Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (10)
- Location-Based Services (3)
- Austerity (2)
- Authority (2)
- Case Study (2)
-
- Computer science (2)
- Conference Proceedings (2)
- E-learning (2)
- Emergency Management (2)
- General Innovation Methodologies (2)
- Government (2)
- ICT (2)
- Information Security (2)
- Information Warfare (2)
- Innovation (2)
- LBS (2)
- Legitimacy (2)
- National Security (2)
- Open Government (2)
- Open government (2)
- Social Implications of ICT (2)
- Technology (2)
- Technology enhanced learning (2)
- Africa (1)
- Arab Spring (1)
- Australia (1)
- Behavioural (1)
- Business model (1)
- Business reengineering (1)
- Business strategy (1)
Articles 1 - 30 of 32
Full-Text Articles in Business
Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp
Technology Enhanced Learning: Students' Views, Eileen O'Donnell, Mary Sharp
Eileen O'Donnell
User feedback is very important in all areas of computer science especially in the development of computer applications. Hence, student feedback on the use of technology enhanced learning in higher education in Ireland is relevant to the quality of the learning resources to be created by learning designers and academics in the future. The book “Student Reactions to Learning with Technologies: Perceptions and Outcomes” (Moyle & Wijngaards, 2012) was published by IGI Global in October 2011. This book includes contributions from various authors who are interested in students’ feedback regarding how technology has impacted on their educational experience. This book …
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael
Associate Professor Katina Michael
The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …
A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr
A Critical Review Of The Effectiveness Of Fiscal And Monetary Policies In The Pacific Island Countries (Pics) Between 1990-2010, Deogratias Harorimana Mr
Dr Deogratias Harorimana
The purpose of this paper is to critically assess the effectiveness of Fiscal and Monetary Policies in the South Pacific Island Countries. The paper tracks down the economic growth for the last 20 years between 1990-2010, and drawing from key fiscal and monetary policies in place during the time under consideration, as well as specific interventions in the region, we find that: 1) While the South Pacific Island Countries (SPICs) particularly the six major economies (Solomon Islands, Fiji, Vanuatu, PNG, Samoa, Tonga) pursued fiscal and monetary policies for promoting growth and diversification of their economies, their fiscal policies relied heavily …
Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr
Issues In Human Capital Development : Lessons For Public Administration And Governance, Deogratias Harorimana Mr
Dr Deogratias Harorimana
With few minerals or other natural resources, Rwanda believes that she can still achieve her ambitions by investing in human capital - her unique resource. If this ambition can be achieved, then is this the next role model for international development? We used a case study design and analysis methods to examine development models used elsewhere in recent decades, using both qualitative and quantitative data on Rwanda to establish the comparative advantages in relation to Singapore’s economic development model. The implications for international development are that (1) an effective human capital development strategy should be inclusive enough to respond to …
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade
The Human Computer Interaction Issues Associated With The Creation Of Personalized Role Playing Simulations, Eileen O'Donnell, Catherine Mulwa, Mary Sharp, Vincent Wade
Eileen O'Donnell
The human computer interaction issues associated with the creation of personalized role playing simulations are discussed in this paper. This paper is aimed at those who are interested in building authoring applications which enable educators to build role playing simulated e-learning resources to use with their students. One of the main issues which have come to our attention is that many learning designers and educators do not understand what exactly it is we are trying to achieve by creating personalized role playing simulations. Also, how to gauge the pedagogic merits which can be achieved by using these e-learning resources. Potential …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Jan Kallberg
Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Jan Kallberg
Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …
President Atypon Systems Inc., Gordon C. Tibbitts Iii
President Atypon Systems Inc., Gordon C. Tibbitts Iii
Gordon C. Tibbitts III
Open Access funding models for Open Access
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Arcot Desai NARASIMHALU
CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.
Innovation Engine, Arcot Desai Narasimhalu
Innovation Engine, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.
Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu
Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.
Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu
Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.
Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani
Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani
Arcot Desai NARASIMHALU
XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Arcot Desai NARASIMHALU
Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.
Analyzing The Role Of Icts In The Tunisian And Egyptian Unrest From An Information Warfare Perspective, Brett Van Niekerk, Kiru Pillay, Manoj Maharaj
Analyzing The Role Of Icts In The Tunisian And Egyptian Unrest From An Information Warfare Perspective, Brett Van Niekerk, Kiru Pillay, Manoj Maharaj
Manoj Maharaj
In January 2011, the Tunisian government stepped down after weeks of protests; this was followed by unrest and protests in Egypt against the Egyptian government, leading also to the resignation of its president. Demonstrations in both countries were facilitated in some part by the online social media and related information and communications technologies that impacted the flow of information. The manner in which the information and communication technologies were employed suggests that the uprisings were a form of social information warfare. To provide an alternative understanding of the role of technology and information in the events that led to the …
The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk
The Information Warfare Lifecycle Model, Manoj Maharaj, Brett Van Nikerk
Manoj Maharaj
No abstract provided.
Strategic Planning For Digital Convergence In South African Businesses, Manoj Maharaj, Kiru Pillay
Strategic Planning For Digital Convergence In South African Businesses, Manoj Maharaj, Kiru Pillay
Manoj Maharaj
No abstract provided.
Measuring Intellectual Capital In Corporations, Philadelphia University
Measuring Intellectual Capital In Corporations, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University
Mixed Reality Environment For Web-Based Laboratory Interactive Learning, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University
Modeling An Interactive Fms Scheduler Using Colored Petri Nets, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University
Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University
تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University
Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Guidelines For Teaching These Speech Acts, Philadelphia University
Guidelines For Teaching These Speech Acts, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University
Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University
Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel
Utilization Of E-Learning Tools, Virtual Machines, & Open Source Software To Enhance Graduate Systems Engineering Programs, Maurice Dawson, Darrell Burrell, William Emanuel
Maurice Dawson
This paper is a report on the findings of a study conducted on a graduate systems engineering course at an urban university in a group learning environment. The course, IEGR 501 Introduction to Advanced Systems Engineering, was a sixteen week course which took students with backgrounds in Industrial Engineering, Electrical Engineering, and Mechanical Engineering and prepared them to understand the systems engineering subject matter more. As the future of education becomes more and more virtual it becomes essential that universities take full advantage of the available tools at their disposal.