ty Does Technology Impact on Teaching Styles or Do Teaching Styles Impact on Technology in the Delivery of Higher Education? By Published On :: Full Article
ty Information Quality: The Relationship to Recruitment in Pre-Tertiary IT Education By Published On :: Full Article
ty Development and Validation of an Instrument for Assessing Users’ Views about the Usability of Digital Libraries By Published On :: Full Article
ty An Assessment of Software Project Management Maturity in Mauritius By Published On :: Full Article
ty Performance Analysis of Double Buffer Technique (DBT) Model for Mobility Support in Wireless IP Networks By Published On :: Full Article
ty Resistance to Electronic Medical Records (EMRs): A Barrier to Improved Quality of Care By Published On :: Full Article
ty ISExpertNet: Facilitating Knowledge Sharing in the Information Systems Academic Community By Published On :: Full Article
ty Web Triad: the Impact of Web Portals on Quality of Institutions of Higher Education - Case Study of Faculty of Economics, University of Ljubljana, Slovenia By Published On :: Full Article
ty Establishing the IT Student’s Perspective to e-Learning: Preliminary Findings from a Queensland University of Technology Case Study By Published On :: Full Article
ty Analysis of Information Systems Management (post)Graduate Program: Case Study of Faculty of Economics, University of Ljubljana, Slovenia By Published On :: Full Article
ty Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization By Published On :: Full Article
ty Modeling Human Activity Systems for Collaborative Project Development: An IS Development Perspective By Published On :: Full Article
ty Quality of Informing: Bias and Disinformation Philosophical Background and Roots By Published On :: Full Article
ty Where Else Have You Been? The Effects of Diaspora Consciousness and Transcultural Mixtures on Ethnic Identity By Published On :: Full Article
ty Information Systems Field at the Forks: Relish Diversity or Perish By Published On :: Full Article
ty Video Learning Object Application System: Beyond the Static Reusability By Published On :: Full Article
ty Information Access for Development: A Case Study at a Rural Community Centre in South Africa By Published On :: Full Article
ty Getting Practical With Learning Styles In “Live” and Computer-based Training Settings By Published On :: Full Article
ty Role of Perceived Importance of Information Security: An Exploratory Study of Middle School Children’s Information Security Behavior By Published On :: Full Article
ty Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration By Published On :: Full Article
ty A Multi-Criteria Based Approach to Prototyping Urban Road Networks By Published On :: Full Article
ty Valuing IS/IT Resources as an Antecedent of Absorptive Capacity: An RBV Perspective By Published On :: Full Article
ty On the Relationship between Warranty and the Risk of Information Asymmetry By Published On :: Full Article
ty Accreditation of Monash University Software Engineering (MUSE) Program By Published On :: Full Article
ty The Need for and Contents of a Course in Forensic Information Systems & Computer Science at the University of Cape Town By Published On :: Full Article
ty Intelligent System for Information Security Management: Architecture and Design By Published On :: Full Article
ty Warranty and the Risk of Misinforming: Evaluation of the Degree of Acceptance By Published On :: Full Article
ty In Search of New Identity for LIS Discipline, with Some References to Iran By Published On :: Full Article
ty Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda By Published On :: Full Article
ty A Framework for Information Security Management Based on Guiding Standards: A United States Perspective By Published On :: Full Article
ty SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security By Published On :: Full Article
ty DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography By Published On :: Full Article
ty Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption By Published On :: Full Article
ty The Role of Management Games in Mapping Learning Styles to Elements of Business Know-How Acquisition: A Case Study By Published On :: Full Article
ty Analysing Socio-Demographic Differences in Access and Use of ICTs in Nigeria Using the Capability Approach By Published On :: Full Article
ty University Enhancement System using a Social Networking Approach: Extending E-learning By Published On :: Full Article
ty The Work Readiness of Master of Information Systems International Students at an Australian University: A Pilot Study By Published On :: Full Article