r

Teaching in Virtual Worlds: Opportunities and Challenges




r

The Effect of Student Background in E-Learning — Longitudinal Study




r

Curriculum Change and the Evolution of Postgraduate e-Business Subjects




r

Training Information Brokers: A Curriculum Model




r

Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises:  A Research Agenda




r

Comparing Two Program Contents with IT2005 Body of Knowledge




r

A Framework for Information Security Management Based on Guiding Standards: A United States Perspective




r

IT Control Objectives for Implementing the Public Finance Management Act in South Africa




r

In Search of SecondLife Nirvana




r

Highs and Lows of Implementing a Management Strategy Eliminating ‘Free Passengers’ in Group Projects




r

SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security




r

Modified Watershed Algorithm for Segmentation of 2D Images





r

Study of Polish Women’s Web Portals




r

Capturing the Mature Traveler: Assessing Web First Impressions




r

Compiler-Aided Run-Time Performance Speed-Up in Super-Scalar Processor




r

M-Government Services Initiatives in Oman




r

Using Digital Video Game in Service Learning Projects




r

The Energy Inefficiency of Office Computing and Potential Emerging Technology Solutions




r

Emotion-Aware Education and Research Systems




r

Age and ICT-Related Behaviours of Higher Education Teachers in Nigeria




r

Usability Issues in Mobile-Wireless Information Systems




r

DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography




r

Evaluation of a Suite of Metrics for Component Based Software Engineering (CBSE)




r

Soft Skills and Technical Expertise of Effective Project Managers




r

Aligning Efficacy Beliefs and Competence: A Framework for Developing Technical Knowledge




r

Components- Based Access Control Architecture




r

Will Information-Communications Systems Survive? Web 2.x and SocNet as Placebos or Real Internet Survival Kit




r

A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems




r

Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption




r

A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS)




r

Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol




r

Risk Assessment of Information Technology Systems




r

Informing Clients through Information Communication Technology in Health Care Systems




r

The LIS Discipline or Retrieval Of Information: A Theoretical Viewpoint




r

Innovation and Scaling up Agile Software Engineering Projects




r

Influence on Student Academic Behaviour through Motivation, Self-Efficacy and Value-Expectation: An Action Research Project to Improve Learning




r

The Role of Management Games in Mapping Learning Styles to Elements of Business Know-How Acquisition: A Case Study




r

A Conceptual Model for Learning to Program in Introductory Programming Courses




r

Novel Phonetic Name Matching Algorithm with a Statistical Ontology for Analysing Names Given in Accordance with Thai Astrology




r

Analysing Socio-Demographic Differences in Access and Use of ICTs in Nigeria Using the Capability Approach




r

Digital Divide: The Case of Developing Countries




r

A Data Driven Conceptual Analysis of Globalization — Cultural Affects and Hofstedian Organizational Frames: The Slovak Republic Example




r

E-Portfolios for Integrated Reflection




r

Modeling an Assessing Rubric: Reflections of Red Ink




r

Community Living Lab as a Collaborative Innovation Environment




r

Assessment of Nigerian Teacher Educators’ ICT Training




r

Ownership Influences on Vertical B2B E-marketplaces’ Survival




r

Agent-Based Advert Placement System for Broadcasting Stations




r

The Adoption of Automatic Teller Machines in Nigeria: An Application of the Theory of Diffusion of Innovation