f

Adding a new Language to VB .NET Globalization: Making the Case for the Kurdish Languages




f

Performance Modeling of UDP Over IP-Based Wireline and Wireless Networks




f

Mobile Learning, Cognitive Architecture and the Study of Literature




f

The Concept of an Unstructured Book and the Software to Publish and Read it




f

Multi-Criteria Spatial Analysis of Building Layouts




f

PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns




f

Effect of Windows XP Firewall on Network Simulation and Testing




f

The Importance of Partnerships: The Relationship between Small Businesses, ICT and Local Communities




f

Evaluating ICT Provision in Selected Communities in South Africa




f

College Transformation through Enabling Agility




f

Finger Length, Digit Ratio and Gender Differences in Sensation Seeking and Internet Self-Efficacy




f

The Various and Conflicting Notions of Information




f

Meta-Analysis of Clinical Cardiovascular Data towards Evidential Reasoning for Cardiovascular Life Cycle Management




f

On the Self-Similar Nature of ATM Network Traffic




f

An Integrative View of IS/IT and Organizational Resources and Capabilities




f

Automatic Conceptual Analysis for Plagiarism Detection




f

The Interface between Technological Protection Measures and the Exemptions to Copyright under Article 6 Paragraph 4 of the Infosoc Directive and Section 1201 of the Digital Millennium Copyright Act




f

Learning Object Educational Narrative Approach (LOENA): Using Narratives for Dynamic Sequencing of Learning Objects




f

MILO – A Proposal of Multiple Intelligences Learning Objects




f

Advancing Sustainability of Open Educational Resources




f

The Educational Potential of Modified Video Games




f

An Exploration of How a Technology-Facilitated Part-Complete Solution Method Supports the Learning of Computer Programming




f

Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning




f

Valuing IS/IT Resources as an Antecedent of Absorptive Capacity: An RBV Perspective




f

Exploring the Influence of Cultural Values on the Acceptance of Information Technology:  An Application of the Technology Acceptance Model




f

Information Technology and the Work/Cultural Orientations of Americans, Mexicans, and Germans




f

The Cultural Impact of Information Systems – Through the Eyes of Hofstede – A Critical Journey




f

How an “Imperative” IS Development was Saved from a Failing Course of Action – A Case Study




f

Analyzing the Affect of Culture on Curricular Content: A Research Conception




f

Assessing for Competence Need Not Devalue Grades




f

A Comparative Analysis of Common E-Portfolio Features and Available Platforms




f

An Architecture of a Computer Learning Environment for Mapping the Student’s Knowledge Level




f

Users’ Learning of Principles of Computer Operations




f

Befriending Computer Programming: A Proposed Approach to Teaching Introductory Programming




f

Strategic Knowledge of Computer Applications: The Key to Efficient Computer Use




f

Technology Use, Technology Views: Anticipating ICT Use for Beginning Physical and Health Education Teachers




f

Offshore Outsourcing: New Spin Or Same Old Business




f

On the Relationship between Warranty and the Risk of Information Asymmetry




f

The Discovery Camp: A Talent Fostering Initiative for Developing Research Capabilities among Undergraduate Students




f

Can Online Tutors Improve the Quality of E-Learning?




f

Blended Proposal of Orientation Scientific Works by Comparison Face-to-Face and Online Processes




f

A Model of Introducing e-Learning System at Vocational College for Business Secretaries




f

Is There a Value Paradox of E-learning in MBA Programs?




f

An Exploratory Survey in Collaborative Software in a Graduate Course in Automatic Identification and Data Capture




f

Introducing Students to Business Intelligence: Acceptance and Perceptions of OLAP Software




f

An Information System for a Bauxite Mine




f

Accreditation of Monash University Software Engineering (MUSE) Program




f

The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town




f

Threat Modeling Using Fuzzy Logic Paradigm




f

Framing the Corporate Security Problem: The Ecology of Security