age An Assessment of Software Project Management Maturity in Mauritius By Published On :: Full Article
age Discipline Formation in Information Management: Case Study of Scientific and Technological Information Services By Published On :: Full Article
age Design, Development and Deployment Considerations when Applying Native XML Database Technology to the Programme Management Function of an SME By Published On :: Full Article
age Analysis of Information Systems Management (post)Graduate Program: Case Study of Faculty of Economics, University of Ljubljana, Slovenia By Published On :: Full Article
age The Application of Semantic Enablers in the Context of Content Management Systems By Published On :: Full Article
age M-Learning Management Tool Development in Campus-Wide Environment By Published On :: Full Article
age Principals, Agents and Prisoners: An Economical Perspective on Information Systems Development Practice By Published On :: Full Article
age Adding a new Language to VB .NET Globalization: Making the Case for the Kurdish Languages By Published On :: Full Article
age ICT Strategy in an ICT User Perspective: Exploring Alignment between ICT Users and Managers By Published On :: Full Article
age Meta-Analysis of Clinical Cardiovascular Data towards Evidential Reasoning for Cardiovascular Life Cycle Management By Published On :: Full Article
age Intelligent System for Information Security Management: Architecture and Design By Published On :: Full Article
age Efficient Consumer Response (ECR) Practices as Responsible for the Creation of Knowledge and Sustainable Competitive Advantages in the Grocery Industry By Published On :: Full Article
age Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda By Published On :: Full Article
age A Framework for Information Security Management Based on Guiding Standards: A United States Perspective By Published On :: Full Article
age IT Control Objectives for Implementing the Public Finance Management Act in South Africa By Published On :: Full Article
age Highs and Lows of Implementing a Management Strategy Eliminating ‘Free Passengers’ in Group Projects By Published On :: Full Article
age Age and ICT-Related Behaviours of Higher Education Teachers in Nigeria By Published On :: Full Article
age Soft Skills and Technical Expertise of Effective Project Managers By Published On :: Full Article
age A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems By Published On :: Full Article
age Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol By Published On :: Full Article
age The Role of Management Games in Mapping Learning Styles to Elements of Business Know-How Acquisition: A Case Study By Published On :: Full Article
age IT Systems Development: An IS Curricula Course that Combines Best Practices of Project Management and Software Engineering By Published On :: Full Article
age Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers By Published On :: Full Article
age Knowledge Management Curriculum Development: Linking with Real Business Needs By Published On :: Full Article
age WWW Image Searching Delivers High Precision and No Misinformation: Reality or Ideal? By Published On :: Full Article
age Using a Learning Management System to Foster Independent Learning in an Outcome-Based University: A Gulf Perspective By Published On :: Full Article
age The Communication System in Project Teams: Problems of Transfer of Knowledge and Information for the Management of IT Projects By Published On :: Full Article
age Making a Case for Change Management Theory to Support IS/IT Curriculum Innovation By Published On :: Full Article
age How Business Departments Manage the Requirements Engineering Process in Information Systems Projects in Small and Medium Enterprises By Published On :: Full Article
age Transitioning from Data Storage to Data Curation: The Challenges Facing an Archaeological Institution By Published On :: Full Article
age WoT (Web of Things) for Energy Management in a Smart Grid-Connected Home By Published On :: Full Article
age Multi-Agent Framework for Social Customer Relationship Management Systems By Published On :: Full Article
age Project Management Principles Applied in Academic Research Projects By Published On :: Full Article
age Do Operating Systems Affect Perceptions of Smartphone Advantages and Drawbacks? By Published On :: Full Article
age Characterizing Big Data Management By Published On :: 2015-06-03 Big data management is a reality for an increasing number of organizations in many areas and represents a set of challenges involving big data modeling, storage and retrieval, analysis and visualization. However, technological resources, people and processes are crucial to facilitate the management of big data in any kind of organization, allowing information and knowledge from a large volume of data to support decision-making. Big data management can be supported by these three dimensions: technology, people and processes. Hence, this article discusses these dimensions: the technological dimension that is related to storage, analytics and visualization of big data; the human aspects of big data; and, in addition, the process management dimension that involves in a technological and business approach the aspects of big data management. Full Article
age The Elements Way: Empowering Parents, Educators, and Mentors in the Age of New Media By Published On :: 2017-04-24 Aim/Purpose: This study was designed to examine the effectiveness of mentor’s work with immigrant children and adolescents at risk, using the Elements Way. Background: The New Media offers our “screen kids” a lot of information, many behavioral models, and a new type of social communication. The Elements Way is an educational method designed to enhance openness, development, breakthroughs, goal achievement, and transformation in the age of media and social networks. Methodology: The Elements Way was developed following research on communication in the diversified media, especially new media such as Facebook, WhatsApp, and television reality shows, and the study is an examination of the effectiveness of mentors’ work with immigrant children and adolescents at risk, using the Elements Way. All mentors had been trained in the Elements Way. The study population included 640 mentors working with immigrants’ children in Israel. The work was conducted in 2010-2013. The mixed-methods approach was selected to validate findings. Contribution: Empowering children and enhancing their ability to cope; Creating openness and sharing, making children more attentive to the significant adults in their lives; Supporting children who face the complex reality that characterizes our age. Findings: Significant differences were found in the mentors’ conduct with the children. Work programs were designed and implemented with care and consistency, and mentors succeeded in generating change within the children and achieving desired goals. Of the 640 participating mentors, 62 were not able to promote the child, and interviews with them revealed that their work with the children was not consistent with the Elements Way and began from a different vantage point. Recommendations for Practitioners: Success factors: Self-awareness and awareness of one’s surroundings. Empathy. Willingness to engage in significant interactions. Self-cleansing and self-reflection. Ability to engage in a personal and interpersonal dialogue. Ability to accept and contain the child. Cooperation with the child in creating a work program and assisting the child to achieve the goals that were set in the program. Recommendation for Researchers: Future studies should focus on analyzing the discussions of children and adolescents, to add depth to our insights regarding children and adolescents’ perception of the mentors’ work from their perspective. Impact on Society: Finding the “keys” to openness, development, goal achievement, and transformation in our work with “screen kids.” Future Research: Studies that are designed to examine the effectiveness of mentor’s work with immigrant children and adolescents at risk, using the Elements Way. Full Article
age From Ignorance Map to Informing PKM4E Framework: Personal Knowledge Management for Empowerment By Published On :: 2018-05-18 Aim/Purpose: The proposed Personal Knowledge Management (PKM) for Empowerment (PKM4E) Framework expands on the notions of the Ignorance Map and Matrix to support the educational and informing concept of a PKM system-in-progress. Background: The accelerating information abundance is depleting the very attention our cognitive capabilities are able to master, contributing to widening individual and collective opportunity divides. Support is urgently needed to benefit Knowledge Workers irrespective of space (developed/developing countries), time (study or career phase), discipline (natural or social science), or role (student, professional, leader). Methodology: The Design Science Research (DSR) project conceptualizing the PKM System (PKMS) aims to support a scenario of a ‘Decentralizing KM Revolution’ giving more power and autonomy to individuals and self-organized groups. Contribution: The informing-science-related approach synthesizes and visualizes concepts related to ignorance and entropy, learning and innovation, chance discovery and abduction to inform diverse audiences and potential beneficiaries. Findings: see Recommendation for Researchers Recommendations for Practitioners: The PKM4E learning cycles and workflows apply ‘cumulative synthesis’, a concept which convincingly couples the activities of researchers and entrepreneurs and assists users to advance their capability endowments via applied learning. Recommendation for Researchers: In substituting document-centric with meme-based knowledge bases, the PKMS approach merges distinctive voluntarily shared knowledge objects/assets of diverse disciplines into a single unified digital knowledge repository and provides the means for advancing current metrics and reputation systems. Impact on Society: The PKMS features provide the means to tackle the widening opportunity divides by affording knowledge workers with continuous life-long support from trainee, student, novice, or mentee towards professional, expert, mentor, or leader. Future Research: After completing the test phase of the PKMS prototype, its transformation into a viable PKM system and cloud-based server based on a rapid development platform and a noSQL-database is estimated to take 12 months. Full Article
age Medical Image Security Using Quantum Cryptography By Published On :: 2018-05-18 Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched. Full Article