se

Oracle Database Workload Performance Measurement and Tuning Toolkit




se

Processes for Ex-ante Evaluation of IT Projects - Case Studies in Brazilian Companies




se

Strategies to Enhance Student Learning in a Capstone MIS Course




se

E-learning: Incorporating Information Security Governance




se

Information Access for Development: A Case Study at a Rural Community Centre in South Africa




se

What Makes Valuable Pre-experience for Students Entering Programming Courses?    




se

The Development, Use and Evaluation of a Program Design Tool in the Learning and Teaching of Software Development




se

Getting Practical With Learning Styles In “Live” and Computer-based Training Settings 




se

Information Systems Success in the Public Sector: Stakeholders' Perspectives and Emerging Alignment Model




se

Development of the Web Users Self-Efficacy Scale (WUSE)




se

Will It Work? An Initial Examination of the Processes and Outcomes of Converting Course Materials to CD-ROMs




se

A Measure of Risk Caused by Information Asymmetry in e-Commerce




se

Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior




se

Semantics, Ontologies and Information Systems in Education: Concerns and Proposals 




se

Reflecting on an Adventure-Based Data Communications Assignment: The ‘Cryptic Quest’ 




se

Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration 




se

Adding a new Language to VB .NET Globalization: Making the Case for the Kurdish Languages




se

Performance Modeling of UDP Over IP-Based Wireline and Wireless Networks




se

A Multi-Criteria Based Approach to Prototyping Urban Road Networks




se

The Importance of Partnerships: The Relationship between Small Businesses, ICT and Local Communities




se

Evaluating ICT Provision in Selected Communities in South Africa




se

Finger Length, Digit Ratio and Gender Differences in Sensation Seeking and Internet Self-Efficacy




se

ICT Strategy in an ICT User Perspective: Exploring Alignment between ICT Users and Managers




se

On the Self-Similar Nature of ATM Network Traffic




se

The Interface between Technological Protection Measures and the Exemptions to Copyright under Article 6 Paragraph 4 of the Infosoc Directive and Section 1201 of the Digital Millennium Copyright Act




se

Learning Object Educational Narrative Approach (LOENA): Using Narratives for Dynamic Sequencing of Learning Objects




se

Experimenting with eXtreme Teaching Method – Assessing Students’ and Teachers’ Experiences




se

Project Based Learning and Learning Environments




se

Applying and Evaluating Understanding-Oriented ICT User Training in Upper Secondary Education




se

Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning




se

How an “Imperative” IS Development was Saved from a Failing Course of Action – A Case Study




se

Analyzing the Affect of Culture on Curricular Content: A Research Conception




se

Uniting Idaho:  A Small Newspaper Serves Hispanic Populations in Distributed Rural Areas




se

Assessing for Competence Need Not Devalue Grades




se

Concept Maps as a Learning Assessment Tool




se

Users’ Learning of Principles of Computer Operations




se

Befriending Computer Programming: A Proposed Approach to Teaching Introductory Programming




se

Strategic Knowledge of Computer Applications: The Key to Efficient Computer Use




se

Technology Use, Technology Views: Anticipating ICT Use for Beginning Physical and Health Education Teachers




se

SMS Banking Services: A 21st Century Innovation in Banking Technology




se

The Discovery Camp: A Talent Fostering Initiative for Developing Research Capabilities among Undergraduate Students




se

Blended Proposal of Orientation Scientific Works by Comparison Face-to-Face and Online Processes




se

A Model of Introducing e-Learning System at Vocational College for Business Secretaries




se

An Exploratory Survey in Collaborative Software in a Graduate Course in Automatic Identification and Data Capture




se

Accreditation of Monash University Software Engineering (MUSE) Program




se

The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town




se

Framing the Corporate Security Problem: The Ecology of Security




se

Intelligent System for Information Security Management: Architecture and Design




se

Object-Oriented Hypermedia Design and J2EE Technology for Web-based Applications




se

Informing through User-Centered Exploratory Search and Human-Computer Interaction Strategies