age

Accommodating Soft Skills in Software Project Management




age

An Assessment of Software Project Management Maturity in Mauritius




age

Software Quality Management supported by Software Agent




age

Information Transfer in Supply Chain Management




age

Discipline Formation in Information Management: Case Study of Scientific and Technological Information Services




age

Design, Development and Deployment Considerations when Applying Native XML Database Technology to the Programme Management Function of an SME




age

Analysis of Information Systems Management (post)Graduate Program: Case Study of Faculty of Economics, University of Ljubljana, Slovenia




age

The Application of Semantic Enablers in the Context of Content Management Systems 




age

M-Learning Management Tool Development in Campus-Wide Environment




age

Principals, Agents and Prisoners: An Economical Perspective on Information Systems Development Practice




age

Software Agents for Managing Learning Plans




age

Adding a new Language to VB .NET Globalization: Making the Case for the Kurdish Languages




age

Remote Method Invocation and Mobil Agent: A Comparative Analysis




age

ICT Strategy in an ICT User Perspective: Exploring Alignment between ICT Users and Managers




age

Meta-Analysis of Clinical Cardiovascular Data towards Evidential Reasoning for Cardiovascular Life Cycle Management




age

Intelligent System for Information Security Management: Architecture and Design




age

Efficient Consumer Response (ECR) Practices as Responsible for the Creation of Knowledge and Sustainable Competitive Advantages in the Grocery Industry




age

Is Usage Predictable Using Belief-Attitude-Intention Paradigm?




age

Developing a Model of Next Generation Knowledge Management




age

IS Strategic Decision-Making: A Garbage Can View




age

Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises:  A Research Agenda




age

A Framework for Information Security Management Based on Guiding Standards: A United States Perspective




age

IT Control Objectives for Implementing the Public Finance Management Act in South Africa




age

Highs and Lows of Implementing a Management Strategy Eliminating ‘Free Passengers’ in Group Projects




age

Modified Watershed Algorithm for Segmentation of 2D Images




age

Age and ICT-Related Behaviours of Higher Education Teachers in Nigeria




age

Soft Skills and Technical Expertise of Effective Project Managers




age

A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems




age

Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol




age

The Role of Management Games in Mapping Learning Styles to Elements of Business Know-How Acquisition: A Case Study




age

Agent-Based Advert Placement System for Broadcasting Stations




age

The Risk of Misinforming for Competing Messages




age

IT Systems Development: An IS Curricula Course that Combines Best Practices of Project Management and Software Engineering




age

Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers




age

Knowledge Management Curriculum Development: Linking with Real Business Needs




age

WWW Image Searching Delivers High Precision and No Misinformation: Reality or Ideal?




age

Web Design and Company Image




age

Using a Learning Management System to Foster Independent Learning in an Outcome-Based University: A Gulf Perspective




age

The Communication System in Project Teams: Problems of Transfer of Knowledge and Information for the Management of IT Projects




age

Making a Case for Change Management Theory to Support IS/IT Curriculum Innovation




age

How Business Departments Manage the Requirements Engineering Process in Information Systems Projects in Small and Medium Enterprises




age

Transitioning from Data Storage to Data Curation: The Challenges Facing an Archaeological Institution




age

WoT (Web of Things) for Energy Management in a Smart Grid-Connected Home




age

Multi-Agent Framework for Social Customer Relationship Management Systems




age

Project Management Principles Applied in Academic Research Projects




age

Do Operating Systems Affect Perceptions of Smartphone Advantages and Drawbacks?




age

Characterizing Big Data Management

Big data management is a reality for an increasing number of organizations in many areas and represents a set of challenges involving big data modeling, storage and retrieval, analysis and visualization. However, technological resources, people and processes are crucial to facilitate the management of big data in any kind of organization, allowing information and knowledge from a large volume of data to support decision-making. Big data management can be supported by these three dimensions: technology, people and processes. Hence, this article discusses these dimensions: the technological dimension that is related to storage, analytics and visualization of big data; the human aspects of big data; and, in addition, the process management dimension that involves in a technological and business approach the aspects of big data management.




age

The Elements Way: Empowering Parents, Educators, and Mentors in the Age of New Media

Aim/Purpose: This study was designed to examine the effectiveness of mentor’s work with immigrant children and adolescents at risk, using the Elements Way. Background: The New Media offers our “screen kids” a lot of information, many behavioral models, and a new type of social communication. The Elements Way is an educational method designed to enhance openness, development, breakthroughs, goal achievement, and transformation in the age of media and social networks. Methodology: The Elements Way was developed following research on communication in the diversified media, especially new media such as Facebook, WhatsApp, and television reality shows, and the study is an examination of the effectiveness of mentors’ work with immigrant children and adolescents at risk, using the Elements Way. All mentors had been trained in the Elements Way. The study population included 640 mentors working with immigrants’ children in Israel. The work was conducted in 2010-2013. The mixed-methods approach was selected to validate findings. Contribution: Empowering children and enhancing their ability to cope; Creating openness and sharing, making children more attentive to the significant adults in their lives; Supporting children who face the complex reality that characterizes our age. Findings: Significant differences were found in the mentors’ conduct with the children. Work programs were designed and implemented with care and consistency, and mentors succeeded in generating change within the children and achieving desired goals. Of the 640 participating mentors, 62 were not able to promote the child, and interviews with them revealed that their work with the children was not consistent with the Elements Way and began from a different vantage point. Recommendations for Practitioners: Success factors: Self-awareness and awareness of one’s surroundings. Empathy. Willingness to engage in significant interactions. Self-cleansing and self-reflection. Ability to engage in a personal and interpersonal dialogue. Ability to accept and contain the child. Cooperation with the child in creating a work program and assisting the child to achieve the goals that were set in the program. Recommendation for Researchers: Future studies should focus on analyzing the discussions of children and adolescents, to add depth to our insights regarding children and adolescents’ perception of the mentors’ work from their perspective. Impact on Society: Finding the “keys” to openness, development, goal achievement, and transformation in our work with “screen kids.” Future Research: Studies that are designed to examine the effectiveness of mentor’s work with immigrant children and adolescents at risk, using the Elements Way.




age

From Ignorance Map to Informing PKM4E Framework: Personal Knowledge Management for Empowerment

Aim/Purpose: The proposed Personal Knowledge Management (PKM) for Empowerment (PKM4E) Framework expands on the notions of the Ignorance Map and Matrix to support the educational and informing concept of a PKM system-in-progress. Background: The accelerating information abundance is depleting the very attention our cognitive capabilities are able to master, contributing to widening individual and collective opportunity divides. Support is urgently needed to benefit Knowledge Workers irrespective of space (developed/developing countries), time (study or career phase), discipline (natural or social science), or role (student, professional, leader). Methodology: The Design Science Research (DSR) project conceptualizing the PKM System (PKMS) aims to support a scenario of a ‘Decentralizing KM Revolution’ giving more power and autonomy to individuals and self-organized groups. Contribution: The informing-science-related approach synthesizes and visualizes concepts related to ignorance and entropy, learning and innovation, chance discovery and abduction to inform diverse audiences and potential beneficiaries. Findings: see Recommendation for Researchers Recommendations for Practitioners: The PKM4E learning cycles and workflows apply ‘cumulative synthesis’, a concept which convincingly couples the activities of researchers and entrepreneurs and assists users to advance their capability endowments via applied learning. Recommendation for Researchers: In substituting document-centric with meme-based knowledge bases, the PKMS approach merges distinctive voluntarily shared knowledge objects/assets of diverse disciplines into a single unified digital knowledge repository and provides the means for advancing current metrics and reputation systems. Impact on Society: The PKMS features provide the means to tackle the widening opportunity divides by affording knowledge workers with continuous life-long support from trainee, student, novice, or mentee towards professional, expert, mentor, or leader. Future Research: After completing the test phase of the PKMS prototype, its transformation into a viable PKM system and cloud-based server based on a rapid development platform and a noSQL-database is estimated to take 12 months.




age

Medical Image Security Using Quantum Cryptography

Aim/Purpose: Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background: One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology : Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message encryption and authentication. Contribution: This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings: This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred Recommendations for Practitioners: This security mechanism is recommended for healthcare providers and practitioners to ensure the privacy of patients’ medical information. Recommendation for Researchers: This paper opens a new chapter in secured medical records Impact on Society Quantum key distribution promises network security based on the fundamental laws of quantum mechanics by solving the problems of secret-key cryptography . Future Research: The use of post-quantum cryptography can be further researched.