io The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town By Published On :: Full Article
io Intelligent System for Information Security Management: Architecture and Design By Published On :: Full Article
io Socio-Technical Theory and Knowledge Construction: Towards New Pedagogical Paradigms? By Published On :: Full Article
io Object-Oriented Hypermedia Design and J2EE Technology for Web-based Applications By Published On :: Full Article
io Informing through User-Centered Exploratory Search and Human-Computer Interaction Strategies By Published On :: Full Article
io Warranty and the Risk of Misinforming: Evaluation of the Degree of Acceptance By Published On :: Full Article
io The Theory of Infoledge: A Logical, Mathematical, and Geometrical Interpretation By Published On :: Full Article
io Sustaining Negotiated QoS in Connection Admission Control for ATM Networks Using Fuzzy Logic Techniques By Published On :: Full Article
io Efficient Consumer Response (ECR) Practices as Responsible for the Creation of Knowledge and Sustainable Competitive Advantages in the Grocery Industry By Published On :: Full Article
io Assessment of School Information System Utilization in the UAE Primary Schools By Published On :: Full Article
io Use of the Normalized Word Vector Approach in Document Classification for an LKMC By Published On :: Full Article
io Design, Development, and Implementation of an Open Source Learning Object Repository (OSLOR) By Published On :: Full Article
io An Evolving Road Map: Student Perceptions and Contributions to Graphic Organizers within an Academic Wiki By Published On :: Full Article
io The Social Cost of the Integration of Information and Communication Technologies, Information, Education, and Communication on the Young of the Republic of Mauritius By Published On :: Full Article
io Interweaving Rubrics in Information Systems Program Assessments- Experiences from Action Research at Two Universities By Published On :: Full Article
io Linking Theory, Practice and System-Level Perception: Using a PBL Approach in an Operating Systems Course By Published On :: Full Article
io The Development of Students Geometrical Thinking through Transformational Processes and Interaction Techniques in a Dynamic Geometry Environment By Published On :: Full Article
io Improving Progression and Satisfaction Rates of Novice Computer Programming Students through ACME – Analogy, Collaboration, Mentoring, and Electronic Support By Published On :: Full Article
io Open Online Assignment Submission: First Year Students’ Behavior and Views By Published On :: Full Article
io Proposal of an Instructional Design for Teaching the Requirement Process for Designing Information Systems By Published On :: Full Article
io A Longitudinal Analysis of the Effects of Instructional Strategies on Student Performance in Traditional and E-Learning Formats By Published On :: Full Article
io Impact of Motivation on Intentions in Online Learning: Canada vs China By Published On :: Full Article
io Curriculum Change and the Evolution of Postgraduate e-Business Subjects By Published On :: Full Article
io Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda By Published On :: Full Article
io A Framework for Information Security Management Based on Guiding Standards: A United States Perspective By Published On :: Full Article
io The Energy Inefficiency of Office Computing and Potential Emerging Technology Solutions By Published On :: Full Article
io Age and ICT-Related Behaviours of Higher Education Teachers in Nigeria By Published On :: Full Article
io DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography By Published On :: Full Article
io Evaluation of a Suite of Metrics for Component Based Software Engineering (CBSE) By Published On :: Full Article
io Will Information-Communications Systems Survive? Web 2.x and SocNet as Placebos or Real Internet Survival Kit By Published On :: Full Article
io A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems By Published On :: Full Article
io Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption By Published On :: Full Article
io A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) By Published On :: Full Article
io Informing Clients through Information Communication Technology in Health Care Systems By Published On :: Full Article
io The LIS Discipline or Retrieval Of Information: A Theoretical Viewpoint By Published On :: Full Article
io Influence on Student Academic Behaviour through Motivation, Self-Efficacy and Value-Expectation: An Action Research Project to Improve Learning By Published On :: Full Article