Issues in Informing Science & Information Technology

Articles from Vol. 6, Annual

A Conceptual Model for Learning to Program in Introductory Programming Courses
Introduction Teaching a first programming course has been the subject of numerous studies (Ali & Mensch, 2008; Carter & Jenkins,2002; Kelleher & Pausch, 2005). Many confirm the notion that learning to program is considered to be a difficult...
A Data Driven Conceptual Analysis of Globalization-Cultural Affects and Hofstedian Organizational Frames: The Slovak Republic Example
Introduction It has been argued that culture effects how individuals implement, understand, and teach the curriculum of business courses within a society's educational institutions (Burcik et al., 2007; DeLorenzo et al., 2006; Hofstede & Hofstede,...
Age and ICT-Related Behaviours of Higher Education Teachers in Nigeria
Introduction The impact of new ICT has significantly changed the speed of production, use and distribution of knowledge. Time was when the principal teaching resources available to a professor were the books in the college library, his chalkboard...
Agent-Based Advert Placement System for Broadcasting Stations
Introduction The early methods of transmitting information over long distances did not evolve very far distance, until the 19th century, experiments were done to transmit messages via a series of electrical clicks on wires. Thus, the telegraph system...
Aligning Efficacy Beliefs and Competence: A Framework for Developing Technical Knowledge
Introduction Managers operating within today's organizations are under the constant pressure of change that results in continuous career challenges. Some of these challenges may be familiar and managers can call upon their past experiences to question,...
A Longitudinal Study of the Use of Computer Supported Collaborative Learning in Promoting Lifelong Learning Skills
Literature Review Lifelong Learning and CSCL Life long learning refers to the idea of learning as a lifelong process with emphasis on the individual learner having the ability and responsibility to influence his or her own learning (Aspin &...
A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)
Introduction Considering the reliance of humans on computers and network infrastructures to perform virtually every aspect of day to day activity, there is a critical need for ensuring the reliability and integrity of these infrastructures. According...
Analysing Socio-Demographic Differences in Access and Use of ICTs in Nigeria Using the Capability Approach
Introduction The impact of the development of the information society and especially the impact of Information and Communication Technologies (ICTs) on spatial development is now a question of discussion. One reason for this is probably simply the...
Animated Courseware Support for Teaching Database Design
Introduction Database technologies are foundational to effective information systems and an effective database system is predicated on a good data model. The goal of database design is to conceptualize an underlying data model and determine an appropriate...
An Interactive E-Learning Tool for Kids in Mauritius
Introduction Electronic Learning (or e-learning) may be defined as learning using a computer, usually connected to a network. Many researches believe that e-learning is still in its infancy (Kahiigi et al., 2008). Our society can gain tremendously...
A Radio Frequency Identification (RFID) Container Tracking System for Port Louis Harbor: The Case of Mauritius
Introduction The globalization process has brought with it a number of driving forces that have caused many transformations. The consequences of these forces are extending to all sectors, commercial and industrial activities, including the port...
Assessment of Nigerian Teacher Educators' ICT Training
Introduction Informal observation reveals that there have been considerable (though uncoordinated) ICT-training efforts of late both at personal and institutional level among teacher educators. The purpose of these trainings is making teacher educators...
A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems
Introduction An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. An intrusion takes place when an attacker or group of attackers exploit security vulnerabilities...
A Student Project to Qualify Underprivileged Adolescents
Introduction Integrating student projects into Information Management curricula has become quite popular. The list of objectives addressed by teaching through student projects covers: * to foster the will and the enthusiasm of students accepting...
Capturing the Mature Traveler: Assessing Web First Impressions
Introduction IPK International (2008) has identified the take up of the internet as one of the four main drivers of global travel and tourism growth. Various empirically based reports confirm the growth and use made of the internet in tourism and...
Community Living Lab as a Collaborative Innovation Environment
Introduction Many private and public investments in community development fail to produce real and sustaining value for communities. Some of the deficiencies observed are that traditional community development projects are initiated and executed...
Compiler-Aided Run-Time Performance Speed-Up in Super-Scalar Processor
Introduction For the sake of better understanding our discussion let's remember some concepts. Each software unit which is managed or executed by the operating system is called a job or an instance. The collection of related jobs (or instances)...
Components- Based Access Control Architecture
Introduction The most widely used mechanism for preventing unauthorized access to systems is Identification and Authentication. Identification is the process where a user gives a valid and recognized identity to the system and authentication is...
Cross-Departmental Collaboration for the Community: Technical Communicators in a Service-Learning Software Engineering Course
Introduction Traditionally in a project-based software engineering course, students learn software development skills by working on tightly controlled classroom projects provided by instructors. While such projects provide valuable software development...
Design Alternatives for a MediaWiki to Support Collaborative Writing in Higher Education Classes
Introduction Wikis can be used to facilitate collaborative writing. Through the use of a wiki for a group writing project we discovered that some mechanisms can be added to wikis to support collaborative group writing in higher education. Collaborative...
Development of Electronic Money and Its Impact on the Central Bank Role and Monetary Policy
Introduction The development of information technology and the emerging of a number of new innovations are taking place in the area of retail payments known as electronic money (e- money).This development influencing the banking industry due to...
Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives
Introduction The ICT subject curriculum from 2006 is intended to improve the content of the subject, on the one hand, and to enhance the teaching and learning of ICT, on the other hand Unfortunately, the curriculum is restricted to what is to be...
DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography
Introduction Since 2001 different web sites, to be used for research in paleography, have been planned and carried out. The online information systems underpinning the web sites were used to manage bibliographical data on medieval manuscripts and...
Digital Divide: The Case of Developing Countries
Introduction When information technology became popular in applications (for automation) in the 1970s, discussions and debates on the impact of this technology were centered on 'information gaps' between developed and developing countries under...
Emotion-Aware Education and Research Systems
Introduction An opinion is widely spread among lecturers and researchers in natural sciences and especially in mathematics that the usage of emotions in the professional context is by no means acceptable. It is accepted that there is no place for...
E-Portfolios for Integrated Reflection
Introduction Recently more and more students and teachers are using e-portfolio systems. There will be massive pieces of electronic portfolio artifacts stored in those systems. E-portfolios are supposed to serve three purposes: assessment, showcase,...
Evaluation of a Suite of Metrics for Component Based Software Engineering (CBSE)
Introduction Component-Based Software Engineering (CBSE) is a methodology that emphasizes the design and construction of computer-based systems using reusable software components. This principle embodies an element of "buy, don't build" that shifts...
Extending SCORM LOM
Introduction Wiley (2000) discussed connecting Learning Objects (LO) to instructional design theory via defining LOs and then examining the LO LEGO block metaphor. Wiley defined a LO as a new paradigm for internet learning that is a digital, reusable...
Finding Diamonds in Data: Reflections on Teaching Data Mining from the Coal Face
Introduction Data that has relevance for managerial decisions are accumulating at an incredible rate due to a host of technological advances: electronic data capture has become inexpensive and ubiquitous as a by-product of innovations such as the...
Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol
Introduction The current network is characterized by its increasing distribution, its dynamic nature, and the complexity of its resources, due to the increasing requirement of different services (Yang, Galis, Mota, & Michalas, 2003). Network...
How Anomalous Is Belady's Anomaly?
Introduction Most Computer Science textbooks introduce concepts that are not fully explained or understood. Operating System textbooks often give a brief example of a phenomenon called Belady's anomaly and mention situations where Belady's anomaly...
How Generic Is I(nformation) T(echnology)?
Introduction A curriculum revolution has started to transform the Australian higher education sector, as several leading universities embarked on radical course reforms involving a reduction of discipline-based undergraduate course offerings in...
ICT Use and Network Relations: Exploring Knowledge-Sharing Networks in Distributed Organizations
Introduction Distributed organizations are ones whose internal activities are geographically dispersed (see Duarte & Snyder, 2006). Increasingly, such organizations are attempting to unify their scattered units into one integrated unit via ICTs...
Influence on Student Academic Behaviour through Motivation, Self-Efficacy and Value-Expectation: An Action Research Project to Improve Learning
Introduction In the bachelor program in IT and information systems at University of Agder (UiA) we have had a drop out rate up to more than 60% during the three year program. On this background a project was started to find the reason for drop out...
Informing Clients through Information Communication Technology in Health Care Systems
Introduction Information Technology, particularly, the Information Communication Technology (ICT), has revolutionized the world communication order. People can be informed in more effective, efficient and convenient ways. Access to media has percolated...
Informing Processes and Models: A Core Course in IS Curriculum
Introduction During the last twenty years, since the Internet has been launched, the amount of information used in all areas of human activity increases rapidly. From one side this is caused by the easiness of information availability, and from...
Innovation and Scaling Up Agile Software Engineering Projects
Introduction Innovation in education often works best when it is driven by academic ownership of prototype projects. Innovation in teaching and learning through technology is desirable as it leads to improved learning in students and improved collaboration...
IT Systems Development: An IS Curricula Course That Combines Best Practices of Project Management and Software Engineering
Software Engineering in IS Curricula Software engineering course is taught to higher education students majoring in Computer Science (CS), Computer Engineering (CE), and Software Engineering (SE). Software engineering course is also taught in other...
Managing Information Systems Textbooks: Assessing Their Orientation toward Potential General Managers
Introduction It is a generally accepted belief that modern technology oriented enterprises, at least in the developed economies, are critically dependant on information technology based systems. This dependence involves two fundamental areas: the...
Meaningful Learning in Discussion Forums: Towards Discourse Analysis
Introduction Computer mediated communications (CMC) was and remains a driving force towards new forms of asynchronous discussion, which constitutes a significant and very important component in distance learning. Since 1998, analysis of asynchronous...
M-Government Services Initiatives in Oman
Introduction Mobile devices are now becoming part of our daily and business life. At the end of year 2001, approximately 14% of the world population--850 Million people--were mobile phone users. This growth has been spectacular especially in Europe...
Modeling an Assessing Rubric: Reflections of Red Ink
Introduction The essay is descriptive and analytic, reflective of the experiencing of activities and events (practices) of an undergraduate senior-level course in a computer information systems curriculum. Over the time of 15 weeks, the course is...
Modified Watershed Algorithm for Segmentation of 2D Images
Introduction In image processing, segmentation is a basic problem in different fields for example, pattern recognition, scene analysis and image analysis. Image segmentation is the process of dividing images into regions according to its characteristic...
Name-Display Feature for Self-Disclosure in an Instant Messenger Program: A Qualitative Study in Taiwan
Introduction Today, with high-speed network technology available, cyberspace has been a communication center in which people can distribute useful information, share valuable knowledge, receive training or education, conduct business transactions,...
Novel Phonetic Name Matching Algorithm with a Statistical Ontology for Analysing Names Given in Accordance with Thai Astrology
Introduction Names are used for referring to people, places, things, and even ideas or concepts, and in many cases for identifying them. Names serve as labels of categories or classes as well as individual items or instances. They are properties...
Ownership Influences on Vertical B2B E-Marketplaces' Survival
Introduction An vertical electronic marketplaces (EM) is a virtual hub, enabled by information, decision, and communication technologies, embedded in a single industry network, the objective of which is to bring together multiple buyers and suppliers...
Phenomenon of Nasza Klasa (Our Class) Polish Social Network Site
Introduction The design, implementation and success of the social networking portal Nasza-klasa (Our Class) is a model example of the 'rags to riches' ideal of an enterprise construed with no financial funding and no institutional support (neither...
Risk Assessment of Information Technology Systems
Introduction Information technology, as a technology with the fastest rate of development and application in all branches of business, requires adequate protection to provide high security. The aim of the safety analysis applied on an information...
Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption
Introduction The number of devices connected to the Internet has grown rapidly during the last years. At the same time more and more computers have become portable and mobile. This has lead to an increased need for unique IP addresses as well as...
SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security
Introduction The aim of the paper is to investigate a cost effective solution that will provide controlling of home appliances remotely and will also enable home security against intrusion in the absence of home owner. The motivation is to facilitate...
SMS User Interface Result Checking System
Introduction Computers with the power of the internet have thrived in aiding communication among people. The telephone system, which is the main communication system that was invented several years ago, had undergone a great improvement, so much...
Soft Skills and Technical Expertise of Effective Project Managers
Introduction Project management emerged as a methodology for managing initiatives that not only focused on creating a one-time product or prototype but also required the expertise of individuals from cross-departmental boundaries. Most large-scale...
Study of Polish Women's Web Portals
Introduction The Internet has grown to be the largest medium of communication in the modern world. Online communication, both in business and non-business settings, creates favorable conditions for development of diverse online communities (Boyd...
The Adoption of Automatic Teller Machines in Nigeria: An Application of the Theory of Diffusion of Innovation
Introduction Globally, Automatic Teller Machines (ATMs) have been adopted and are still being adopted by banks. They offer considerable benefits to both banks and their depositors. The machines can enable depositors to withdraw cash at more convenient...
The Efficacy of a Web-Based Instruction and Remediation Program on Student Learning
Literature Review The higher education landscape has changed significantly in recent years with an increasingly diversifying student population. According to the President of Noel-Levitz (Noel-Levitz, 2002) by the year 2012, students enrolled in...
The Energy Inefficiency of Office Computing and Potential Emerging Technology Solutions
Introduction Irrespective of whether you are a believer or skeptical that greenhouse emissions contribute to global warming and climate change, the Federal Australian government has enacted the regulation of energy consumption and greenhouse emissions...
The Information Society Development Strategy on a Regional Level
Introduction The 21st century is a period of economic, social and technological transformations that facilitate development of the new society that is referred to as the information society (Bell, 1973; Drucker, 1993; Tofler, 1980). It is worth...
The LIS Discipline or Retrieval of Information: A Theoretical Viewpoint
Introduction Although the concept of library is an old and historical one the librarianship and then documentation and information science are new concepts (Vickery, 2008b). By development of technology the LIS reached to its highest point in such...
The Need to Balance the Blend: Online versus Face-to-Face Teaching in an Introductory Accounting Subject
Introduction Rapid developments in information and communication technologies have made a significant impact on the content and delivery of course curriculum in higher education (Nicol, 2006). One of Victoria University's key strategies is to...
The Risk of Misinforming for Competing Messages
Introduction This paper is an extension of previous findings presented in Christozov, Chukova, and Mateev (2006, 2007, 2008). We consider the marketplace as a place where messages, describing different products suitable for solving one and the same...
The Role of Management Games in Mapping Learning Styles to Elements of Business Know-How Acquisition: A Case Study
Introduction Strategic decision making concerns larger personnel groups nowadays than before (Lainema & Lainema, 2007). Employees at lower levels of the organization are participating in decision making with more impact on forming the strategy...
The Work Readiness of Master of Information Systems International Students at an Australian University: A Pilot Study
Introduction A review of the literature from government, industry, and academic sources identifies that the Australian information and communication technology (ICT) industry suffers from spiralling low numbers of suitably skilled employees. Increasing...
Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods
Introduction The novice researcher, such as the graduate student, can be overwhelmed by the intricacies of the research methods employed in conducting a scholarly inquiry (Leedy & Ormrod, 2005). As both a consumer and producer of research, it...
University Enhancement System Using a Social Networking Approach: Extending E-Learning
Introduction Several discussions, opinions and projects have emerged in areas of e-learning especially from a social networking context, and application of ICT to solve both academic and administrative problems of schools, most notable higher institutions...
Usability Issues in Mobile-Wireless Information Systems
Introduction The evolution of technology in the fields of handheld devices like cellular phones, personal digital assistants (PDA) and smart-phones and in the field of wireless communications increased the development of mobile-wireless information...
Using Digital Video Games in Service Learning Projects
Introduction Service learning projects have been used in academic courses for some time. Ideas for service learning projects often seem to be straight forward such as cleaning the streets, visiting the elderly, teaching children how to read or similar...
Will Information-Communications Systems Survive? Web 2.x and SocNet as Placebos or Real Internet Survival Kit
Introduction Web and its infrastructure is evolving from its beginning into widespread mechanism of communication and for sharing ideas amongst individuals and various socials and business groups. Nowadays we are faced with the questions about Internet...