Volume , 2015
Papers accepted for the Informing Science & IT Education Conference (InSITE) 2015 were published as the proceedings papers listed below or in one of the ISI journals. A complete listing of papers published as the full Proceedings of the Informing Science & IT Education Conference (InSITE) 2015 can be found at http://proceedings.informingscience.org/
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber security research due to losses from sabotage bei ...
digital watermarking, cyber security
1 - 11
Investigating Web Based Marketing in the Context of Micro and Small-Scale Enterprises (MSEs): A Decision Tree Classification Technique
This paper presents the findings of an exploratory study of web based marketing (WBM) usage predictor variables in the context of micro and small-scale enterprises (MSEs). By means of a cross-sectional field study, a structured questionnaire was used to elicit responses from 267 enterprises situated in the South East Region of Nigeria. The main rationale for this study is to provide a vivid descri ...
decision tree classification technique, developing country, Internet, micro and small-scale enterprises (MSEs), Nigeria, social media, web based marketing (WBM)
13 - 28
The most common way of ensuring confidentiality of data or documents by individuals, governments, and institutions such as banks, hospitals, and other commercial enterprises is by consigning their secrets to a computer system. But this has not solved the problems of upholding security, instead they are more compounded due to the fact that secrets sharing is generally desired but only in a tightly ...
Cryptography, Shared Processing, Parallel Computing, Elgamal Principle
29 - 41
Cryptography is the science of writing in secret codes which can be achieved either by using software encrypter or hardware encrypter. This study presents the development of a pair of circuit system-based (hardware) cryptographic processor. The hardware encryption in this study was achieved using the bitwise logic operations in the registers of the microcontroller and messages are streamed as seri ...
Cryptology, Cryptography, Encrypter, Communication, Protocol, Microcontroller
43 - 58
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in diff ...
Cybercrime, factor analysis, contributory indices, security, fraud, criminal
59 - 77
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. Cons ...
Security, Graphical password, Textual password, Authentication,
79 - 89
As network continue to grow it is increasingly important that network administrators are aware of the different types of traffic that is traversing their networks as well as provides sufficient means for decision making process. Traffic monitoring and analysis is essential in order to more effectively troubleshoot and resolve issues when they occur, so as not to bring network services to a stand s ...
Network Traffic Monitoring and Analysis Tools, Sniffer Traffic Flow, snoop, tcpdump, Ngrep, Wireshark
91 - 100
This quantitative exploratory study, a continuation of the university’s four year research initiative that addresses the high national rate of doctoral student attrition, investigates whether a private online workspace for doctoral students and their dissertation committee will enhance communication and reduce learner’s feelings of isolation during the dissertation phase. Private doctoral workspac ...
attrition, communication, dissertation, dissertation committee, doctoral community, network, isolation, private doctoral workspace, retention
101 - 112
Electronic health records (EHR) are the digitized longitudinal health records of an individual that is shared across agencies and providers. The low use rate of EHR system is partially attributed to the lack of interconnectedness with other data sources and limited patient health information availability. A survey of health professionals was conducted to investigate the relationships between avail ...
Electronic Health Records, User Satisfaction, Availability, Portability, Stakeholders
113 - 125
The purpose of the present study is to investigate the status of the core curriculum in higher education doctoral programs from the perspective of program directors. We used online survey analytic techniques to query program directors about their EdD and PhD programs in higher education, credit hours, and curricular content. Our study confirms previous work finding that there is common agreement i ...
Academic Discipline, Doctoral Education, Higher Education as a Field of Study
127 - 143
The concept of Anonymous Internet is getting traction in the wake of recent privacy related NSA (National Security Agency) privacy allegations. Based on our initial findings, Tor appears to be a solution for this and taking control of the Internet and the User’s privacy. Our study reveals that Tor’s power and future ability to thrive revolves around its expansion. Tor needs to grow in size specifi ...
Anonymous Internet, Tor Browser, Torrent, Information Privacy
145 - 153
Asthma and Chronic Obstructive Pulmonary Disease (COPD) is among the highest health diagnosis and therefore an economic drain, which puts substantial pressure on a huge number of patients, communities, and health systems. These chronic conditions are presently incurable but their symptoms can be controlled through quality health care, appropriate medications, and good self-management skills. Many ...
mHealth, smart-health, asthma, COPD, chronic disease, self-management, big data analysis
155 - 170
Purpose- The purpose of this paper was to review related literature on community service initiatives, benefits and the involvement of librarians in Community service programme with a focus on the University of Port Harcourt Community Service programme. This review was also undertaken to establish a link between the Community Service programme and purposeful librarianship. Methodology- Related li ...
Community Service, Impact, University of Port Harcourt, Sustainable growth
171 - 178
Innovation Education and Diffusion in the United States: Using Literature Derived Knowledge Maps to Develop Research Methodology Strategy
The idea of innovation, while not new, has taken on a whole new meaning in the 21st century. With his introduction of the ideas of disruptive innovations in the 1990s, Clayton Christensen has quickly become a leader in the field of innovation education. Christensen expanded his theory to encompass not only industry, but also healthcare and education. It is in this field of education that much work ...
Clayton Christensen, innovation education, vocational, curriculum
179 - 186
Since their initial introduction in the early 90’s, the popularity of web based online social networking sites has been growing exponentially, encompassing millions of users. As these social networks continue to grow and become more popular, users’ different social circles (friends, family, and colleagues) are very likely to collide, as they all coexist under the same infrastructure. Considering t ...
Online Social Networks, Privacy, User Data, FOAF
187 - 199
School informatics is a relatively new subject in comparison to mathematics and science. As a result, there is much less research on the area of informatics didactics. Likewise, there is lack of theoretical grounding of the field and associated teaching methods and learning processes. The lack of research in the field of school informatics makes it difficult to identify which methods are effective ...
Interaction, learning theories, learning pyramid, school informatics, teaching methods
201 - 219
There is much known about logical ways of implementing security measures in an organization. Anecdotal evidence shows that few organizations implement a full suite of measures. This study used a single case to identify problems with a logical implementation. A framework was developed using the literature and these identified problems. The framework was then tested through interviews of experienced ...
security, security framework, university culture, security creation, policy creation
221 - 229
The problem addressed in this paper is the ambiguity that exists in the usage of the terms “enable” and “transform” and their related forms in the Green IS literature. This ambiguity creates uncertainty, both conceptual and practical, about the precise role of Green IS in these research and use contexts. Consequently, the exact relationship between Green IS and environmental sustainability can be ...
Enabling, Environmental sustainability, Green computing, Green Information Systems (Green IS), Green Information Technology (Green IT), Transforming
231 - 245
From a Traditional to a Networking Organization: The Role of Information and Communication Technologies
The development of Information and Communication Technologies (ICT) resulted in transforming the traditional hierarchical organizations into networking flexible ones. In the circumstances of identifying a new type of organizations, the notions as ‘organization’ and ‘synergy’ should be revised. The organizations with individual elements that build up a network have altered their attitude towards th ...
management, Information and Communication Technology, traditional organization, networking organization, synergy, global optimum, local optimum
247 - 258
NoSQL databases are an important component of Big Data for storing and retrieving large volumes of data. Traditional Relational Database Management Systems (RDBMS) use the ACID theorem for data consistency, whereas NoSQL Databases use a non-transactional approach called BASE. RDBMS scale vertically and NoSQL Databases can scale both horizontally (sharding) and vertically. Four types of NoSQL da ...
NoSQL Databases, NoSQL Data Modeling, Database Technologies
259 - 268
Algorithm performance coverage in textbooks emphasizes patterns of growth in execution times, relative to the size of the problem. Variability in execution times for a given problem size is usually ignored. In this research study, our primary focus is on the empirical distribution of execution times for a given algorithm and problem size. We examine CPU times for Java implementations of five sorti ...
algorithm, sorting, performance, distribution, variation, Java
269 - 283
Cloud computing has brought many to the world of computers. Unfortunately it also created new opportunities for criminal activities. This paper used a descriptive literature review to determine the issues that are currently influencing digital investigations. The results show that there are many unaddressed issues affecting the identification, preservation and acquisition of evidence in the cloud. ...
Cloud Forensics, Digital Forensics, Cybercrime, Cloud Computing
285 - 299
Business Intelligence is important tools to improve business processes. More and more companies, government units use BI. But there are not still so many solutions which can be applied in local government units. From this reason the paper has been devoted to the supporting managerial decision-making processes in the Polkowice commune, Poland using BI technology. It consists of the following part ...
information and communications technology, local government units, business intelligence (BI), business processes
301 - 311
The focus of the paper is information and communications technology (ICT) solutions in hybrid information systems in a local government unit. As the exemplary local government unit, the social welfare center (Ośrodek Pomocy Społecznej, or “OPS”) in Polkowice, Poland, was chosen. After a brief introduction, problem statement, goal of study, research questions and methodology, the issue of how ICT s ...
information and communications technology (ICT), local government units, hybrid systems, business processes, cloud computing
313 - 326
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most notable of which is cryptography. Cryptographic Hash ...
Cryptography, Attack, SHA, Steganography, Information Security, Authentication.
327 - 338
Software technology has high impact on the global economy as in many sectors of contemporary society. As a product enabling the most varied daily activities, the software product has to be produced reflecting high quality. Software quality is dependent on its development that is based in a large set of software development processes. However, the implementation and continuous improvement of softwa ...
Software Technology, Software Process Improvement, Strategic Planning, Strategic Drivers for Software Process Improvement
339 - 351
Characterising Computer Experience and Anxieties Differences Between Middle Eastern and Western Students in eLearning
Computer anxiety especially in first-year university students is common and continues to be a significant issue as it manifests itself in a number of negative emotions with significant detrimental impact to students. This is especially true in the context where students use computers for course work – online learning. Research work addressing the effect of computer/Internet experience on anxiety a ...
Anxiety, Computer Use, Computer Experience, Culture, Middle East, Online Learning
353 - 365
Diversity is a relative concept, which has been applied to a number of domains, such as culture and biology. A simple measure of diversity is derived by drawing from the domains of biological and cultural diversity, as well as, information retrieval for its measurement capabilities. This domain independent diversity measure can be used to determine diversity between entities in any collection that ...
Biological Diversity, Cultural Diversity, Diversity, Information Retrieval, Measurement
367 - 383
The Information Systems (IS) profession is known as one of the most dynamic fields in our current day and age. Rapid advances in Information and Communication Technologies (ICTs) increase the dependence of organizations on these ICTs and create a greater need for IS competence. This demand constitutes serious challenges to academia to provide graduates with the necessary skill set to fulfil their ...
flipped classroom approach, coherent practice, deep approaches to learning, integrated and interactive environment, three stages of behavior
385 - 399
Teaching and learning is no longer the same and the paradigm shift has not settled yet. In this study we frame immersive learning as a method which we believe can be designed by experiential, constructivist, and collaborative elements. We then present a peer to peer interactive web-based learning tool, which was designed, and implemented in-house and piloted in a PhD course on ‘Pedagogical Methods ...
Immersive Learning, Information Technology, Learning Models, Item Response Theory
401 - 415
Among developments in the field of business intelligence (BI), the notion of maturity has gained considerable interest for defining the directions to expected value, for summarizing the experience available, and for defining the possible avenues of BI development. There is considerable experience in creating and implementing BI systems, and many gaps separating the declared goals from the achieved ...
business intelligence, business intelligence maturity models, dimensions of business intelligence
417 - 428
Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, w ...
Data breach, identity theft, global, security, privacy, social network, protection model
429 - 444
The objective of this paper was to determine the perceived barriers and motivators of mobile ICT adoption by South African micro entrepreneurs. Current research shows that mobile ICT can help ensure the success of micro enterprises. However, there are barriers and motivating factors, which influence the mobile ICT adoption rate of micro enterprises and they seem to differ between countries. Sem ...
Entrepreneurs, Micro-enterprises, ICT, Mobile, adoption, Motivators, Barriers
445 - 465
In business school, students must learn essential communication, analytical, and problem-solving skills. In this study, we examine whether the prototyping project in our computer-based information system (CBIS) course enhances these three essential skills. The prototyping process, taught with an information system approach, is the focus of our project-centered teaching method. The pedagogy uses a ...
Computer-based information system, Prototyping, Communication Skills, Analytical skills, Problem-solving skills
467 - 478
Bridging the Digital Divide: Case Study of the Distribution of Tablets to First Years at the University of Johannesburg
The digital divide between those more and those less technologically skilled is a reality and has been for many years. This divide is especially prominent in developing countries such as South Africa and in societies that suffer from socio-economic disadvantage. There are many reasons for the continued presence of this divide and these are briefly described in this paper. The negative consequences ...
digital divide, tablet distribution, higher education, developing countries, multi-disciplinary
479 - 491
The world is an interconnected global village due to the increasing adoption and reliance on technology, but an ugly side of the increased usage of technology has come to light. The issue of harassment and abuse on the internet has led to relatively new issues such as cyber harassment, cyber incivility and cyberbullying. A case study was conducted within two faculties at the University of Cape T ...
Cyber incivility, online harassment, organizational policy
493 - 504
This paper proposes the innovative methodologies for the robust and stable design of optimal stable digital infinite impulse response (IIR) filters using different mutation variants of hybrid differential evolution (HDE). A multivariable optimization is employed as the design criterion to obtain the optimal stable IIR filter that satisfies the different performance requirements like minimizing the ...
Digital IIR filters, Hybrid Differential Evolution, Exploratory search, Opposition based learning Multi parameter optimization
505 - 520
In Zimbabwe the health care delivery system is hierarchical and patient transfer from the lower level to the next higher level health care facility involves patients carrying their physical medical record card. A medical record card holds information pertaining to the patient’s medical history, pre-existing allergies, medical health conditions, prescribed medication the patient is currently taking ...
QR code(s), medical health records, mobile phone, patient, medical health card
521 - 530
Digital Information Literacy among Health Sciences Professionals: A Case Study of GGS Medical College, Faridkot, Punjab, India
This paper is basically a case study and an attempt has been made to highlight the information literacy skills among the health science professionals i.e. teachers and postgraduate students of Guru Gobind Singh Medical College (constitute college of Baba Farid University of Health Sciences), Faridkot. The information literacy has various parts such as Computer Literacy, Library Literacy, Media Lit ...
Information Literacy, Digital Information Literacy, Health Science Professionals
531 - 541
A Flipped Classroom Approach to Teaching Systems Analysis, Design and Implementation to Second Year Information Systems University Students
[The final form of this paper was published in the Journal of Information Technology Education: Research] This paper describes the flipped classroom approach followed in two second year Information Systems courses. The various techniques employed through this approach are described. These techniques were underpinned by a theory of coherent practice, which is a pedagogy that provides a framewo ...
Flipped Classroom Approach, Inverted Classroom, Active Learning, Teaching & Learning, Problem-Solving
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] An E-Portfolio Assessment Management System (EAMS) can be an innovative tool that provides students with flexible opportunities to demonstrate the acquisition of skills and abilities in an outcome-based institution. The system has been developed and used for the past ten years ...
E-portfolio, IT Career, Learning Curriculum, Student Perspectives, Outcome-Based Higher Education.
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to ...
education, security, testing, cheating, monitoring
The Use of Computer Simulation to Compare Student performance in Traditional versus Distance Learning Environments
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Simulations have been shown to be an effective tool in traditional learning environments; however, as distance learning grows in popularity, the need to examine simulation effectiveness in this environment has become paramount. A casual-comparative design was chosen for this study ...
computer simulation, traditional classroom, distance learning, hybrid, face-to-face teaching, lectures and demonstrations, student performance
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] IT graduates need a suite of technical competencies and soft skills married with an understanding of the social and business contexts of the systems that they build. To instill in students an awareness of current IT industry practice coupled with the broader impact of their disci ...
information technology (IT), across-institution assessment, professional skills development, survey
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Information Technology (IT) high school learners are constantly struggling to cope with the challenges of succeeding in the subject. IT teachers therefore need to be empowered to utilize appropriate teaching-learning strategies to improve IT learners’ success in the subject. By pro ...
Critical thinking, Information Technology education, Pair programming, Teaching-learning strategies, Programming
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Considering that big data is a reality for an increasing number of organizations in many areas, its management represents a set of challenges involving big data modeling, storage and retrieval, analysis and visualization. However, technological resources, people and processes are c ...
Big Data, Big Data Management, Big Data Challenges, Big Data Analytics, Decision-Making
Usability and Pedagogical Assessment of an Algorithm Learning Tool: A Case Study for an Introductory Programming Course for High School
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] An algorithm learning tool was developed for an introductory computer science class in a specialized science and technology high school in Japan. The tool presents lessons and simple visualizations that aim to facilitate teaching and learning of fundamental algorithms. Written test ...
K12-Computer Science Education, Fundamental Algorithms, Algorithm Visualization, Learning Tool Evaluation, Questionnaire Validation
Comparing Social Isolation Effects on Students Attrition in Online Versus Face-to-Face Courses in Computer Literacy
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] This paper compares the effect of social isolation on students enrolled in online courses versus students enrolled on campus courses (called in this paper Face-to-Face or F2F). The paper uses grade data collected from a computer literacy course that was recently taught by the autho ...
course withdrawal, social isolation in online courses, attrition in online courses
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] This paper presents the success story of the intuitive vision of an ICT high school educator in South Africa. The growth and evolution of a Community of Practice, towards a full-fledged living lab is investigated. A grounded theory study analyses the living lab concept and highligh ...
Collaboration, Community of Practice, ICT Education, Living Labs, TechTeachers
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] Requirements elicitation is the process through which analysts determine the software requirements of stakeholders. Requirements elicitation is seldom well done, and an inaccurate or incomplete understanding of user requirements has led to the downfall of many software projects. T ...
requirements elicitation, systems analysis
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] The significance of ICTs in supporting socio-economic development in developing countries is inevitable. As academics of information systems in developing countries, we cannot ignore the need for teaching and building the capacity of our students to become knowledgeable and skilled ...
Curriculum, Higher Education, Information and Communication Technology for Development (ICT4D), Outcome Based Education, Developing Countries
[The final form of this paper was published in the journal Issues in Informing Science and Information Technology.] In the digital technology era, mobile devices have an important rule to deploy a copy of data and information through the network. An electronic reader (eReader) allows readers to read written materials in an electronic manner that is available in many models. The objective of this ...
eReader, evaluation, usefulness metric
This research seeks to analyze the project success factors related to project managers' traits. The context of the research entails a 'united nations' type of organization. Critical success factors from previous recent studies were adopted for this research. Nineteen factors were adopted and a survey methodology approach was followed. Sixty six participants completed the survey. Exploratory factor ...
Project Manager, United Nations, Critical Success Factors.
Quyen Le, Deputy Director at ABC Textile and Dyeing Joint Venture Company (JVC), returned from a meeting with an Enterprise Resource Planning (ERP) service provider. Quyen was wondering which options of ERP implementation would be best suited to gain staff support and pre-pared the company for long term development. ABC had undergone considerable growth in recent years. Having become one of lead ...
IT investment, Enterprise Resources Planning (ERP), organisational change management
The impact that Facebook and Twitter usage has on the creation and maintenance of university student’s cognitive social capital was investigated on students in the Western Cape province of South Africa. Facebook and Twitter were selected as part of the research context because both are popular online social network systems (SNSs), and few studies were found that investigated the impact that both F ...
Facebook, Twitter, Cognitive Social Capital, Bridging Social Capital, Bonding Social Capital, Maintained Social Capital, Usage, University Students
As mobile devices become prevalent, there is always a need for apps. How hard is it to develop an app especially a cross-platform app? The paper shares an experience in a project involved the development of a student services web app that can be run on cross-platform mobile devices. The paper first describes the background of the project, the clients, and the proposed solution. Then, it focuses ...
Web-app, mobile-friendly web app, open-source software, web database, cross platform app.
It can be argued, that public organization, in order to provide sufficient service for the public in a present highly competitive and continuously evolving environment, requires changes. The changes are often related to the implementation of information systems (IS) and they should be the result of change management (CM). However, theories and approaches to CM currently available to practitioners ...
project management, change management, public organizations, information systems, IS, critical success factors, CSF
Digital solutions have substantially contributed to the growth and dissemination of education. The distance education modality has been presented as an opportunity for worldwide students in many types of courses. However, the development of digital educational platforms requires different expertise to its development including knowledge areas such as pedagogy, psychology, computing and digital tec ...
Online Education, Digital Educational Solution, Quality Models, eQETIC Model
Information Gatekeepers – Aren't We All? A new perspective for looking at the Human Information Gatekeeper
In today's knowledge environment, individuals and groups who gather relevant information about the organization's external environment and distribute that information for use by their colleagues, receive increasing attention and are viewed with great importance. These individuals have been named Information Gatekeepers. Thus far, researchers have not established a unanimous and interdisciplinary d ...
Informaion environment, gatekeeper, Organizational Knowledge.
Designing to Inform: Toward Conceptualizing Practitioner Audiences for Socio-technical Artifacts in Design Science Research in the Information Systems Discipline
This paper identifies areas in the design science research (DSR) subfield of the information systems (IS) discipline where a more detailed consideration of practitioner audiences of socio-technical design artifacts could improve current IS DSR research practice and proposes an initial conceptualization of these audiences. The consequences of not considering artifact audiences are identified throug ...
design science, informing science, artifacts, artifact audiences, relevance, fitness, utility
This paper discusses applications of the measures of the risk of misinforming and the role of the warranty of misinforming in the context of the informing component of Customer Related Management (CRM) issues. This study consists of two parts. Firstly, we propose an approach for customers’ grouping based on their attitude toward assessing product's properties and their expertise on the terminology ...
measures of the risk of misinforming, warranty of misinforming, customer related management, customer’s purchase attitude, customers expertize
Learning English Vocabulary in a Mobile Assisted Language Learning (MALL) Environment: A Sociocultural Study of Migrant Women
This paper reports on a case study of a group of six non-native English speaking migrant women’s experiences learning English vocabulary in a mobile assisted language learning (MALL) environment at a small community centre in Western Australia. A sociocultural approach to learning vocabulary was adopted in designing the MALL lessons that the women undertook. The women provided demographic informa ...
MALL, sociocultural approach, migrant women, vocabulary
An Empirical Study of Online Discussion Forum by Library and Information Science (LIS) Postgraduate Students Using Technology Acceptance Model 3
E-learning is an important trend globally accepted to enhance the acquisition of knowledge by students within and outside the classroom to improve their academic pursuit. Online Discussion Forum (ODF) is one of the tools that are used for e-learning in Nigerian universities. It facilitates interaction among postgraduate students as they can communicate and share information sources with one anothe ...
Online discussion forum, E-learning, TAM 3, Postgraduate students, Nigeria
Technology has transformed education, perhaps most evidently in course delivery options. However, compelling questions remain about how technology impacts learning. Adaptive learning tools are technology-based artifacts that interact with learners and vary presentation based upon that interaction. This paper compares adaptive learning with a conventional teaching approach implemented in a digital ...
Adaptive learning, adaptive learning system, personalized learning systems, iron triangle, informing science
Courses on Human Computer Interaction (HCI) largely differ in the conception of the role of the course in the program, in the topics to be included, in emphases, in the instructional strategies that are employed and more. This paper describes the design and implementation of an HCI course for students of the Management Information Systems department in our college. Students’ intermediate and final ...
Human computer interaction, User centered design, Studio-based learning, Alternative designs, Design tradeoffs, Prototyping
This study examines diverse information media in order to identify those formats that are most suitable for consumption via handheld mobile devices, namely smartphones and tablets. The preferences of the users were measured objectively, by analyzing actual data of their relative use of handheld mobile devices and personal computing (PC) desktop devices, including laptops and notebooks, for consump ...
mobile applications acceptance, information format, information media, instructional media, mobile learning (m-learning), diffusion of innovation, human computer interaction
This project shows a creative approach to the familiar scavenger hunt game. It involved the implementation of an iPhone application, HUNT, with Augmented Reality capability for the users to play the game as well as an administrative website that game organizers can use to create and make available games for users to play. Using the HUNT mobile app, users will first make a selection from a list of ...
Software Engineering, Augmented Reality, iOS Application, Scavenger Hunt.
Visuals and graphics have been used for communicating complex ideas since 1786 when William Playfair first invented the line graph and bar chart. Graphs and charts are useful for interpretation and making sense of data. For instance, John Snow’s scatter plot helped pinpoint the source of a cholera outbreak in London in 1854 and also changed understandings of how germs were spread. While popular ...
Visualizations, visual representations, descriptive quantitative data, longitudinal survey data
An Internship Program at a Computer Science Department –Theoretical Foundation and Overall Coordination
Internship courses, unlike others, are multi-pronged because they require coordination at different levels. Typically, a faculty coordinates the communication and implementation at these multiple levels to lead the completion of internship courses. We call the position that this faculty holds and does all this communication/coordination the “internship coordinator”. For the work of the internship ...
Internship program, internship courses, internship at computer science programs
A capstone course is normally offered at the end of a program of study with the goal of helping students synthesize what they have learned in the courses preceding it. The paper describes such a course, —the undergraduate capstone course for MIS majors, —that was built around the case discussions and projects and originally offered in a face-to-face format. Over the course of the study, an async ...
Information systems, capstone, case pedagogy, distance learning, online learning, evaluation, IS curriculum, critical thinking, education
There is a dearth of research in teaching strategies and learning approaches for units involving sensitive topics. Sensitive topics could provoke an emotional response in students. In a business ethics unit, the attempt at striking a balance between conceptual knowledge and theory with that of skills training can be challenging because such unit can involve personal, sensitive or controversial t ...
Sensitive topics, student participation, student engagement, online role play, simulation, anonymity.
The paper introduces a novel Personal Knowledge Management (PKM) Concept and prototype system. Their objective is to aid life-long-learning, resourcefulness, creativity, and teamwork of individuals throughout their academic and professional life and as contributors and beneficiaries of organizational and societal performance. Such a scope offers appealing and viable opportunities for stakeholders ...
Personal Knowledge Management (PKM), Organizational Knowledge Management, Personal Knowledge Management for Development (PKM4D), Informing Science Framework, Human Capital, Capacity Development, Lifelong learning, Memes, Memex.
The Joint Interagency Field Experimentation (JIFX) event, organized by the Naval Postgraduate School (NPS), is conducted 3-4 times a year at various locations. The four day event can be characterized as an informing system specifically designed to facilitate structured and unstructured communications between a variety of parties—e.g., software developers, inventors, military and civilian users of ...
JIFX, informing system, complexity, disaster management, ad hoc experimentation, collaboration, military
Communicating and Sharing in the Semantic Web: An Examination of Social Media Risks, Consequences, and Attitudinal Awareness
Empowered by, and tethered to, ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe activities of teens and young adults. The following paper presents the findings of a study examining the soci ...
Social Media, Social Media Safety, Web-Safety, Internet Safety, Negative Consequences of Social Media, Oversharing, Privacy, Cyber safety, Cyber awareness, Facebook
Digital technologies are increasingly implemented in Swedish schools, which impact on educa-tion in the contemporary classroom. Screen-based practice opens up for new forms and multi-plicity of representations, taking into account that language in a globalized society is more than reading and writing skills. This paper presents a case study of technology-mediated instruction at the primary-school ...
Multimodality, digital resources, available designs, primary education, collaboration