Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Business

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp Dec 2011

Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp

Eileen O'Donnell

User feedback is very important in all areas of computer science especially in the development of computer applications. Hence, student feedback on the use of technology enhanced learning in higher education in Ireland is relevant to the quality of the learning resources to be created by learning designers and academics in the future. The book “Student Reactions to Learning with Technologies: Perceptions and Outcomes” (Moyle & Wijngaards, 2012) was published by IGI Global in October 2011. This book includes contributions from various authors who are interested in students’ feedback regarding how technology has impacted on their educational experience. This book …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr Oct 2011

A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr

Dr Deogratias Harorimana

The purpose of this paper is to critically assess the effectiveness of Fiscal and Monetary Policies in the South Pacific Island Countries. The paper tracks down the economic growth for the last 20 years between 1990-2010, and drawing from key fiscal and monetary policies in place during the time under consideration, as well as specific interventions in the region, we find that: 1) While the South Pacific Island Countries (SPICs) particularly the six major economies (Solomon Islands, Fiji, Vanuatu, PNG, Samoa, Tonga) pursued fiscal and monetary policies for promoting growth and diversification of their economies, their fiscal policies relied heavily …


Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr Oct 2011

Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr

Dr Deogratias Harorimana

With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade Sep 2011

The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade

Eileen O'Donnell

The human computer interaction issues associated with the creation of personalized role playing simulations are discussed in this paper. This paper is aimed at those who are interested in building authoring applications which enable educators to build role playing simulated e-learning resources to use with their students. One of the main issues which have come to our attention is that many learning designers and educators do not understand what exactly it is we are trying to achieve by creating personalized role playing simulations. Also, how to gauge the pedagogic merits which can be achieved by using these e-learning resources. Potential …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg

Jan Kallberg

Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …


Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg Aug 2011

Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg

Jan Kallberg

Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …


President Atypon Systems Inc., Gordon C. Tibbitts Iii Mar 2011

President Atypon Systems Inc., Gordon C. Tibbitts Iii

Gordon C. Tibbitts III

Open Access funding models for Open Access


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Innovation Engine, Arcot Desai Narasimhalu Jan 2011

Innovation Engine, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.


Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu Jan 2011

Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.


Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu Jan 2011

Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu

Arcot Desai NARASIMHALU

Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.


Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani Jan 2011

Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani

Arcot Desai NARASIMHALU

XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Analyzing The Role Of Icts In The Tunisian And Egyptian Unrest From An Information Warfare Perspective, Brett Van Niekerk, Kiru Pillay, Manoj Maharaj Jan 2011

Analyzing The Role Of Icts In The Tunisian And Egyptian Unrest From An Information Warfare Perspective, Brett Van Niekerk, Kiru Pillay, Manoj Maharaj

Manoj Maharaj

In January 2011, the Tunisian government stepped down after weeks of protests; this was followed by unrest and protests in Egypt against the Egyptian government, leading also to the resignation of its president. Demonstrations in both countries were facilitated in some part by the online social media and related information and communications technologies that impacted the flow of information. The manner in which the information and communication technologies were employed suggests that the uprisings were a form of social information warfare. To provide an alternative understanding of the role of technology and information in the events that led to the …


The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk Jan 2011

The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk

Manoj Maharaj

No abstract provided.


Strategic Planning For Digital Convergence In South African Businesses, Manoj Maharaj, Kiru Pillay Jan 2011

Strategic Planning For Digital Convergence In South African Businesses, Manoj Maharaj, Kiru Pillay

Manoj Maharaj

No abstract provided.


Measuring Intellectual Capital In Corporations, Philadelphia University Jan 2011

Measuring Intellectual Capital In Corporations, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University Jan 2011

Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University Jan 2011

Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University Jan 2011

Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University Jan 2011

تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University Jan 2011

Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Guidelines For Teaching These Speech Acts, Philadelphia University Jan 2011

Guidelines For Teaching These Speech Acts, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University Jan 2011

Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University Jan 2011

Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel Dec 2010

Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel

Maurice Dawson

This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.