Proceedings
Online ISSN: 1535-0703
Papers accepted for the Informing Science & IT Education Conference (InSITE) 2015 were published as the proceedings papers listed below or in one of the ISI journals. A complete listing of papers published as the full Proceedings of the Informing Science & IT Education Conference (InSITE) 2015 can be found at http://proceedings.informingscience.org/
0
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage bei ...
1 - 11
This paper presents the findings of an exploratory study of web based marketing (WBM) usage predictor variables in the context of micro and small-scale enterprises (MSEs). By means of a cross-sectional field study, a structured questionnaire was used to elicit responses from 267 enterprises situated in the South East Region of Nigeria. The main rationale for this study is to provide a vivid descri ...
13 - 28
The most common way of ensuring confidentiality of data or documents by individuals, governments, and institutions such as banks, hospitals, and other commercial enterprises is by consigning their secrets to a computer system. But this has not solved the problems of upholding security, instead they are more compounded due to the fact that secrets sharing is generally desired but only in a tightly ...
29 - 41
Cryptography is the science of writing in secret codes which can be achieved either by using software encrypter or hardware encrypter. This study presents the development of a pair of circuit system-based (hardware) cryptographic processor. The hardware encryption in this study was achieved using the bitwise logic operations in the registers of the microcontroller and messages are streamed as seri ...
43 - 58
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in diff ...
59 - 77
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Cons ...
79 - 89
As network continue to grow it is increasingly important that network administrators are aware of the different types of traffic that is traversing their networks as well as provides sufficient means for decision making process. Traffic monitoring and analysis is essential in order to more effectively troubleshoot and resolve issues when they occur, so as not to bring network services to a stand s ...
91 - 100
This quantitative exploratory study, a continuation of the university’s four year research initiative that addresses the high national rate of doctoral student attrition, investigates whether a private online workspace for doctoral students and their dissertation committee will enhance communication and reduce learner’s feelings of isolation during the dissertation phase. Private doctoral workspac ...
101 - 112
Electronic health records (EHR) are the digitized longitudinal health records of an individual that is shared across agencies and providers. The low use rate of EHR system is partially attributed to the lack of interconnectedness with other data sources and limited patient health information availability. A survey of health professionals was conducted to investigate the relationships between avail ...
113 - 125
The purpose of the present study is to investigate the status of the core curriculum in higher education doctoral programs from the perspective of program directors. We used online survey analytic techniques to query program directors about their EdD and PhD programs in higher education, credit hours, and curricular content. Our study confirms previous work finding that there is common agreement i ...
127 - 143
The concept of Anonymous Internet is getting traction in the wake of recent privacy related NSA (National Security Agency) privacy allegations. Based on our initial findings, Tor appears to be a solution for this and taking control of the Internet and the User’s privacy. Our study reveals that Tor’s power and future ability to thrive revolves around its expansion. Tor needs to grow in size specifi ...
145 - 153
Asthma and Chronic Obstructive Pulmonary Disease (COPD) is among the highest health diagnosis and therefore an economic drain, which puts substantial pressure on a huge number of patients, communities, and health systems. These chronic conditions are presently incurable but their symptoms can be controlled through quality health care, appropriate medications, and good self-management skills. Many ...
155 - 170
Purpose- The purpose of this paper was to review related literature on community service initiatives, benefits and the involvement of librarians in Community service programme with a focus on the University of Port Harcourt Community Service programme. This review was also undertaken to establish a link between the Community Service programme and purposeful librarianship.
Methodology- Related li ...
Methodology- Related li ...
171 - 178
The idea of innovation, while not new, has taken on a whole new meaning in the 21st century. With his introduction of the ideas of disruptive innovations in the 1990s, Clayton Christensen has quickly become a leader in the field of innovation education. Christensen expanded his theory to encompass not only industry, but also healthcare and education. It is in this field of education that much work ...
179 - 186
Since their initial introduction in the early 90’s, the popularity of web based online social networking sites has been growing exponentially, encompassing millions of users. As these social networks continue to grow and become more popular, users’ different social circles (friends, family, and colleagues) are very likely to collide, as they all coexist under the same infrastructure. Considering t ...
187 - 199
School informatics is a relatively new subject in comparison to mathematics and science. As a result, there is much less research on the area of informatics didactics. Likewise, there is lack of theoretical grounding of the field and associated teaching methods and learning processes. The lack of research in the field of school informatics makes it difficult to identify which methods are effective ...
201 - 219
There is much known about logical ways of implementing security measures in an organization. Anecdotal evidence shows that few organizations implement a full suite of measures. This study used a single case to identify problems with a logical implementation. A framework was developed using the literature and these identified problems. The framework was then tested through interviews of experienced ...
221 - 229
The problem addressed in this paper is the ambiguity that exists in the usage of the terms “enable” and “transform” and their related forms in the Green IS literature. This ambiguity creates uncertainty, both conceptual and practical, about the precise role of Green IS in these research and use contexts. Consequently, the exact relationship between Green IS and environmental sustainability can be ...
231 - 245
The development of Information and Communication Technologies (ICT) resulted in transforming the traditional hierarchical organizations into networking flexible ones. In the circumstances of identifying a new type of organizations, the notions as ‘organization’ and ‘synergy’ should be revised. The organizations with individual elements that build up a network have altered their attitude towards th ...
247 - 258
NoSQL databases are an important component of Big Data for storing and retrieving large volumes of data. Traditional Relational Database Management Systems (RDBMS) use the ACID theorem for data consistency, whereas NoSQL Databases use a non-transactional approach called BASE. RDBMS scale vertically and NoSQL Databases can scale both horizontally (sharding) and vertically. Four types of NoSQL da ...
259 - 268
Algorithm performance coverage in textbooks emphasizes patterns of growth in execution times, relative to the size of the problem. Variability in execution times for a given problem size is usually ignored. In this research study, our primary focus is on the empirical distribution of execution times for a given algorithm and problem size. We examine CPU times for Java implementations of five sorti ...
269 - 283
Cloud computing has brought many to the world of computers. Unfortunately it also created new opportunities for criminal activities. This paper used a descriptive literature review to determine the issues that are currently influencing digital investigations. The results show that there are many unaddressed issues affecting the identification, preservation and acquisition of evidence in the cloud. ...
285 - 299
Business Intelligence is important tools to improve business processes. More and more companies, government units use BI. But there are not still so many solutions which can be applied in local government units. From this reason the paper has been devoted to the supporting managerial decision-making processes in the Polkowice commune, Poland using BI technology. It consists of the following part ...
301 - 311
The focus of the paper is information and communications technology (ICT) solutions in hybrid information systems in a local government unit. As the exemplary local government unit, the social welfare center (Ośrodek Pomocy Społecznej, or “OPS”) in Polkowice, Poland, was chosen. After a brief introduction, problem statement, goal of study, research questions and methodology, the issue of how ICT s ...
313 - 326
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most notable of which is cryptography. Cryptographic Hash ...
327 - 338
Software technology has high impact on the global economy as in many sectors of contemporary society. As a product enabling the most varied daily activities, the software product has to be produced reflecting high quality. Software quality is dependent on its development that is based in a large set of software development processes. However, the implementation and continuous improvement of softwa ...
339 - 351
Computer anxiety especially in first-year university students is common and continues to be a significant issue as it manifests itself in a number of negative emotions with significant detrimental impact to students. This is especially true in the context where students use computers for course work – online learning. Research work addressing the effect of computer/Internet experience on anxiety a ...
353 - 365
Diversity is a relative concept, which has been applied to a number of domains, such as culture and biology. A simple measure of diversity is derived by drawing from the domains of biological and cultural diversity, as well as, information retrieval for its measurement capabilities. This domain independent diversity measure can be used to determine diversity between entities in any collection that ...
367 - 383
The Information Systems (IS) profession is known as one of the most dynamic fields in our current day and age. Rapid advances in Information and Communication Technologies (ICTs) increase the dependence of organizations on these ICTs and create a greater need for IS competence. This demand constitutes serious challenges to academia to provide graduates with the necessary skill set to fulfil their ...
385 - 399
Teaching and learning is no longer the same and the paradigm shift has not settled yet. In this study we frame immersive learning as a method which we believe can be designed by experiential, constructivist, and collaborative elements. We then present a peer to peer interactive web-based learning tool, which was designed, and implemented in-house and piloted in a PhD course on ‘Pedagogical Methods ...
401 - 415
Among developments in the field of business intelligence (BI), the notion of maturity has gained considerable interest for defining the directions to expected value, for summarizing the experience available, and for defining the possible avenues of BI development. There is considerable experience in creating and implementing BI systems, and many gaps separating the declared goals from the achieved ...
417 - 428
Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, w ...
429 - 444
The objective of this paper was to determine the perceived barriers and motivators of mobile ICT adoption by South African micro entrepreneurs. Current research shows that mobile ICT can help ensure the success of micro enterprises. However, there are barriers and motivating factors, which influence the mobile ICT adoption rate of micro enterprises and they seem to differ between countries. Sem ...
445 - 465
In business school, students must learn essential communication, analytical, and problem-solving skills. In this study, we examine whether the prototyping project in our computer-based information system (CBIS) course enhances these three essential skills. The prototyping process, taught with an information system approach, is the focus of our project-centered teaching method. The pedagogy uses a ...
467 - 478
The digital divide between those more and those less technologically skilled is a reality and has been for many years. This divide is especially prominent in developing countries such as South Africa and in societies that suffer from socio-economic disadvantage. There are many reasons for the continued presence of this divide and these are briefly described in this paper. The negative consequences ...
479 - 491
The world is an interconnected global village due to the increasing adoption and reliance on technology, but an ugly side of the increased usage of technology has come to light. The issue of harassment and abuse on the internet has led to relatively new issues such as cyber harassment, cyber incivility and cyberbullying.
A case study was conducted within two faculties at the University of Cape T ...
A case study was conducted within two faculties at the University of Cape T ...
493 - 504
This paper proposes the innovative methodologies for the robust and stable design of optimal stable digital infinite impulse response (IIR) filters using different mutation variants of hybrid differential evolution (HDE). A multivariable optimization is employed as the design criterion to obtain the optimal stable IIR filter that satisfies the different performance requirements like minimizing the ...
505 - 520
In Zimbabwe the health care delivery system is hierarchical and patient transfer from the lower level to the next higher level health care facility involves patients carrying their physical medical record card. A medical record card holds information pertaining to the patient’s medical history, pre-existing allergies, medical health conditions, prescribed medication the patient is currently taking ...
521 - 530
This paper is basically a case study and an attempt has been made to highlight the information literacy skills among the health science professionals i.e. teachers and postgraduate students of Guru Gobind Singh Medical College (constitute college of Baba Farid University of Health Sciences), Faridkot. The information literacy has various parts such as Computer Literacy, Library Literacy, Media Lit ...
531 - 541
[The final form of this paper was published in the Journal of Information Technology Education: Research]
This paper describes the flipped classroom approach followed in two second year Information Systems courses. The various techniques employed through this approach are described. These techniques were underpinned by a theory of coherent practice, which is a pedagogy that provides a framewo ...
This paper describes the flipped classroom approach followed in two second year Information Systems courses. The various techniques employed through this approach are described. These techniques were underpinned by a theory of coherent practice, which is a pedagogy that provides a framewo ...
900
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.]
An E-Portfolio Assessment Management System (EAMS) can be an innovative tool that provides students with flexible opportunities to demonstrate the acquisition of skills and abilities in an outcome-based institution. The system has been developed and used for the past ten years ...
An E-Portfolio Assessment Management System (EAMS) can be an innovative tool that provides students with flexible opportunities to demonstrate the acquisition of skills and abilities in an outcome-based institution. The system has been developed and used for the past ten years ...
901
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to ...
902
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Simulations have been shown to be an effective tool in traditional learning environments; however, as distance learning grows in popularity, the need to examine simulation effectiveness in this environment has become paramount. A casual-comparative design was chosen for this study ...
903
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.]
IT graduates need a suite of technical competencies and soft skills married with an understanding of the social and business contexts of the systems that they build. To instill in students an awareness of current IT industry practice coupled with the broader impact of their disci ...
IT graduates need a suite of technical competencies and soft skills married with an understanding of the social and business contexts of the systems that they build. To instill in students an awareness of current IT industry practice coupled with the broader impact of their disci ...
904
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Information Technology (IT) high school learners are constantly struggling to cope with the challenges of succeeding in the subject. IT teachers therefore need to be empowered to utilize appropriate teaching-learning strategies to improve IT learners’ success in the subject. By pro ...
905
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Considering that big data is a reality for an increasing number of organizations in many areas, its management represents a set of challenges involving big data modeling, storage and retrieval, analysis and visualization. However, technological resources, people and processes are c ...
906
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] An algorithm learning tool was developed for an introductory computer science class in a specialized science and technology high school in Japan. The tool presents lessons and simple visualizations that aim to facilitate teaching and learning of fundamental algorithms. Written test ...
907
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] This paper compares the effect of social isolation on students enrolled in online courses versus students enrolled on campus courses (called in this paper Face-to-Face or F2F). The paper uses grade data collected from a computer literacy course that was recently taught by the autho ...
908
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] This paper presents the success story of the intuitive vision of an ICT high school educator in South Africa. The growth and evolution of a Community of Practice, towards a full-fledged living lab is investigated. A grounded theory study analyses the living lab concept and highligh ...
909
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Requirements elicitation is the process through which analysts determine the software requirements of stakeholders. Requirements elicitation is seldom well done, and an inaccurate or incomplete understanding of user requirements has led to the downfall of many software projects. T ...
910
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] The significance of ICTs in supporting socio-economic development in developing countries is inevitable. As academics of information systems in developing countries, we cannot ignore the need for teaching and building the capacity of our students to become knowledgeable and skilled ...
911
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] In the digital technology era, mobile devices have an important rule to deploy a copy of data and information through the network. An electronic reader (eReader) allows readers to read written materials in an electronic manner that is available in many models. The objective of this ...
912
This research seeks to analyze the project success factors related to project managers' traits. The context of the research entails a 'united nations' type of organization. Critical success factors from previous recent studies were adopted for this research. Nineteen factors were adopted and a survey methodology approach was followed. Sixty six participants completed the survey. Exploratory factor ...
913
Quyen Le, Deputy Director at ABC Textile and Dyeing Joint Venture Company (JVC), returned from a meeting with an Enterprise Resource Planning (ERP) service provider. Quyen was wondering which options of ERP implementation would be best suited to gain staff support and pre-pared the company for long term development.
ABC had undergone considerable growth in recent years. Having become one of lead ...
ABC had undergone considerable growth in recent years. Having become one of lead ...
914
The impact that Facebook and Twitter usage has on the creation and maintenance of university student’s cognitive social capital was investigated on students in the Western Cape province of South Africa. Facebook and Twitter were selected as part of the research context because both are popular online social network systems (SNSs), and few studies were found that investigated the impact that both F ...
915
As mobile devices become prevalent, there is always a need for apps. How hard is it to develop an app especially a cross-platform app? The paper shares an experience in a project involved the development of a student services web app that can be run on cross-platform mobile devices. The paper first describes the background of the project, the clients, and the proposed solution. Then, it focuses ...
916
It can be argued, that public organization, in order to provide sufficient service for the public in a present highly competitive and continuously evolving environment, requires changes. The changes are often related to the implementation of information systems (IS) and they should be the result of change management (CM). However, theories and approaches to CM currently available to practitioners ...
917
Digital solutions have substantially contributed to the growth and dissemination of education. The distance education modality has been presented as an opportunity for worldwide students in many types of courses. However, the development of digital educational platforms requires different expertise to its development including knowledge areas such as pedagogy, psychology, computing and digital tec ...
918
In today's knowledge environment, individuals and groups who gather relevant information about the organization's external environment and distribute that information for use by their colleagues, receive increasing attention and are viewed with great importance. These individuals have been named Information Gatekeepers. Thus far, researchers have not established a unanimous and interdisciplinary d ...
919
This paper identifies areas in the design science research (DSR) subfield of the information systems (IS) discipline where a more detailed consideration of practitioner audiences of socio-technical design artifacts could improve current IS DSR research practice and proposes an initial conceptualization of these audiences. The consequences of not considering artifact audiences are identified throug ...
920
This paper discusses applications of the measures of the risk of misinforming and the role of the warranty of misinforming in the context of the informing component of Customer Related Management (CRM) issues. This study consists of two parts. Firstly, we propose an approach for customers’ grouping based on their attitude toward assessing product's properties and their expertise on the terminology ...
921
This paper reports on a case study of a group of six non-native English speaking migrant women’s experiences learning English vocabulary in a mobile assisted language learning (MALL) environment at a small community centre in Western Australia. A sociocultural approach to learning vocabulary was adopted in designing the MALL lessons that the women undertook. The women provided demographic informa ...
922
E-learning is an important trend globally accepted to enhance the acquisition of knowledge by students within and outside the classroom to improve their academic pursuit. Online Discussion Forum (ODF) is one of the tools that are used for e-learning in Nigerian universities. It facilitates interaction among postgraduate students as they can communicate and share information sources with one anothe ...
923
Technology has transformed education, perhaps most evidently in course delivery options. However, compelling questions remain about how technology impacts learning. Adaptive learning tools are technology-based artifacts that interact with learners and vary presentation based upon that interaction. This paper compares adaptive learning with a conventional teaching approach implemented in a digital ...
924
Courses on Human Computer Interaction (HCI) largely differ in the conception of the role of the course in the program, in the topics to be included, in emphases, in the instructional strategies that are employed and more. This paper describes the design and implementation of an HCI course for students of the Management Information Systems department in our college. Students’ intermediate and final ...
925
This study examines diverse information media in order to identify those formats that are most suitable for consumption via handheld mobile devices, namely smartphones and tablets. The preferences of the users were measured objectively, by analyzing actual data of their relative use of handheld mobile devices and personal computing (PC) desktop devices, including laptops and notebooks, for consump ...
926
This project shows a creative approach to the familiar scavenger hunt game. It involved the implementation of an iPhone application, HUNT, with Augmented Reality capability for the users to play the game as well as an administrative website that game organizers can use to create and make available games for users to play. Using the HUNT mobile app, users will first make a selection from a list of ...
927
Visuals and graphics have been used for communicating complex ideas since 1786 when William Playfair first invented the line graph and bar chart. Graphs and charts are useful for interpretation and making sense of data. For instance, John Snow’s scatter plot helped pinpoint the source of a cholera outbreak in London in 1854 and also changed understandings of how germs were spread. While popular ...
928
Internship courses, unlike others, are multi-pronged because they require coordination at different levels. Typically, a faculty coordinates the communication and implementation at these multiple levels to lead the completion of internship courses. We call the position that this faculty holds and does all this communication/coordination the “internship coordinator”. For the work of the internship ...
929
A capstone course is normally offered at the end of a program of study with the goal of helping students synthesize what they have learned in the courses preceding it. The paper describes such a course, —the undergraduate capstone course for MIS majors, —that was built around the case discussions and projects and originally offered in a face-to-face format. Over the course of the study, an async ...
930
There is a dearth of research in teaching strategies and learning approaches for units involving sensitive topics. Sensitive topics could provoke an emotional response in students. In a business ethics unit, the attempt at striking a balance between conceptual knowledge and theory with that of skills training can be challenging because such unit can involve personal, sensitive or controversial t ...
931
The paper introduces a novel Personal Knowledge Management (PKM) Concept and prototype system. Their objective is to aid life-long-learning, resourcefulness, creativity, and teamwork of individuals throughout their academic and professional life and as contributors and beneficiaries of organizational and societal performance. Such a scope offers appealing and viable opportunities for stakeholders ...
932
The Joint Interagency Field Experimentation (JIFX) event, organized by the Naval Postgraduate School (NPS), is conducted 3-4 times a year at various locations. The four day event can be characterized as an informing system specifically designed to facilitate structured and unstructured communications between a variety of parties—e.g., software developers, inventors, military and civilian users of ...
933
Empowered by, and tethered to, ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe activities of teens and young adults. The following paper presents the findings of a study examining the soci ...
934
Digital technologies are increasingly implemented in Swedish schools, which impact on educa-tion in the contemporary classroom. Screen-based practice opens up for new forms and multi-plicity of representations, taking into account that language in a globalized society is more than reading and writing skills.
This paper presents a case study of technology-mediated instruction at the primary-school ...
This paper presents a case study of technology-mediated instruction at the primary-school ...
935