Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Business

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp Dec 2011

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp

Eileen O'Donnell

User feedback is very important in all areas of computer science especially in the development of computer applications. Hence, student feedback on the use of technology enhanced learning in higher education in Ireland is relevant to the quality of the learning resources to be created by learning designers and academics in the future. The book “Student Reactions to Learning with Technologies: Perceptions and Outcomes” (Moyle & Wijngaards, 2012) was published by IGI Global in October 2011. This book includes contributions from various authors who are interested in students’ feedback regarding how technology has impacted on their educational experience. This book …


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Innovation Engine, Arcot Desai Narasimhalu Jan 2011

Innovation Engine, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.


Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu Jan 2011

Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.


Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu Jan 2011

Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.


Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani Jan 2011

Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani

Arcot Desai NARASIMHALU

XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.


Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson Dec 2010

Applicability Of Web 2.0: Training For Tactical Military Applications, Maurice Dawson

Maurice Dawson

This paper is a report on the findings of a study conducted on a doctoral level virtual course utilizing Second Life for usability and interaction. The project from this course allowed for further exploration of training servicemen from other nations in decision making techniques to include a level of familiarization with various technologies. As Second Life is a low cost tool this could prove invaluable to offset training costs to involve getting servicemen to understand technologies through simulation. Currently the available tools are costly and as government looks for ways to save costs Second Life can prove to be a …


Clustering Algorithm Identification System Using Wavelet Transform, Philadelphia University Dec 2010

Clustering Algorithm Identification System Using Wavelet Transform, Philadelphia University

Philadelphia University, Jordan

No abstract provided.