Publications

Browse and search ISI journal articles, conference proceedings and books.

Conference Proceedings

Volume 7, 2007


Eli Cohen, Linda Knight, Alex Koohang, Scott Lloyd, Grandon Gill, Kathy Lynch, Yair Levy, Bob Travica
publishing, journals, books, Informing Science Institute The Informing Science Institute published eight journals as well as books. All Informing Science Institute journals and books are available to everyone online without charge as well as in print. All ISI journals use a review process that provides authors with mentoring, a positive and constructive experience, regardless of whether or not their papers are accepted for publication.
393 downloads
Alex Koohang, Tom Seymour, Robert Skovira, Gary DeLorenzo
Open Education Resources (OERs) are defined as “technology-enabled, open provision of educational resources for consultation, use and adaptation by a community of users for noncommercial purposes. They are typically made freely available over the Web or the Internet. Their principal use is by teachers and educational institutions to support course development, but they can also be used directly by ...
open education resources, learning resources
1631 downloads
Antonio Cartelli
After a short introduction on socio-technical theory, the experiences the author made in the planning and carrying out of web sites and information systems for research and teaching are reported. The results from those experiences are analyzed with a special attention to knowledge development at three different levels: individuals, communities, and organizations (society), and the author’s hypothe ...
. Socio-technical theory, communities of practice, communities of learners, learning organization, cognitive apprenticeship teaching strategies
9 downloads
Ricardo Cattafi, Christiane Metzner
Collaboration is a learning strategy used in various domains such as e-health, e-business, e-education, e-government and e-research. In e-learning and under a constructivist approach, collaboration is expected to increase the performance of students. Although it can be used without digital media, given the pervasiveness of technology, their systematic application by educational institutions as ins ...
Knowledge Society, Information Society, ICT in Education, Collaborative learning, e-learning
2 downloads
Carmen De Pablos, Monica De Pablos
The present project “Technological diagnosis for Firms” offers a practical experience for the transfer pf knowledge between the university and business firms. It implies an agreement between the University and a group of firms operating near the University locations. The main objective of this project is to develop business consultancy in a group of 15 firms established in the south of Madrid, nex ...
centre for technological transfer, researchers, synergies
691 downloads
Gurparkash Singh, Louise Hawkins, Greg Whymark
This paper describes a model for studying collaborative knowledge building (CKB) as a group activity. We integrate the model described by Stahl (2000a) with an analysis based on the principles of cultural historical activity theory (CHAT), using the analysis of a self reflective case study to guide the description. The concept of the CKB activity system is developed, and the role of contradictions ...
collaboration, knowledge building, reflective thinking, activity theory, zone of proximal development
6080 downloads
Mariana Hentea
The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computing ...
information security management, cyber security, intelligent system, architecture, agent-based control.
8 downloads
Robert Skovira
Security and information systems are intertwined. The costs of secure systems are in the billions of dollars. In the digital world, security vulnerabilities and threats work contrary to the security goals of confidentiality, integrity, and availability of information systems. The essay describes a view of organizations and their policies, network systems, operating systems, software applications, ...
Security, Information security, Secure programming, Secure computing, Ecology
1 downloads
Adesina Simon Sodiya, Saidat Adebukola Onashoga, Beatrice Oladunjoye
Threat modeling, which is the process of identifying, quantifying and analyzing potential threats of computer-based systems, has become a significant consideration towards designing secure software systems. Despite the previous methods adopted for threat modeling, there are still many systems that are probable to attack. In this work, a fuzzy logic-based threat modeling technique is designed. The ...
Fuzzy logic, threat, threat modelling
2 downloads
Adrie Stander, Kevin Johnston
This paper aims to investigate the need for and contents of a course in forensic Information Systems and Computer Science at UCT. In order to do this, the reader is introduced to computer crime and shown how the forensic process of identifying, preserving, recovering, analyzing, and documenting computer data supposedly used in crimes committed using computers is helping in investigating and solvin ...
Forensics, Information Systems
2 downloads
Kathy Lynch, Aleksej Heinze, Elsje Scott
It is common to find final or near final year undergraduate Information Technology students undertaking a substantial development project; a project where the students have the opportunity to be fully involved in the analysis, design, and development of an information technology service or product. This involvement has been catalyzed and prepared for during their previous studies where the student ...
capstone projects, team projects, Information Technology, education, information systems
7109 downloads
Sita Ramakrishnan
Engineering programs in Australian Universities are accredited by Engineers Australia (EA) based on certain strict guidelines. This paper discusses the undergraduate SE curriculum and accreditation effort undertaken over the last ten years at Monash University in order to achieve a successful outcome. The paper describes how the SE curriculum has evolved over this period at Monash and maintained i ...
accreditation, curriculum, software engineering, teaching/learning outcomes, quality system process
2 downloads
Terry Weech
As information resources of all types and disciplines are being stored and retrieved in digital form, libraries are responding to the demands for more effective retrieval of such documents and to provide even more digital access to scholarly and recreational library materials. This has led schools of library and information science to develop special programs, degrees, and certificates in digital ...
Digital libraries, Library education, Library science curriculum, Libraries and technology.
1215 downloads
Jim Everett
Bauxite is mined and transported by conveyor to a processing plant, screened and washed, then placed into blended stockpiles to feed the alumina refinery. While being stacked to the stockpile, the ore is sampled. Completed stockpiles must be acceptably close to target grade (composition), not only in alumina, but also in residual silica, carbon and sodium carbonate. The mine is an open-cut pit. Ea ...
MIS, DSS, Mining, Quality Control, Continuous Stockpile Management System, Exponential Smoothing
Mike Hart, Farhan Esat, Michael Rocha, Zaid Khatieb
This research concerns a practical on-line analytic processing (OLAP) project given to 2nd year information systems major students. They were required to analyse two sets of sales data with two different OLAP software tools, and report both on their findings and on their experiences of working with the two products. Students then completed a validated instrument with questions about each OLAP tool ...
OLAP, business intelligence, technology acceptance, student project
8 downloads
Celina Olszak, Ewa Ziemba
The article aims at describing processes of building Business Intelligence (BI) systems. Taking the BI systems specifics into consideration, the authors present a suggested methodology of the systems creation and implementation in organisations. The considerations are focused on objectives and functional areas of the BI in organisations. Hence, in this context the approach to be used while buildin ...
Business Intelligence, methodology of BI construction, designing BI, business decision-making, knowledge management
42096 downloads
Abdulkarim Al saif
This research explores prisoners’ attitudes for undertaking distance-learning courses whilst in prison, and considers both the benefits and the difficulties experienced by prisoners as a result of their academic work. It is based on over 35 questionnaires completed by 300 current prisoners. The research was conducted in three prisons throughout the country in three different provinces. In addition ...
distance education, attitude toward distance education, prisoners, motivating factors, inhibiting factors.
1 downloads
Laura Bergstrom, Kaj Grahn, Jonny Karlsson, Goran Pulkkis
This article presents a virtual course with the topic mobile and wireless communication systems. The structure of the tree sections of the course material content, the generic technology section, the wireless technology section, and the mobility management section, is presented. The main didactical approach of the virtual course is a guided excursion to which students enroll. The task sets, consis ...
didactical approach, e-learning, graphical design, mobile, platform, wireless.
2 downloads
Stephen Elliott, Teresa Rishel
TECH 621 is a graduate level course in Automatic Identification and Data Capture at Purdue University in West Lafayette, Indiana. Typically, it is offered to a cohort of students in a weekend masters program. The course meets on campus three times a semester for two four-hour periods; the course is updated each semester. In the fall of 2006, the instructor decided to incorporate a project componen ...
distance learning, collaboration
2 downloads
Nitza Geri, David Gefen
Academic institutions invest considerable resources in improving the website quality of their MBA courses, in the hope of increasing student retention and willingness to recommend the programs to others. Despite this investment, it seems that the old "keep it simple" rule is also true for e-learning. Data collected from students enrolled in a blended distance learning MBA program at the Open Unive ...
Value of Online Learning Systems, Blended Learning, E-Learning, Distance Learning, Bounded Rationality, Attention Economy, Student Retention.
4 downloads
Maria Joao Gongalves, Claus Kaldeich
In this paper will be present a snapshot of the situation of teaching and learning Mathematics in Portugal, as well as some statistics which pose the reality of this subject in the school rooms and homes of this country. Further will be present some applications of the Information and Communication Technologies (ICT) to improve the teaching and learning activities of Mathematics, in the school roo ...
e-learning; applied information and communications technologies in the school room; Mathematics; effective teaching and learning
1776 downloads
Said Hadjerrouit
E-Learning provides a potentially powerful tool for implementing educational requirements rooted in learning theories. But still, much of the development of e-Learning is carried out without a true understanding of how learning theories can be translated into pedagogical requirements that can be implemented using learning technologies. This is because e-Learning lacks a systematic approach to the ...
Educational requirements, e-Learning, learning cycle, learning theories, LMS, software engineering, system development.
9765 downloads
Marko Kastelic, Tea Loncaric
In this paper the background, the context and the main challenges of introducing e-leaming at vocational college for business secretaries will be examined. The presented data were gathered from surveys considering all phases of experimental project that took place in the academic year 2005/06 at vocational college Leila in Ljubljana, Slovenia. This article begins with a brief description of circum ...
vocational college, adult education, e-learning strategy, e-education, e-learning environment, open source software, SCORM, key elements of success.
21 downloads
Primoz Luksic, Boris Horvat, Andrej Bauer, Tomaz Pisanski
This paper presents the practical issues involved in introducing e-leaming for the Faculty of Mathematics and Physics (FMF) at the University of Ljubljana, Slovenia. It begins with a short history of e-learning at FMF and is followed by a discussion about the choice of the open source software (Moodle, svn, wiki platform) as the foundation for the web based learning; its advantages and disadvantag ...
e-learning, learning management system, LMS, Moodle, MediaWiki, open source, elearning standards.
4409 downloads
Iwona Miliszewska
With rapid expansion of the transnational education market, more and more universities join the ranks of transnational education providers, or expand their transnational education offerings. Many of those providers regard online provision of their programs as an economic alternative to face-to-face teaching. Do the transnational students support this view? This paper discusses the prospects of ful ...
Key Words computing education, cultural differences, face-to-face interaction, learning environment, online learning, transnational education.
292 downloads
Pollyana Mustaro
The execution of academic researches - such as Undergraduate work, Master’s or PhD Thesis - is often supervised by a research advisor. The development process of such works could be characterized as face-to-face, remote or blended orientation, which combines both of former ones. The construction of a proposal for blended academic orientation involves mapping and analysis of elements, as well as di ...
blended orientation, face-to-face orientation, online orientation, advisor-advisee relationship, digital communication tools.
2 downloads
Raafat Saade, Dennis Kira, Dani Dogmoch
Web-based courses are being introduced by higher education institutions at an increasing rate, such that a systematic shift from face-to-face teaching to web-based teaching has become evident. This enthusiasm in web-based education is primarily driven by cost savings and bottom line net profits to institutions. However, research work in the field still has a long way to demonstrate the effectivene ...
eLearning, Computer skills, Internet skills, Advisory, Personality, Culture, Anxiety, Trust
1688 downloads
Raafat Saade, Fassil Nebebe, Weiwei Tan
In recent years, more and more higher education institutions have interests of integrating internet-based technologies in the classroom as part of the learning environment. Compared to studies on other information technologies, users’ behavior towards this type of systems, however, has not been assessed and understood thoroughly. In order to get more experience about human behaviors on multimedia ...
Multimedia Learning System, TAM, eLearning, Information Technology
10618 downloads
Viktorija Sulcic, Alja Sulcic
In the paper we tried to present online tutoring as a solution to quality issues of e-leaming that e-leaming providers from all over the world are facing. We also briefly presented different roles of online tutors and the skills needed to perform these roles successfully. The online tutoring system was introduced to support students of e-learning courses at our faculty. Through various researches ...
e-learning, online tutors, tutorial learning, higher education, blended learning.
7 downloads
Daniel Carbone
The detrimental health and economic impacts due to the growth of chronic condition sufferers worldwide is well documented. The practical application of electronic information systems is expected to provide valuable support to this predicament. The purpose of this study is to develop an information systems implementation framework for the management and prevention of chronic diseases (CD) in genera ...
Information Systems Implementation, Health Information Systems, Chronic Diseases, Information Systems Adoption, General Practice, Practice Champions and Change Management.
448 downloads
Robert Mason
An interoperability gap exists between Learning Management Systems (LMS) and Learning Ob ject Repositories (LOR). LORs are responsible for the storage and management of Learning Objects and the associated Learning Object Metadata (LOM). LOR(s) adhere to various LOM standards depending up the requirements established by user groups and LOR administrators. Two common LOM standards found in LORs are ...
Learning Object Metadata, XML, SCORM, CanCore, Learning Object Repository, Learning Object Interoperability, Learning Management System, and Learning Assessment Metadata.
295 downloads
William Ochs II
The research problem that this study will address is the limited CRM success of Web-based customer support systems. The first goal of this research will be to develop the Information Systems Hierarchy of Needs Actualization (ISHNA) framework based on Maslow’s general theory of Hierarchy of Needs. The second goal of this research will be to empirically assess and validate the End User Perceived Inf ...
ordered needs theory, system actualization, system perceived success.
782 downloads
Michelle M. Ramim
Technological advances and the increasing popularity of the Internet have enabled post-secondary institutions to implement e-learning technologies as a teaching environment. Students’ enrollment in e-learning courses has proliferated over the past decade. However, ethical issues with students’ conduct in e-learning courses have been raised by several scholars and were noted as a major concern. Mor ...
Ethical decision making, Ethics in online learning, Academic misconduct, Students’ code of conduct.
266 downloads
Azad Ali, Fred Kohun
The purpose of this paper is to create a study model or framework for dealing with social isolation in doctoral programs. Previous studies have focused on the issue of attrition among doctoral students and the factors that cause doctoral students to drop out prior to completing their degrees. Among the factors that affect students’ decisions to leave doctoral programs is the feeling of social isol ...
Model for Doctoral Isolation, Isolation & Doctoral Attrition, Social Isolation in doctoral programs.
473 downloads
Joerg Evermann, Val Hooper, Pak Yoong, Janet Toland, Eusebio Scornavacca
As universities become increasingly research driven and funded on a research-basis, there is an increased need to attract graduate research students. The easiest way of doing this is to draft highly-talented undergraduate students into the research programmes. However, in a booming industrial job market, this is no easy task for Information Systems and Information Technology programmes. Recognizin ...
Graduate studies, Student retention, Research degree, Talent fostering
Arthur Tatnall, Stephen Burgess
In this paper we will relate some of our experiences in building and using simple Decision Support Systems (DSS) for use in two postgraduate subjects at Victoria University in Melbourne. These subjects are not about Decision Support Systems, but are Information Systems (IS) subjects that introduce, amongst other things, concepts of decision support and DSS. It has been our experience that the comp ...
Decision support, university courses, postgraduate studies, business students, programming.
13229 downloads
Emmanuel Rotimi Adagunodo, Oludele Awodele, Olutayo Ajayi
According to the Euronet mobile Banking Guide, there are currently close to 400 Mobile Operators in over 133 countries who are signing up 4 to 6 new customers every second. This implies that more people are going mobile like never before. The novel method presented in this paper is an Interactive SMS Banking Agent that is incrementally scalable for banking operations. Hence, a mobile banking solut ...
Banking services, Agent, SMS, Network, GSM
8 downloads
Dimitar Christozov, Stefanka Chukova, Plamen Mateev
Nowadays the product warranty is considered to be a valuable attribute of the product. It is a tool to enforce the competing power of the producer on the market place. There are two types of problems the product warranty addresses. Firstly, warranty deals with the malfunctioning of the product and, secondly, it addresses the information asymmetry, i.e., the misunderstanding and misinterpretation o ...
information asymmetry, misinforming, warranty, risk.
Sudesh Duggal, Carl Simkonis
America has been, historically, the leading edge of much of the world’s engineering and IT innovations. However, with the current trends of Offshore Outsourcing high tech and high paying employment, the questions arise: why go into these fields at all. Why involve yourself with the rigorous academic requirements demanded of these disciplines; especially when one considers the real possibility of b ...
OffShore Outsourcing, Economic Effect
2 downloads
Bill Davey, Arthur Tatnall
This article describes a study that examined the lifelong learning of information systems academics in relation to their normal work. It begins by considering the concept of lifelong learning, its relationship to real-life learning and that lifelong learning should encompass the whole spectrum of formal, non-formal and informal learning. Most world governments had recognised the importance of supp ...
Lifelong learning, information systems academics, informal learning, academic policy.
1900 downloads
Jaime Fonseca
This study concerns the teaching/leaming experience of Data Analysis at the Higher Institute of Social and Political Sciences (ISCSP), Technical University of Lisbon, first in Sociology course, and next in Social Communication course. In both cases, Data Analysis subject was teaching/leaming of the discipline of Mathematics and Statistics for the Social Sciences. This study aims to find the effect ...
Kewords Teaching/Learning Paradigm, Information and Knowledge Society, Latent Class Models, Information Criteria, Hypotheses Tests.
7728 downloads
Igor Hawryszkiewycz
The paper introduces the concept of engagement as a way of modeling and implementing flexible learning processes. The paper particularly addresses new learning demands, such as personalized learning, and defines ways of defining learning processes to support such new demands. It then shows how engagements can be used to provide guidelines for selecting information technology services that meet suc ...
Learning Process, Collaboration, Learning Object
6917 downloads
Tanja Krunic, Ljiljana Ruzic-Dimitrijevic
With the current development of the Internet and its growing use it is necessary to satisfy the needs of all users including those with disabilities causing accessibility problems. The paper deals with these categories of users and how much web designers take care of their abilities to access web locations they create. The W3C organization has created a list of checkpoints regarding accessibility, ...
accessibility, website, checkpoint, web design, user.
4528 downloads
Dorothy Langley
This paper presents an Academic Literacy course designed for first year students in our department. The course is based on a set of relevant reading materials and covers knowledge levels and classification systems, logical and physical library organization principles, physical and virtual search for publications, bibliographic citations and referencing methods and purposes. The paper describes two ...
Academic literacy, out-of-class activity, library, knowledge classification, librarian, information age.
1809 downloads
Lori Lockyer, John Patterson
In Australia, the national initiative known as Learning in an Online World, focuses school jurisdictions across the country meet the challenge of achieving the national vision of all schools “... confidently using ICT in their everyday practices to improve learning, teaching and administration” (MCEETYA, 2005, p. 3). One strategy in reaching this goal is the effective preparation of pre-service te ...
ICT education in teacher preparation, survey research, technology usage
4 downloads
Cecille Marsh
There are many initiatives to train people in using Information and Communication Technology but several international studies have shown that despite adequate computing experience, many users do not make efficient use of computer applications. This may be caused by a lack of strategic knowledge that is difficult to acquire just by knowing how to use commands. Research by Bhavnani and others indic ...
Computer training, ICT literacy, Strategic knowledge, Innovative instruction
2 downloads
Iwona Miliszewska, Grace Tan
The problems encountered by students in first year computer programming units are a common concern in many universities including Victoria University. A fundamental component of a computer science curriculum, computer programming is a mandatory unit in a computing course. It is also one of the most feared and hated units by many novice computing students who, having failed or performed poorly in a ...
automated assessment, introductory computer programming, programming support, student mentors
6 downloads
Mahendrenath Motah
The present work is a follow-up of the papers presented at the Northern Arizona University, USA - “Accommodating soft skills in Software project Management” and the one presented at Salford University, Manchester, UK - “ The ontogeny of memory of learning: Natural Intelligence versus Artificial Intelligence in Information Technology Education”. Several interrogations cropped up during and after th ...
Intelligence, multiple Intelligences, soft skills, project write-up, IT and Non-IT students. Information Technology Education
5807 downloads
Uolevi Nikula, Jorma Sajaniemi, Matti Tedre, Stuart Wray
Students often find that learning to program is hard. Introductory programming courses have high drop-out rates and students do not learn to program well. This paper presents experiences from three educational institutions where introductory programming courses were improved by adopting Python as the first programming language and roles of variables as an aid in understanding program behavior. As ...
computer science education, programming, CS1, roles of variables, Python
4450 downloads
Dave Oliver, Tony Dobele
This paper explores the cognitive difficulty of assessment tasks in six first year computing courses within an Information Technology (IT) degree. Bloom’s taxonomy is used as an analytical framework. A Bloom rating is calculated for each of the courses involved in the study and the results are presented and analysed. A wide variation in the cognitive level and style of assessment is revealed. Thes ...
Blooms Taxonomy, First year, IT, education, evaluation
335 downloads
Ljiljana Ruzic-Dimitrijevic, Maja Dimitrijevic
This paper is about the challenges IT instructors face due to the rapid development of the information technology. IT instructors need to continuously update their own skills and knowledge through self-education. They also need to frequently update course syllabuses and make major changes in the course textbooks if they write them. In order to understand and evaluate these challenges, we conducted ...
IT instructor self-education, introductory IT courses, IT development, IT education
312 downloads
Juha Sorva, Ville Karavirta, Ari Korhonen
Expert programmers possess schemas, abstractions of concrete experiences, which help them solve programming problems. Stereotypes of variable use in computer programs can be characterized using roles of variables, which can be taught to novices in order to support schema formation. This paper describes the ’lightweight’ adoption of roles of variables in our teaching of introductory programming. We ...
roles of variables, teaching, CS1, CS2, lightweight introduction.
533 downloads
Elena Stamatova, Jens Kaasboll
In order to develop computer competence, users need to understand principles of its operation in addition to memorizing where a particular operation is located in menus. Understanding a principle ease transfer of learning, hence the understanding helps learning a new application. These principles, e.g. functional dependency, are based in computer science, and are thereby precise and general. Two c ...
learning, user training, transfer, abstraction, concepts, computer programs, applications.
1 downloads
Huibrecht Margaretha van der Poll, John Andrew van der Poll
An alarming number of learners in Accounting at a large distance teaching university fail an introductory course in computer literacy. The lecturers proposed over a period of three years various methods of studying and preparing for the examination in the subject, but with limited success. The problem seems to start at school level even as early on as primary school education. Distance-teaching in ...
Computer literacy, Content literacy, Second language, Problem frames, Patterns
1812 downloads
Peter M Bednar, Roger Eglin, Christine Welch
Much research has been published which attests to desire felt by educators to improve the quality of student reflection, and engagement with learning, through processes of assessment. This paper describes how research in Systems Analysis is being transformed and applied to educational practice. Staff considered that methods were needed to stimulate students to reflect and engage in higher orders o ...
Contextual Inquiry; Double-loop Learning; student engagement; creative technologies.
3188 downloads
Doris Duncan
This paper summarizes findings of teaching eight sections of the same information systems college course in the same format with one major exception. Five sections had notes available for reference during the final exam whereas three sections did not. The author’s primary hypothesis that students in the five sections using notes would perform significantly better than the other sections on the exa ...
IS Education, IT Education, CIS Education, Informatics Education, Exam Techniques
263 downloads
Tony Jewels, Marilyn Ford, Wendy Jones
In tertiary institutions in Australia, and no doubt elsewhere, there is increasing pressure for accountability. No longer are academics assumed a priori to be responsible and capable of self management in teaching and assessing the subjects they run. Procedures are being dictated more from the ‘top down’. Although academics may not always appreciate ‘top down’ policies on teaching and learning, th ...
criterion referenced assessment, accountability, student outcomes
2785 downloads
Loredana La Vecchia, Marco Pedroni
Over recent decades, the process of teaching/leaming has become ever more complex. The increasing school population, and the advent of new IT applications and of networking, together with the requirement for continuous training, have comprehensively overturned the simplistic approach to the process that had previously been pursued. As a result, the evaluation of the process has also been overhaule ...
concept maps, evaluation, e-learning, assessment.
4 downloads
Edson Pimentel, Nizam Omar
It is unquestionably essential for students to gather their previous knowledge of specific subjects when they are about to learn new and more complex ones. The gaps left by the absence of well-defined learning prerequisites not only contribute to the increase in the learning difficulties, but also lead many students to fail in school. This situation gets even more serious when students are not awa ...
Interactive Learning Environment, Assessment, Knowledge Acquisition Level.
1 downloads
Retta Sweat-Guy, Nicole Buzzetto-More
Assessment of student learning outcomes plays an important role in educational effectiveness, improvement, and sustainability that is increasingly being recognized and required by accrediting bodies (Buzzetto-More, 2006; Haken, 2006). A form of performance-based assessment that is growing in popularity and is heralded for its purposeful, dynamic, and integrated nature is the portfolio (Cooper, 199 ...
electronic portfolios, authentic assessment
6 downloads
Glen Van Der Vyver
Norm-based assessment is under fire from some quarters because it is often unfair and is out of touch with the demands of the job market. Criterion-referenced assessment is touted as the answer by others but problems remain, in particular with regards to the maintenance of standards. This study examines the use of competency-based assessment in an undergraduate database course. The findings sugges ...
grade inflation, criterion-based assessment, academic standards, competence, norm-based assessment.
2 downloads
Azad Ali, Frederick Kohun
Starting with the introduction of Visual Studio .NET (VS .NET) application developers can write programs that may be used for different languages listed in VS .NET globalization. However, the list of languages is incomplete and is missing many. One of these missing languages from VS .NET globalization is the Kurdish: a language written and spoken by millions of Kurds around the world. Previous res ...
VB Globalizations, VB New languages, VB Kurdish, VS Kurdish
2 downloads
Martine Robinson Beachboard
Print-media needs of Hispanics in non-metropolitan areas of America are often overlooked. One newspaper editor in Idaho found Hispanics to be invisible in her small community and its newspaper, except in crime reports. So she began publishing the bilingual Idaho Unido. This study addresses the publisher’s business model and motivation for publication. It is based on two research streams: theories ...
communication, entrepreneurship, ethnic media, Hispanic newspapers, journalism, minority press, theories of the press
3 downloads
Vladimir Burcik, Fred Kohun, Robert Skovira
A research conception is developed to enable qualitative and quantitative research on the affect of culture on the curricular content of business and information systems degree programs. The frame raises the interconnected issue of globalizing business and information systems education (theories of organization, management, and employees’ motivation, and the use of information systems) and the aff ...
Global business education, global information systems education, cultural impact, power distance, uncertainty avoidance, organizational theory, management theory, management style
2 downloads
Nicole Buzzetto-More, Retta Sweat-Guy
In a world of expanding information and technological resources, there is increasingly a need for a citizenry that is able to access and use information and technology effectively (American Library Association, 2000). An information and technologically literate person should have access to, and be able to use, a host of available resources that include libraries, databases, and the internet in ord ...
Technological Literacy, Information Literacy, Technology Ownership by Minority Students, HBCU Freshmen
1853 downloads
Jeremy Fowler, Pat Horan, Chris Cope
When an information systems (IS) development project exceeds time, budget and functional constraints a point is reached where the decision has to be made to abandon it or attempt to save it. Some systems are of such value that management is prepared to take extraordinary measures to save them. This paper examines a case study of one such system whose development was saved from likely failure by a ...
Information systems’ success, information systems’ failure, organizational culture, project management.
Donna Grant, Linda Knight, Theresa Steinbach
Organizations attempting to attract more women to the Information Technology field often focus on convincing young women that the computer field is not composed primarily of geeks and loners. However, relatively little prior research focuses on whether the geek or loner image is in fact a reality in the minds of young women. This research reports on the results of a study of 412 girls, ages sixtee ...
354 downloads
Michael Jones, Irit Alony
With the increasing levels of multiculturalism in today’s business and the proliferation and essentiality of information systems, development and management of IS needs to be considered in light of the cultural factors which impact upon its utility. Hofstede’s work on culture is the most widely cited in existence. His observations and analysis provide scholars and practitioners a valuable insight ...
Culture, Information Systems, Hofstede, Cultural Dimensions, Cross-Cultural Research.
12 downloads
Sylnovie Merchant
While there has been a great deal of research on the application and implementation of Information Technology (IT), there is less research on the variables which can contribute to the successful diffusion and implementation of IT within an organization. This paper looks at the relationship between the cultural/work values of the people involved and IT adoption. Three cultures and the correlation o ...
culture, technology acceptance
5 downloads
John Merchant, Sylnovie Merchant
From a business perspective, the political and economic effectiveness of the United States in the global market-place will depend on individual abilities to communicate with people from other cultures. Most multinational corporations have one individual from one culture managing employees from other cultures. This has led to conflict, law-suits, and reduced productivity. To date, US business peopl ...
cultural values, work values
1 downloads
Irit Alony, Greg Whymark, Michael Jones
This paper explores tacit knowledge sharing. This case demonstrates the significance of knowledge sharing to organizational performance, by exploring the contribution of tacit knowledge sharing to the success of projects in the Australian Film Industry (AFI). The differences between knowledge sharing, collaboration and communication, and their interrelations are addressed. We also explore the conc ...
Knowledge Sharing, Film Industry, Tacit Knowledge, Qualitative, Collaboration.
9992 downloads
Viveca Asproth
Information technology has led to the fact that much of the information that earlier was produced on paper is now being produced in electronic form. E-government services, where the whole idea is to exchange information electronically, will radically redirect paperbound information towards electronically generated and managed information and documents. Earlier on, long-term preservation was all ab ...
long-term preservation, digital information, integrated systems, e-services, hidden Web, inter-organizations, anticipation
8619 downloads
Hernan Joglar, Julian Chaparro
Knowledge recognition as an organizational asset of strategic importance has generated growing interest on absorptive capacity. Surprisingly enough, research on the factors that originate this capacity has been rather scarce. Thus, existing knowledge on the matter suffers relevant omissions. One significant factor that has been excluded from the identified set of antecedents is the collection of r ...
Knowledge management, absorptive capacity, absorptive capacity antecedents, IS/IT resources and capabilities.
3 downloads
Azzedine Lansari, Abdallah Tubaishat, Akram Al-Rawi
A recently established university in the United Arab Emirates has shifted from an input-based teaching model to an outcome-based learning model. The outcome based academic model is new in the Gulf region and is designed to allow students and faculty members to work together to foster learning. This model is a dramatic departure from the traditional input model where students in the Gulf have learn ...
Outcome-based learning environment, e-learning, synchronous and asynchronous learning, learning management systems.
5 downloads
Marco Pedroni
Management of the cognitive context—understood as the reconstruction of the fabric of concepts and relations, representation in the form of a concept map and management of interactive functions that are inherent to or can be situated within the context itself—is a significant exigency both within the learning environment, and in particular for e-learning, as well as within the corporate environmen ...
concept maps, knowledge management, e-learning, context structure, knowledge sharing.
3236 downloads
Miha Skerlavaj, Vlado Dimovski
Organizational learning is a scientific field of growing importance. It has developed from classic and foundational works to the two disparate perspectives today: the acquisition and the participation perspective. The first understands knowledge as a substance, mind as a container, and learning as a transfer of a substance from one mind to another. The second perspective focuses on communities of ...
organizational learning, acquisition perspective, participation perspective, network perspective, social network analysis, descriptive claims.
5984 downloads
Kregg Aytes, John Beachboard
This paper describes the use the Information Orientation (IO) Maturity Model as the basis of a MBA course-based project. The IO model explicitly draws the relationship between business performance and several information and technology management concepts. More importantly, the IO Model is accompanied by a specific method of gathering and analyzing data, and includes general recommendations on how ...
IT alignment, MBA core course, information culture
501 downloads
Cornelia Brodahl, Marit Fagernes, Said Hadjerrouit
ICT training courses have recently undergone some important changes. These changes are made possible by new pedagogical approaches to ICT training. As a result, the focus has changed from memorizing, recall and reproduction of knowledge to conceptual understanding of the underlying software. One of these approaches is the Herskin’s understanding-oriented ICT training method. This paper assesses st ...
Constructivism, Hands-on, ICT training method, instruction sheet, learning theory teacher education.
1 downloads
Stuart Garner
This paper reports on the findings from a qualitative research study into the use of a technology-facilitated part-complete solution method (PCSM) that was used to support the learning of computer programming. The use of part-complete solutions to programming problems is one way in which the cognitive load that students experience during learning can be reduced. A code restructuring tool, CORT, wa ...
learning, programming, cognition.
3 downloads
Tiong Goh, Val Hooper
This paper describes the potential use of a SMS crossword puzzle system to promote interaction and learning activities in a large classroom environment. While personal response systems (PRS) have been used in the classroom environment to foster interaction, it is not an ideal tool with respect to cost and functionality. These limitations prompted the need for an alternative solution. A SMS crosswo ...
short message service (SMS); mobile phones; interactive learning; crossword puzzle
552 downloads
Frank Kurzel, Michelle Rath
In this paper, we describe the characteristics of Project Based Learning, a derivative of problem based learning and report on a multimedia course where this methodology was pursued. The instructional materials are reported on and the artefacts/documentation developed by students discussed. A factor analysis was performed on questionnaire data that was collected at the end of the semester to evalu ...
Personalised Learning Environment, learning objects, instruction, project based learning, course metadata.
17 downloads
Andrew Moshirnia
As the popularity of video game playing has increased, educators have sought to co-opt video games as an instructional tool. However, educational games have made little impact in either the commercial market place or the average game player’s home library. The modification, or modding, of video games using in-game editors may be used by instructors to introduce educational content to professionall ...
Computer-Based Learning, Ludic Learning, Modification
9 downloads
Kevin Parker, Joseph Chao
Wikis are one of many Web 2.0 components that can be used to enhance the learning process. A wiki is a web communication and collaboration tool that can be used to engage students in learning with others within a collaborative environment. This paper explains wiki usage, investigates its contribution to various learning paradigms, examines the current literature on wiki use in education, and sugge ...
wiki, Web 2.0, collaborative learning, information and communication technologies, computer-mediated communication, e-learning, pedagogy, education, constructivism.
40682 downloads
Anne Venables, Grace Tan
Genetic algorithms (GAs) are a problem solving strategy that uses stochastic search. Since their introduction (Holland, 1975), GAs have proven to be particularly useful for solving problems that are ‘intractable’ using classical methods. The language of genetic algorithms (GAs) is heavily laced with biological metaphors from evolutionary literature, such as population, chromosome, crossover, cloni ...
Genetic Algorithms, Experiential learning, Analogical model, Constructivism
4600 downloads
Riikka Vuokko, Pia Berg
During the course Implementation of Information Systems in Organizational Context we experimented with a reflexive and participative teaching method called eXtreme Teaching. This method proposes a consideration for values, such as respect, communication, feedback, courage, and simplicity, in teaching. We wanted to experiment with an informal teaching method to gain more interaction. During the cou ...
Implementation of information systems, teaching in computer science, eXtreme Teaching, assessing teaching, teaching interaction
4 downloads
Yavuz Akpinar, Huseyin Simsek
The emergence of learning objects for teachers as a focus of educational concentration is relatively new and much of the discussion has not been based on the actual development of objects, but different definitions, learning theories, properties and standards or decorative packages of learning objects (LOs). Also, in many teacher education programs, prospective teachers take a computer literacy cl ...
Learning object, prospective teachers, development, evaluation
1088 downloads
Alex Koohang, Keith Harman
This paper discusses the concept of Open Educational Resources (OERs). The discussion then shift to OER sustainability, a fundamental element essential for the success of OER. Special attention is given to the following as they relate to the OER sustainability: instructional design & presentation; cost of production and maintenance; support; and OER communities of practice as relate to scalability ...
Open Educational Resources (OERs), sustainability, scalability, decentralization, communities of practice
5 downloads
Carlos Lerma
The changes that computers have introduced to society include the way and speed in which humans acquire knowledge and process information. The use of computers has been driven by academic research, and it is within academic settings where the use of computers has been felt stronger by society. This paper identifies the different types of learning objects and determines the factors that should be t ...
learning, objects, creation, types, metadata, cost
1380 downloads
Hamilton Matos, Pollyana Mustaro, Ismar Silveira
Learning objects-driven approaches for the development of instructional content have been widely used to structure entire courses and repositories for distinct learning contexts. Nonetheless, their use is still done in a static, non-adaptive manner, since students are presented to prebuilt compilations of learning object having few or none relationship with its learning current conditions, history ...
Learning Objects, Instructional Design, Multiple Intelligences, RIA, Design Patterns.
1 downloads
Danijela Milosevic, Mirjana Brkovic, Matjaz Debevc, Radojka Krneta
This paper presents an adaptation scenario for tailoring instructional content towards individual learner characteristics taking into consideration his/her learning style type and subject matter motivation level. Learning resources are organized through shareable content objects (SCOs) - a small digital chunks of knowledge, independent and self described pieces of instructional material delivered ...
adaptive learning environments, learning objects, learner models, learning styles, SCORM.
4274 downloads
Pollyana Mustaro, Ismar Silveira
Learning objects-based architectures often allows the creation of coarse-granular learning resources by aggregating learning objects retrieved mainly from well-structured public repositories. Nonetheless, the learning resource building process is not exactly trivial, since proper selecting and sequencing strategies must be applied in order to make it useful for learning purposes, as well as to mak ...
learning objects, narratives, hypertext patterns, learning resources, collaborative learning
2 downloads
Heinz Dreher
In order to detect plagiarism, comparisons must be made between a target document (the suspect) and reference documents. Numerous automated systems exist which check at the text-string level. If the scope is kept constrained, as for example in within-cohort plagiarism checking, then performance is very reasonable. On the other hand if one extends the focus to a very large corpus such as the WWW th ...
academic malpractice, conceptual analysis, conceptual footprint, semantic footprint, Normalised Word Vector, NWV, plagiarism.
3 downloads
Zlatko Kovacic
Software piracy or ‘softlifting’, the unauthorized use or illegal copying of computer software seems to be a persistent and truly global phenomenon, in spite of international efforts to reduce it. Could the battle against it be won by just merely accepting international standards for the protection of intellectual property rights? The answer to this question is the main focus of this research. Thi ...
Software piracy, national culture, economic factors, law enforcement, intellectual property rights
4121 downloads
39 downloads
Sergio Araya, Julian Chaparro, Alejandro Orero, Hernan Andres Joglar
Different studies in the context of information systems and information technologies (IS/IT) support the idea that these resources may contribute to develop competitive advantages and to improve organizational performance. To accomplish such benefits, IS/IT resources must be combined with some other organizational elements. Although the necessary relationships are recognized in literature, integra ...
Resources and capabilities, information systems, information technologies.
Humam Elagha, Maher AlShafee
Modeling multimedia traffic is an important issue in performance analysis and design of communication networks. With introduction of new applications, the characteristics of data traffic changes. In this paper, a measurement study of ATM Network traffic has been carried out and it is shown that the recorded data exhibit self-similar features. The conclusions are supported by a comprehensive analys ...
ATM, Modeling, Self-similar traffic, Indices of Dispersion, Hurst parameter, Performance Testing.
Diana Jonas-Dwyer, Fay Sudweeks
This research is an exploratory study of students’ approaches to studying histology and pathology. With the introduction of virtual microscopes in Health Science at Murdoch University, Australia, in 2006, it was crucial to investigate how this new technology impacted on students’ approaches to learning. The ASSIST survey was implemented at the beginning and end of the semester to identify any chan ...
virtual microscopes, histology, study approaches, deep learning, e-learning.
2925 downloads
Lakshmi Narasimhan, Di Wu, Narinder Gill
The cardiovascular disease is one of the serious and life-threatening diseases in the developed world. One aspect of medical treatment is using drugs with blood pressure reducing or cholesterol lowering functions. Importantly, such treatment needs to be individually tailored and is significantly correlated to the particular conditions of individual patients. However, such pathologies and mechanism ...
Key Words Meta-analysis, Cardiovascular life cycle management (cardiac clinic), Data mining
Jean-Pierre Brits, Gerrit Botha, Marlien Herselman
Staying competitive in today’s fast changing markets and business environments has become a big issue in organizations these days. To be able to foresee the future of the industry and have insight into customer’s articulated and unarticulated needs are critical capabilities that organizations need to acquire in order to stay competitive. The objective of this research project is to provide a conce ...
Business Capabilities, Business Strategy, Innovation, Agile Organization, Information Modeling
13824 downloads
Harald Fardal
This study adds to the body of knowledge in research of ICTs in organizations by exploring the relevance of alignment between ICT users and managers responsible for the ICT strategy and ICT project processes. Alignment research is usually conducted at an organizational analytical level, but this study explores alignment between individuals by addressing ICT managers and ICT users, considering both ...
ICT strategy, ICT projects, alignment, user participation, user satisfaction, user initiatives
2 downloads
Rok Skrinjar, Mojca Indihar Stemberger, Tomislav Hernaus
The extensive literature on business process management suggests that organizations can enhance their overall performance by adopting a process view of business. It has been shown in previous studies that the companies which have reached higher business process maturity level consistently outperform those that have not reached them. The paper presents the results of the empirical research that con ...
business process orientation, organizational performance, non-financial performance, business process management, structural equation modeling
9882 downloads
Hedaya Alasooly
The paper provides a survey of some of the international journal publishers that can be found in internet. Provided also is a survey of some of the free and commercial publishers in internet.
Publishing, Journal, International Publishers.
1902 downloads
Zbigniew Gackowski
This paper presents an inquiry and a proposal of a structured way of thinking about informing as a separate field of scientific inquiry and practical endeavors and possibly a separate academic discipline. Informing is the science and art of practical endeavors to increase its effectiveness and efficiency; it is an interdisciplinary applied science with some components of universal validity, which ...
Informing, informing science, informing discipline, field of inquiry
970 downloads
Grandon Gill, Anol Bhattacherjee
The essential elements of an informing system are a sender, a communications pathway, and a client. Academic informing systems, however, are best viewed as two interacting informing systems, one that informs clients of a discipline, one that informs clients of the institution. The paper proposes that the greater the degree of overlap between the clients of these two systems, the stronger the posit ...
informing sciences, informing systems, client, sender, MIS, institutional priorities, transdiscipline.
2380 downloads
Karl Knox
There are identified within the discourse a number of notions regarding the term information. This paper sets out to explore these sometimes-conflicting notions of information. The reason why conflicting notions occur is the result of different perspectives and understanding of the term information. Within the discourse two camps are identified, firstly, those who identify information as a resourc ...
2 downloads
Matti Tedre
The diversity and interdisciplinarity of computer science and the multiplicity of its uses in other sciences make it hard to define computer science and to prescribe how computer science should be carried out. The diversity of computer science also causes friction between computer scientists from different branches. Computer science curricula, as they stand, have been criticized for being unable t ...
philosophy of computer science, foundations of computer science, computer science education, course description
5328 downloads
Mojca Indihar Stemberger, Andrej Kovacic, Jurij Jaklic
Non-profit organizations such as public sector organizations have some specifics, which make renovation projects significantly different. It is clear that radical changes in the execution of business processes and in the organizational structures are not suitable for the public sector because they are not possible for many, also political, reasons. A business process change in public sector mostly ...
business process management, methodology, business process maturity, public sector, business process modeling, business process change, case study
5740 downloads
Rita Nienaber, Andries Barnard
Despite various research efforts originating from both academia and industry, software projects have a high rate of failure, more specific, software projects often do not comply with the traditional standard measurements of success, namely time, cost and requirements specification. Thus, there is a need for new methods and measures to support the software project management process. Globalisation ...
Software Project Management, Software Agent Technology, Project Scope Management, Project Time management, Project Cost Management, Project Quality Management, Project Risk Management, Project Communication Management, Project Human Resource Management, Project Procurement Management,
4878 downloads
Aneerav Sukhoo, Andries Barnard, Mariki Eloff, John Andrew van der Poll
Software project management is a relatively recent discipline that emerged during the second half of the 20th century (Kwak, 2003). Many of the software project management methodologies available today were developed in Western/European countries and research showed that there was a need to formalise a software project management framework for developing countries, in particular Africa (Muriithi & ...
software project management, software development, maturity model, evolutionary process, project management methodology
13665 downloads
Peter Eachus
Several studies have suggested a significant relationship between finger length and aspects of personality. In this study the ratio between second and fourth digit lengths, known as digit ratio, was correlated with sensation seeking and Internet self-efficacy. In addition the relationship between the fourth and fifth digits, i.e. the little finger and ring finger, and these two constructs was also ...
Self-efficacy, Internet use, Digit Ratio, Gender differences, Sensation seeking
Kevin Johnston, Barry Andersen, Jennifer Davidge-Pitts, Mark Ostensen-Saunders
Literature relating to personality and entrepreneurship has focused primarily on personality characteristics of traditional entrepreneurs. The focus of this study was on personality characteristics and temperaments of potential ICT entrepreneurs. The main objective of the study was to evaluate the impact of personality characteristics as identifiers of potential ICT entrepreneurship. In order to m ...
Key Words Temperament, personality, entrepreneurial tests, entrepreneurs.
531 downloads
Konrad Peszynski, John Lenarcic
With the damaging influence of systems implementation failure, it is vital to distinguish the issues surrounding large-scale software selection, construction and operations. Using the work by Markus (1983) as a touchstone, this paper spotlights the question of resistance towards a new system and the impact policy has on minimising confrontation. A case study delving into the lines of conflict asso ...
Resistance, Policy, Power, Discourse, Systems Implementation
274 downloads
Andrzej Malachowski
The paper presents results of studies among computer users, demonstrating a remarkable relation between history of computer use (computer experience) and readiness to access Internet resources (Internet access). The observed relation, referred to as ‘Internet entry delay syndrome’, may be described as follows: the greater the user’s computer experience, the longer it takes him/her to decide on acc ...
computer users, Internet users, Internet (users) entry delay syndrome.
478 downloads
Panagiotis Petratos
In this article a human centered approach for Information Retrieval IR systems is offered. The focus of this article is on human users of IR systems, who are given the opportunity to offer enhanced relevance feedback. A novel approach is offered to capture the back-propagated feedback of human users during IR sessions. According to this approach the IR system is developed to accept human bidirecti ...
Information Retrieval Systems, Human Computer Interaction, Bidirectional Relevance Feedback.
5218 downloads
Adesina Sodiya, H. O. D. Longe, Adebukola Onashoga, Oludele Awodele, L. O. Omotosho
The success or otherwise of Software Engineering (SE) activities depends on the interactions among software engineers. Consequently, effective interactions depend largely on personality traits, which is a consistent and long-lasting tendency in behaviour. In psychology, five major trait factors (The Big Five Factors) have been generally used to assess personality of people. But, these might not be ...
Software Engineering, Software Engineers, Personality Trait, Psychology
10383 downloads
Glen Van Der Vyver
The ICT profession is characterised by constant change, uncertainty and innovation. It is widely postulated that ICT professionals should be adaptable and enjoy new challenges and opportunities. This exploratory study uses an appropriate scale to examine the adaptability of several cohorts of undergraduate ICT students. The findings suggest that ICT students are less adaptable than might be expect ...
279 downloads
Mary McCully, Elizabeth McDaniel
Government organizations and universities are traditional and bureaucratic institutions. One government-sponsored graduate-level college undertook a transformation to develop agility in spite of academic traditions and a risk-averse culture to take advantage of Information Age concepts, opportunities, and tools. As a result, the college, dedicated to developing information leaders who can leverage ...
Agility, sense-and-respond, transformation, netcentricity, information age
Patience Ngcobo, Marlien Herselman
The main focus of this paper is to evaluate the provision of ICT in three rural communities in Kwa-Zulu Natal (KZN) in South Africa to determine how the needs of these communities can be addressed. Both qualitative and quantitative research methodologies were applied to address this focus. Results are compared and recommendations are presented that may best meet the needs of the rural communities.
Rural communities, Kwa-Zulu Natal, South Africa, ICT provision
2 downloads
Darlington Onojaefe, Marcus Leaning
The deployment of new technologies such as the Internet is often understood to positively change the way that business works. However it is important to realise that success is not automatic and a number of other factors must also be considered. In this paper it is argued that a wider range of skills is needed than just technical skills, and a wider vision is needed than just the vision of one bus ...
Partnership management, small business, ICT, social impact, community informatics, business development
5 downloads
Akram Al-Rawi, Azzedine Lansari
The objective of this paper is to report findings from simulating and testing local area network (LAN) connectivity using Windows XP operating system and Cisco Networking Academy network devices. In this study, a simple routing protocol, RIP, is used as routing protocol. Two different techniques, Cisco Networking Academy hardware lab and Cisco Packet Tracer 4, were used to compare their performanc ...
Cisco Networking Academy, Windows XP Firewall, Network Simulation, ICMP.
4 downloads
Vesna Bosilj-Vuksic, Vlatko Ceric, Vlatka Hlupic
This paper focuses on a process of simulation software packages selection in the context of business process change projects. The paper presents discrete event simulation, its relation to business process modelling and examples of its practical applications in business process change projects. Features of business process simulation tools are examined, the most important simulation features are id ...
Business process simulation, discrete event simulation, business process change, business process modelling tools, guidelines for the evaluation of business process simulation tools
15194 downloads
Atulya Nagar, Hissam Tawfik
This paper presents an approach for analysing and prototyping urban road network routes based on multiple criteria, such as spatial quality, transportation cost and aesthetics, in order to evaluate the quality of people’s use of road networks. A prototype is developed to analyse routes and accessibility in road layouts from a number of design and user related perspectives. A case study is used to ...
road networks, multi-criteria, simulation.
2 downloads
Robert Williams, Des Klass
In most cases today information systems development involves the use of multiple development tools. The developer has the choice of many competing vendor tools to choose from, and the choices to be made are complex. Will the various tools work together, and which tool should be chosen for which task? This paper describes the development of a business simulation game, and the role various developme ...
Software development tools, business simulation games.
5 downloads
Victor Cavaller
The aim of this paper is to define the architecture of the information analysis towards a proposal of methodology on systematic information analysis. First, the author shows the dimensions that state the architecture of information management. Second, the work explores the concept of indicator, as the measurement of the relation between data, and presents the results of a theoretical study of the ...
Information analysis, indicators, knowledge management, scientometrics, datamet-rics.
884 downloads
Wernher Friedrich, John Andrew van der Poll
This paper seeks to address a problem ubiquitous in many software development environments today, namely, building software from requirements that are incomplete and not fully understood, thereby creating products that are either faulty or ultimately not being used at all. This gap that exists between software engineers and clients is highlighted in this paper and suggestions on how to overcome th ...
Software Engineering, Requirements/Specification, Elicitation methods, Rapid prototyping, Human factors, Software Psychology, Domain knowledge, Domain expert, Tacit knowledge.
358 downloads
Samir Jusic, Lee Sai Peck
Persistence is the term used in computer science to describe a capability to store data structures in non-volatile storage such as a file system or a relational database (Wikipedia, 2003). There is a growing need to simplify the interactions among separate systems and to build complex software systems that are made out of components with well-defined services. At the base-level of such complex sys ...
transparent persistence framework, design patterns, Java, relational to object model mapping
2 downloads
Hissam Tawfik, Atulya Nagar, Terrence Fernando
This paper proposes a multi-criteria based approach for the analysis of building layouts, from space quality and cost related perspectives. A computational prototype is developed to analyse a building layout from various accessibility related measures in order to evaluate the quality of the building special layout. A case study is used to demonstrate the assessment of a building layout based on a ...
Space analysis, building layouts, multi-criteria.
1 downloads
John Bauer Mengelberg
An unstructured book is defined as a set of digital multimedia files called items, together with ordered subsets of them presented to its readers. Thus different readings of the same set of items are possible. Additionally, items may be shown in different versions and languages. The functionality of the software package SPRP used to publish and read such books is described with an overview of what ...
e-book, publishing, unstructured, reading privileges.
2 downloads
Susan Nash
The growing popularity of mobile devices, coupled with the ever-increasing number of high-quality e-books available for free download is causing a re-examination of core curriculum and instructional philosophies. Perhaps the most - making “great books” programs available and accessible - newly interesting, despite misgivings and political correctness of the last few decades. Distance learning via ...
m-learning, mobile learning, podcasts, video casts, great books, humanities education
7 downloads
Janice Whatley, Amrey Ahmad
Video as a tool for teaching and learning in higher education is a multimedia application with considerable promise. Including video within the online support material for a module can help students to gain an understanding of the material and prepare for assessment. We have experimented with using short videos that summarise the lectures given, as an aid for students to use when revising. An inte ...
Video, learning, revision, assessment.
6380 downloads

Back to Top ↑