Issues in Informing Science & Information Technology

Articles from Vol. 4, Annual

Accreditation of Monash University Software Engineering (MUSE) Program
Introduction In Australia, you must graduate from an accredited engineering program to be assured graduate membership of Engineers Australia (EA). Assessment of an engineering program for accreditation by Engineers Australia is based on the curriculum:...
A Comparative Analysis of Common E-Portfolio Features and Available Platforms
Literature Review Haken (2006) explained that assessment is an integral part of assuring that an educational institution achieves its learning goals, as well as a crucial means of providing the essential evidence necessary for seeking and maintaining...
A Didactic Experience in Collaborative Learning Supported by Digital Media
Introduction It is in the so-called technologically excluded regions where e-education is still uncommon, and infostructure and infoculture (Newell et al., 1999) are least developed, but e-education can still be a key element for improving the digital...
Advancing Sustainability of Open Educational Resources
Introduction The primary purpose of this paper is to 1) introduce readers to Open Educational Resources (OERs) and 2) discuss several vital issues as regards the OER sustainability. This paper is organized in manner consistent with its purpose....
A Model of Introducing E-Learning System at Vocational College for Business Secretaries
Introduction After Slovenia became an independent state in 1991 the transition process started. The consequence of deep economic and social changes is the adaptation in all fields including education. There were many formal changes in educational...
A Multi-Criteria Based Approach to Prototyping Urban Road Networks
Introduction Space layout and urban road network design presents a critical challenge as a result of increasing levels of urbanisation and road traffic. Urban planners have always aimed at optimizing the road network design to meet transportation...
Analyzing the Effect of Culture on Curricular Content: A Research Conception
Introduction This paper is an expansion of a previous work (DeLorenzo et al., 2006) exploring the bridge between culture and business education. In this work, a research conception (influenced as it may be by the authors' own shared systems of meanings)...
An Architecture of a Computer Learning Environment for Mapping the Student's Knowledge Level
Introduction Globalization and the advancements and dissemination of Information Technologies have led to a rapid expansion in the amount of information. If it was difficult to determine a person's knowledge level in the past, nowadays it is almost...
An Exploration of How a Technology-Facilitated Part-Complete Solution Method Supports the Learning of Computer Programming
Introduction Learning to write computer programs is not easy (e.g., du Boulay, 1986; Scholtz & Wiedenbeck, 1992) and this is reflected in the low levels of achievement experienced by many students in first programming courses. For example, Perkins,...
An Exploratory Survey in Collaborative Software in a Graduate Course in Automatic Identification and Data Capture
Introduction Teaching a course remotely will always have challenges associated with it. These challenges typically do not arise from the students' comprehension of the materials, rather the technology used to deliver the course; communication with...
An Information System for a Bauxite Mine
Introduction Bauxite is the raw material for alumina and aluminium production. In 2004, 56.6 million tonnes of bauxite were mined in Australia, the world's largest producer. The Australian aluminium industry directly employs over 16,000 people....
An Integrative View of IS/IT and Organizational Resources and Capabilities
Introduction Information systems and information technologies (IS/IT) have usually been regarded as technological resources. As such, they are supposed to be backed by other elements, namely organizational resources and capabilities, to actually...
Applying and Evaluating Understanding-Oriented ICT User Training in Upper Secondary Education
Introduction ICT (Information and Communication Technology) training courses often do not provide understanding of software on a deeper level than memorizing the correct buttons and menu command to press (Sein, Bostrom & Olfman, 1998). Poor...
Assessing for Competence Need Not Devalue Grades
Introduction Unlike professions like medicine, entry into the IT profession is relatively open. In the early days, most people working in the industry were graduate engineers and computer scientists but, as the industry mushroomed, a variety of...
Automatic Conceptual Analysis for Plagiarism Detection
Introduction Plagiarism is now acknowledged to pose a significant threat to academic integrity. There is a growing array of software packages to help address the problem. Most of these offer a string-oftext comparison. New to emerge are software...
Befriending Computer Programming: A Proposed Approach to Teaching Introductory Programming
Introduction Computer programming is an integral part of a computer science curriculum and a major stumbling block for many computing students, particularly in the first year of study; many of those students find programming difficult to grasp,...
Can Online Tutors Improve the Quality of E-Learning?
Introduction E-learning is a form of learning in which the educational process is supported by information and communication technology (ICT). ICT was first used to support the delivery process in distance education (DE) to overcome the spatial...
College Transformation through Enabling Agility
Introduction Government organizations and universities are among the most traditional and bureaucratic institutions. Yet, in the Information Age agility is a key competency for survival and success. Recognizing the need to be more responsive and...
Concept Maps as a Learning Assessment Tool
Introduction Recent decades have seen an increasing awareness that the adoption of refined procedures of evaluation contributes to the enhancement of the teaching/learning process. In the past, the teacher's evaluation of the pupil was expressed...
Developing a Business Simulation Game: Integrating Multiple Development Tools
Introduction System development in the early twenty first century is a complicated task. Many technologies make up the development and operating environment. Mixtures of procedural and object oriented coding tools, and complex network, operating...
Effect of Windows XP Firewall on Network Simulation and Testing
Introduction Cisco Networking Academy (CNA) is widely used in high schools, colleges, and universities all over the world. The Cisco Networking Academy Programs provide critical skills needed by students to work in the IT field. The program offers...
Evaluating ICT Provision in Selected Communities in South Africa
Introduction Currently the estimated population in South Africa is over 45 million people; of nine provinces of which KZN is regarded as one of the provinces estimated to having the highest percentage (8.8 million-21%) of people in the country (STATSAA,...
Experimenting with eXtreme Teaching Method-Assessing Students' and Teachers' Experiences
Introduction This paper sets out to explore the experiences of students and teachers during the course Implementation of Information Systems in Organizational Context (the Implementation course from now on) that is held annually by the department...
Exploring the Influence of Cultural Values on the Acceptance of Information Technology: An Application of the Technology Acceptance Model
Introduction A fact of life for many companies, foreign and domestic, large and small, is how to be competitive in the global marketplace. This is especially so in the application of information technology to their operations on a global scale....
Finger Length, Digit Ratio and Gender Differences in Sensation Seeking and Internet Self-Efficacy
Introduction Relative finger length, as a surrogate for prenatal hormonal exposure, has been shown to be related to a wide range of psychosocial factors including sporting potential, sexual orientation, personality, faculty membership, cognitive...
Framing the Corporate Security Problem: The Ecology of Security
Introduction Security and information systems are intertwined. The complex interactions and interconnections among people, software applications, networks, operating systems, and organizational policies create myriads of exploitable points. Daily...
How an "Imperative" Is Development Was Saved from a Failing Course of Action-A Case Study
Introduction Many IS development projects end in failure. Some start well but lose their way at some stage during development. However, some systems can be retrieved from impending failure because they are seen by management to be valuable enough...
ICT Strategy in an ICT User Perspective: Exploring Alignment between ICT Users and Managers
Introduction Although researchers have given a lot of attention to information and communication technology (ICT) strategy (Henderson & Venkatraman, 1993, 1999; Reich & Benbasat, 2000), they have mainly focused on the managerial perspectives,...
Information Technology and the Work/cultural Orientations of Americans, Mexicans and Germans
Introduction The importance of Information Technology (IT) on firms has increased significantly within the last two decades. More and more IT has become the tool used by corporations to be more competitive. For example, IT (1) has shortened the...
Intelligent System for Information Security Management: Architecture and Design Issues
Cyber Security Overview The exponential growth of the Internet, the convergence of Internet and wireless multimedia applications and services pose new security challenges (Miller, 2001). Security is a complex system (Volonino, 2004) and must be...
Introducing Students to Business Intelligence: Acceptance and Perceptions of OLAP Software
Introduction In a fast-changing discipline such as information systems, it is important for academics to keep up with major current trends, and to give students both a strong practical and theoretical insight into areas regarded as important by...
Is There a Value Paradox of E-Learning in MBA Programs?
Introduction E-learning has become a strategic necessity for many organizations engaged in education or training (Hiltz & Turoff, 2005; Neumann, 1994). Academic institutions invest money, lecturers spend time and efforts answering students and...
It Is Time to Add Kurdish Culture to VS .NET Globalization
Introduction This paper builds on a previously published paper by the same authors (See Ali & Sulaiman, 2006). During our previous paper we made a case for adding the Kurdish language to Visual Studio .NET (VS .NET) globalization component....
Learning Object Educational Narrative Approach (LOENA): Using Narratives for Dynamic Sequencing of Learning Objects
Learning objects-based architectures often allows the creation of coarse-granular learning resources by aggregating learning objects retrieved mainly from well-structured public repositories. Nonetheless, the learning resource building process is not...
Meta-Analysis of Clinical Cardiovascular Data towards Evidential Reasoning for Cardiovascular Life Cycle Management
Introduction Computers and information technology (IT) have been widely used in medical research, particularly for providing several types of service. A remarkable advantage of IT is that long-term investigation on patient-care, diagnosis and treatment...
MILO-A Proposal of Multiple Intelligences Learning Objects
Introduction The current educational paradigm requires a review on the development processes for elaborating learning objects. The differences between students are, most of the times, not taken into consideration, leading to the creation of inefficient...
Mobile Learning, Cognitive Architecture and the Study of Literature
Introduction This paper investigates the problem of how best to achieve learning outcomes of reading comprehension, recall, critical thinking, and synthesis in the study of literature by incorporating mobile learning that accommodates cognitive...
Multi-Criteria Spatial Analysis of Building Layouts
Introduction Designing building layouts to maximise the space use and improve accessibility inside buildings are important consideration for building designers and architects, and forms an important stage of conceptual building design and client...
Offshore Outsourcing: New Spin or Same Old Business
Introduction Outsourcing is the contracting of various systems functions, such as data entry, programming, facilities management, disaster recovery, and telecommunications management, to outside providers of services. The primary reason that organizations...
On the Relationship between Warranty and the Risk of Information Asymmetry
Introduction The phenomenon of information asymmetry between two parties is observed quite often in our everyday life. It occurs when one of the parties has better understanding, possesses deeper knowledge and is better informed on the subject of...
On the Self-Similar Nature of ATM Network Traffic
Modeling multimedia traffic is an important issue in performance analysis and design of communication networks. With introduction of new applications, the characteristics of data traffic changes. In this paper, a measurement study of ATM Network traffic...
PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns
Introduction As computing power increases, the number and variations of software applications built seem to have no end in sight. For a very large percentage of object-oriented applications, there is a constant need to store and retrieve application...
Prisoners' Attitudes toward Using Distance Education Whilst in Prisons in Saudi Arabia
Introduction Most courtiers around the world, attempt to educate inmates in prison so that they will be something other than inmates during subsequent phases of their lives. Offenders come to prison with much less education than the general population....
Project Based Learning and Learning Environments
Introduction It has been suggested (SCORM 2003) that the uptake of technologies supporting learning objects will depend "on the ability of those technologies to tailor instruction to the needs of individuals". As previously reported (Kurzel 2007),...
Proposal of Blended Orientation of Scientific Works by Comparison Face-to-Face and Online Processes
Introduction The accelerated rhythm of nowadays' technical-scientific trends institutes a knowledge-flow (Levy, 2001) that demands the construction of personal learning paths (Levy, 1997). The development of abilities that allow adaptation of individuals...
SMS Banking Services: A 21st Century Innovation in Banking Technology
Introduction SMS Banking is a Mobile technology that allows you to request and receive banking information from your bank on your mobile phone via Short message service (SMS). Individuals or corporate bodies can manage their bank accounts, check...
Socio-Technical Theory and Knowledge Construction: Towards New Pedagogical Paradigms?
Introduction Socio-technical theory hypothesizes the presence of two subsystems in every organization or corporate; they are the technical sub-system and the social sub-system. Many researchers, notably at the Tavistock Institute in London, while...
Strategic Knowledge of Computer Applications: The Key to Efficient Computer Use
Introduction The human-computer interaction (HCI) research community has focused on the design of computer interfaces that reduce the time taken by end users to learn computer applications. This approach is intended to enable users to perform tasks...
Teaching Mobile Communication in an E-Learning Environment
Introduction Wireless communication technologies provide significant advantages compared to wired technologies. A wireless networks eliminate the need for network cables since wireless radio interfaces are accessed over the air. Wireless networks...
Technology Use, Technology Views: Anticipating ICT Use for Beginning Physical and Health Education Teachers
Introduction Concern is often expressed about the efficacy of pre-service teacher education programs to prepare teachers to use technologies in their practice (Kirschner & Sellinger, 2003; Pearson, 2003). The research study presented in this...
The Concept of an Unstructured Book and the Software to Publish and Read It
Introduction Several years ago, people started to think about the computer as a way to publish--and hence, to read--a book. Some of us regarded this as the creation of a new concept, somewhat more general than a "book" in the traditional sense of...
The Cultural Impact of Information Systems-Through the Eyes of Hofstede-A Critical Journey
Introduction "Undoubtedly, the most significant cross-cultural study of work-related values is the one carried out by Hofstede" (Bhagat & McQuaid, 1982) Much interest has been placed on culture in business in the last two decades, and with...
The Discovery Camp: A Talent Fostering Initiative for Developing Research Capabilities among Undergraduate Students
Introduction One of the critical success factors for a university is its ability to sustain a rich and vibrant research environment. This factor is often demonstrated by a regular listing of high quality research-based publications, a steady stream...
The Educational Potential of Modified Video Games
Introduction Video game playing has become the preferred form of entertainment for countless children. As the number of home consoles and video game players has grown, so has the interest in game-based learning. While "educational" video games have...
The Importance of Partnerships: The Relationship between Small Businesses, ICT and Local Communities
Introduction The use of information and communication technologies--especially the Internet--is often understood to be changing the way that businesses, governments and elements of civil society work. It is a dominant belief that the widespread...
The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town
Introduction Modern computer technology, especially the internet, has led to, and enabled computer and computer related crime to become an issue in today's society. This is clearly illustrated in the 2005 Computer Crime and Security Survey which...
The Various and Conflicting Notions of Information
Introduction Why is it important to address this notion of information? Three main reasons, firstly within the business community the whole premise is that information technology produces something that is useful and of value i.e. information. Secondly,...
Threat Modeling Using Fuzzy Logic Paradigm
Introduction Nowadays, risk analysis plays a significant role in security management efforts. It was explained in Davis et al., 2004 that risk management is a tool that can help in production of secure software. In other words, security risk analysis...
Uniting Idaho: A Small Newspaper Serves Hispanic Populations in Distributed Rural Areas
Introduction The mass media are agencies for the development of cultural perspectives for ethnic groups in the United States (Rios & Gaines, 1998, p. 746). Among the fastest-growing minority ethnic populations are Hispanics, who account for...
Users' Learning of Principles of Computer Operations
Introduction Users need to know the technology in addition to how it can be utilized in their work. The latter has been emphasized since Orlikowski's (1992) studies of the non use of groupware due to lack of training in how computer tools can be...
Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning
Introduction Universities in the USA and worldwide are taking a critical look at their educational systems. A recent US national panel (Greater expectations report, 2002) calls for a dramatic reorganization of undergraduate education to ensure that...
Valuing IS/IT Resources as an Antecedent of Absorptive Capacity: An RBV Perspective
Introduction Strategic relevance of knowledge has been widely recognized for about two decades (Grant, 1996b; Nonaka, 1991; Sambamurthy, Bharadwaj, & Grover, 2003). The increased interest on knowledge has focused organizations on skills that...
Author Advanced search

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.