skills. In this paper we present a novel tool, called ViLLE, which supports learning debugging by promoting students' understanding of target program. ViLLE combines visual debugging features with the support for roles of variables. These roles promote activating schemas of ...
The Open Assignment Submission (OAS) is an innovative regime whereby students submit homework assignments of an appropriate nature into a designated open forum provided by the Learning Management System (LMS). Our previous research, carried out with a cohort of Education graduates, indicated possible benefits and challenges of OAS as a means of supporting assignment submission through learning fro ...
The problems encountered by students in first year computer programming units are a common concern in many universities, including Victoria University. As a fundamental component of a computer science curriculum computer programming is a mandatory unit. It is also one of the most challenging units for many commencing students who often drop out from a computing course as a consequence of having fa ...
The paper examines the moderating influence of the “Big Five” model of personality, emotional intelligence, and the impact of multiple intelligences, on the use of soft skills among final year students. The present work investigates the variables which affect students in the elaboration of their research projects during their final year of study. 187students reading for their final years were aske ...
T eacher education, which encompasses teaching, teaching effectiveness, the factors that determine teachers' thought processes and performances, and the social policies that affect teachers in all aspects and stages of their careers, is the fundamental groundwork and primary foundation, for attemptingto undertake various innovative and model learning and teaching approaches. However, a number of s ...
The article aims at presenting a Web learning portal that allows for improving employees’ competencies in implementation of the Internet related technologies in business. Such a portal is dedicated to small and medium sized enterprises (SMEs). The starting point for considerations is in suggesting initiatives that are necessary to undertake in the SME sector in the context of the knowledge based e ...
The paper draws on a didactic experiment conducted in a secondary school mathematics classroom in Greece which aimed to explore a) ways in which students develop problem representations, reasoning and problem-solving, making decisions and receiving feedback about their ideas and strategies in a DGS-supported environment b) ways in which students develop rigourous proof through building linking vis ...
Courses on Operating Systems (OS) are essential in computer science education. The topic provides the students with an excellent opportunity to experience the interplay between theory and practice. Specifically, a project-based-learning (PBL) instructional design for an OS course can provide the students with opportunities to engage in practical projects. The PBL approach enables students to take ...
Program visualization is one of the various methods developed over the years to aid novices with their difficulties in learning to program. It consists of different graphical - often animated - and textual objects, visualizing the execution of programs. The aim of program visualization is to enhance students’ understanding of different areas of program execution. Typical program visualization tech ...
This paper proposes the Active Learning for Classroom Management Model as a method to structure active learning experiences. The model was devised and tested in an Introductory Computer Programming course. Stages in the model are explained with examples of classroom activities. The model was evaluated twice in series of quasi-experiments and limited support was provided for improved student perfor ...
Technology education faces multiple challenges in the new millennium. In light of an increasing, overlapping and widening spectrum of technological fields of study, it has become imperative for students to be able to articulate their course of study and for technology departments to be able to assess the intended outcome of their program of study. The traditional approach of teaching one course at ...
Electronic portfolios are a student-centered outcomes-based assessment regime involving learners in the gathering, selection, and organization of artifacts synthesized into a compilation purposed to demonstrate knowledge, skills, and/or achievements supported by reflections that articulate the relevance, credibility, and meaning of the artifacts being presented. Electronic portfolios have been fou ...
It is widely accepted that assessment determines learning: what is learnt, how the learning takes place, the extent to which the learning is retained, and the extent to which that learning can be further developed or applied (Biggs, 2003; Boud, Cohen, & Sampson, 1999; Entwistle & Entwistle, 1997; Rowntree, 1992). This paper examines an assessment intervention undertaken independently by two South ...
This paper describes research experiences in student learning assessment in information systems programs. These research experiences resulted from research implemented at two Connecticut State universities during the past six years. The paper provides an overview of the expanding research in Information Systems education assessment and links assessment work at the program level with the use of sta ...
The paper discusses an evaluative technique or rubric for judging students’ responses to and observations on issues of computing. The paper discusses the frames of globalization, economics, social-cultural, and ethical as dimensions structuring the observations as well as the rubric.
The question to be examined in the intended research is whether and to what degree access to previous files gives students an advantage during a practical IT test , i.e. does it produce higher results on tests and if so how much? The hypothesis is that viewing previous files will make little or no difference to student performance. This was validated by the results.
The paper reports on the features of the framework for digital literacy support and documentation, developed within a research project the author is working on, with some colleagues in other Italian universities. First a short introduction on the features of today society often called “knowledge society” is reported, and the problems of digital divide and digital literacy are discussed. Soon after ...
Blogs are a new and intriguing form of communication and personal expression. Researchers are only just beginning to realise the value that these media present as sources of data for research. This paper begins to unveil the untapped potential that the blogosphere provides for research. The paper begins by introducing blogs, explaining their evolution and the important role they play in society. A ...
This paper explores factors such as socio-demographics, income and wealth and e-skills that may influence the adoption of the ICTs at the individual level. We examine to what extent these factors contribute to the digital divide between different social groups in Serbia. We use the panel data from the survey “ICT usage in Republic of Serbia” in 2006 and 2007, covering over 3000 individuals/househo ...
Previous research conducted by the author investigated the socio-political backgrounds of two groups of female students studying computer-related university programmes. They came from distinctly different backgrounds and were enrolled at two institutions with very different legacies. The author found that socio-political factors, in particular the role of a dominant female household head and aggre ...
The applications of the Information, Education and Communication approaches to all sectors have brought unexpected changes in the attitudes and behaviours of people of all ages. The overwhelming amount of theoretical and empirical work done regarding the impact of ICT on educational processes has highlighted the benefits of ICT to students, teachers, and parents. Mauritius is faced with a double d ...
Globalization, the coalescence of the economies and cultures of this planet, has raised new ethical issues. Information Technology (IT) is an enabler of globalization, but IT also produces new ethical problems. There is already a substantial literature in philosophy and political theory on globalized ethics, but not much on IT’s special impact on globalized ethics. This paper is a sketch of the ma ...
The discovery, development or invention of new objects and phenomena by humankind, requires a new set of words to be coined or adopted to describe it. This is also true of the Information Communication Technology (ICT) world. Words are not neutral, regardless of which dialect or language they occur in. They carry with them associations and connotations based on their previous applications and alli ...
Mobile phones in Australia record one of the world’s highest rates of ownership among children under 18. This paper examines issues of mobile phones and Australian children and the various discourses (systematic frames) used in discussing their effects. These are the optimistic (gains); pessimistic (losses, costs or harms); pluralistic (technology per se is neutral but how it is used matters); his ...
Higher Education is increasingly relying on e-leaming as a means of providing students with teaching and learning resources. Almost inevitably, this means that students interact with these learning resources through the medium of the computer screen. Although there have been significant advances in the design and implementation of on-line resources, exactly how students interact with these resourc ...
Though the number of collaborative websites, or wikis, continues to grow, few studies have examined the role of graphics in a successful wiki design. This study examines the development of graphic organizers within an academic wiki over a period of 8 months. Wikis traditionally rely on a text-only approach to allow for user flexibility. However, this study found that the ability to easily add link ...
This paper presents the birth of an open source learning object repository (OSLOR) from design to implementation. Critical design issues such as user interface, type of LOR, standards, metadata, and the programming language were considered in the process. These issues revolve around the essential characteristics of LOR, i.e., interoperability, reusability, and accessibility. Conclusion and recomme ...
Learning objects have long promised dramatic savings of time and money in course and curricula development, but they have failed to deliver the return on investment that seems a natural extension of their existence - reusability. Because a single hour of online instruction can take up to 300 hours to develop (Kapp 2003), reusability is the core value message offered by learning object promoters, f ...
Worked-out examples serve an important role in the educational process. In order to take advantage of such carefully designed examples, students have to "make sense" of the examples and retrieve them whenever it is appropriate. This calls for a knowledge management process to be conducted by the students; a process we implemented as a learning task during a Knowledge-Based Systems course. Students ...
The present paper offers that most of the advocates of discipline of library and information science believe that there is a lack of theoretical foundation and rational identity. The author maintains that there has been an error in defining the subject by confusing library with librarianship. That is many researchers have derived the concept of librarianship from library. Therefore they came to de ...
In order to realize the objective of expanding library services to provide knowledge management support for small businesses, a series of requirements must be met. This particular phase of a larger research project focuses on one of the requirements: the need for a document classification system to rapidly determine the content of digital documents. Document classification techniques are examined ...
This paper presents an assessment of School Information Systems (SIS) Utilization in the United Arab Emirates’ (UAE) primary schools through a holistic descriptive approach that involves explaining, studying and analyzing the current technical status of the schools’ SIS. To do so, the researchers used a series of case studies (documents analysis, questionnaires and interviews) of a number of prima ...
In this paper we show that interviews between IT consultants and clients are considered best practice in terms of methods for eliciting IS requirements as part of IS development projects. The process of conducting successful conversations with clients as part of requirements elicitation interviews is not well understood. The paper reports a literature survey which established current understanding ...
Developing information systems (IS) strategies and choosing the right IS portfolio for an organization require, among other things, identifying the most appropriate IS projects, determining how best to organize the IS staff, and arranging for IS procurement. All of these actions involve decision-making. This paper analyzes IS strategic decision-making in organizations, with the Garbage Can Model ( ...
Understanding the factors that affect continued use or discontinuance of an information system beyond initial adoption is one of the most challenging issues in information systems research. This paper combines information economics, the technology acceptance model (TAM), and diffusion of innovation theory, and analyzes barriers with respect to the continued use of information systems. The suggeste ...
Knowledge Management exploded into visibility as a management topic in the mid-1990s with a significant impact in the IT applications area. It has had high visibility for the last decade and, in recent years, has come under some critical scrutiny - - questioning the success of many of the attempts to manage knowledge, especially those with an IT focus, as well as some suggestion that it was merely ...
The paper describes the initiative of the management of a higher education institution to design and realize an Information System (IS) in order to implement new study rules for new study programmes that are in agreement with the Bologna Declaration. The authors based their work on the common theory about projecting ISs, but with focus on expected practical results. The goal is to achieve better o ...
While much of the prior information system (IS) research has employed technology acceptance model (TAM) and theory of planned behavior (TPB) to explain user’s technology acceptance behavior, most of them use self-reported use intention to develop their investigation. The purpose of this paper is to empirically examine the validity of behavioral intention’s prediction on actual system usage under a ...
The purpose of this paper is to present the results of an end-of-project impact assessment (IA) of a Social Enterprise Development Center (SEDC) (created in Pakistan 7 years ago). The SEDC was created in 2000 to provide mainly training to non-government organizations (NGOs) and be a central recourse for their communication, resource sharing and support. The IA entailed the measurement of a large n ...
Many companies now actively use the Web as a key marketing and sales vehicle for their goods or services. To be successful, e-commerce Web sites must be useful, easy to use, easy to navigate, and easy to understand - measures of the Technology Acceptance Model’s (TAM) variables Perceived Usefulness and Perceived Ease of Use. Although many studies have used the model to better understand e-commerce ...
This paper presents a model to measure and to explain knowledge and sustainable competitive advantages generation within the Efficient Consumer Response (ECR) framework. Some specific goals are: a) identification, selection and validation of intellectual capital and of sustainable competitive advantages, b) study of what we name associate concepts: facilitators, implantation drivers and critical s ...
This article explores the possibility of integrating some of the most referenced ICT Management Frameworks in managing ICT infrastructure in the banking sector. This was done by identifying core components that it should address and the related frameworks that need to be applied at each component. In this context, this article is also prompting further research in managing ICT infrastructure throu ...
Conventionally, enterprise services that can be utilized by mobile devices such as E - mail, instant messaging, data transfer, news and event notification have been typically achieved using GPRS (General Packet Radio Service) connections to access internet servers that provide these services. Thus, even in a local area, disadvantages such as full dependence on GPRS service providers, incurred GPRS ...
Mobile and wireless devices and networks enable "any place, any time" use of information systems, providing advantages, such as productivity enhancement, flexibility, service improvements and information accuracy. These benefits can be nullified by using systems of insufficient quality. Mobile-wireless information systems face new kinds of problems: narrow bands, small devices, tiny screens, and d ...
The functional approach to software development has been used for years and new methodologies have evolved, including, object-oriented approach. Objects are sharing an important part in the software business. They have become the building blocks of many systems whether commercial applications, real-time applications or embedded systems applications. As objects represent an abstraction of the real ...
The objective of connection admission control (CAC) is to keep the network load moderate to achieve a performance objective associated with Quality of Service (QoS). Cell Loss Ratio (CLR), a key QoS parameter in ATM networks, is essential for proper network resources dimensioning, congestion control, bandwidth allocation and routing. In this research, we employed fuzzy logic technique in Statistic ...
This paper presents a logical, mathematical and geometrical interpretation of the previously presented term, infoledge. There is a strong relationship between the infoledge concept and complex numbers, which is utilized by the researchers in the mathematical interpretation of the infoledge concept. Autopoietic theory skeleton is the starting point in the current paper. Further more, the physical c ...
What is normally described as bias? A possible definition comprises attempts to distort or mislead to achieve a certain perspective, i.e. subjective descriptions intended to mislead. If designers were able to exclude bias from informing systems, then this would maximize their effectiveness. This implicit conjecture appears to underpin much of the research in our field. However, in our efforts to s ...
Nowadays the product warranty plays increasingly important role in any business transaction. It is a valuable attribute of the product and it is used extensively in marketing and advertising. It is a tool to enforce the competing power of the producer on the market place. There is a vast literature on the product warranty related to the product malfunctioning. In this study we address another type ...
Worldview as a kind of man's look towards the world of reality has a severe influence on his classification of knowledge. In other words one may see in classification of knowledge the unity as well as plurality. This article deals with the fact that how classification takes place in man's epistemological process. Perception and epistemology are mentioned as the key points here. Philosophers are us ...
For more than 25 years, the framework of Ives, Hamilton, and Davis (1980) for research in computer-based (C-B) management information systems served hundreds of doctoral dissertations without yielding results of lasting validity. This paper summarizes the more lasting results from prior studies about the nature of informing for operations (whether human or robotic) as seen through the lens of deci ...
This study suggests an attention economy perspective on incomplete information, asserting that people use partial information as basis for action, hence an effective information system should provide them just with the most useful partial information, and should avoid redundant information that wastes their limited attention resources. These assertions were empirically examined via simulation of a ...
In this article the subject of Informing through user-centered Exploratory Search and Information Retrieval utilizing human-computer interaction strategies is analyzed. Exploratory Search is a new field that has sprung from the more general Information Retrieval. Informing Science is a trans-discipline which transcends a large variety of fields and seeks how to best inform all the clients of inter ...
The ongoing migration of mobile lifestyles and the increasing capabilities of portable systems will continue to drive demand for more flexible and portable battery charging systems (Brown, 2006). The use of computers has been limited due to lack of constant availability of power -issues such as data loss, transaction breakages, data compromise have become major challenges in areas (especially thir ...
It has been argued that culture effects how individuals implement, understand, and teach the curriculum of business courses within a society’s educational institutions (Burcik, Kohun, & Skovira, 2007; DeLorenzo, Kohun, & Skovira, 2006; Hofstede & Hofstede, 2005). The curricula and their subject matter of business faculties reflect the societies in which the curricula are developed and in which the ...
We present the initial study based on the development of an online tool for sales representatives of cosmetic products in Mauritius. The management tool to be developed is expected to help the sales representatives to better manage their business. Virtually all the sales representatives in Mauritius are currently using a manual system and hereby face lots difficulties to optimize their business. W ...
The present research aims to evaluate digital learning objects architecture and build metrics -based on analyze of the financial, administrative and software engineering aspects - to define a prevision of the necessary investment to develop digital learning object. To develop some metrics it was necessary an online survey research with professionals that works with digital learning objects develop ...
This study examines the relationship between students overall result in a midterm grade in Excel and their ability to predict how well they will perform on specific topics in three Excel tests. The metacognitive skill of predicting performance on specific topics permits appropriate focus in preparing for tests. The hypothesis is that very good students will have significantly more success calibrat ...
This paper introduces the importance of a well-articulated, research-worthy problem statement as the centerpiece for any viable research. The aim of this work is to help novice researchers understand the value of problem-based research by providing a practical guide on the development of a well articulated and viable statement of a research-worthy problem as the starting point for all research. Ad ...
Building upon previously published articles from 18 different disciplines, this research delves into the area of how academics inform one another, addressing the issue of how academic scholars can determine the optimum journal for submission of their research. A comprehensive model of the journal selection process is developed, including 39 detailed considerations spread over three major categorie ...
Web-based application development is a difficult task, since these applications include various features, like graphical interfaces, navigational structures, business models, and wireless communications, as well as other issues, such as serving a multitude of users, and the need for shorter development time. To overcome these complexities, it is indispensable to use web-based application designs a ...
With the development of the World Wide Web, conference management can be further elevated by using a powerful and intelligent tool that provides a borderless communication. This can be realized with a conference management tool using ontology functionality. Ontology provides diverse capabilities in terms of functionalities and flexibility. Defining a detailed conference specification via ontology ...