ICIME 2011-Proceedings of the 2nd International Conference on Information Management and Evaluation


Book Description

Following on from the continued success of the European Conference on Information Management and Evaluation, we are delighted at the Ted Rogers School of Management, Ryerson University to be able to host the 2nd International Conference on Information Management and Evaluation (ICIME 2011).ICIME aims to bring together individuals researching and working in the broad field of information management, including information technology evaluation. We hope that this year's conference will provide you with plenty of opportunities to share your expertise with colleagues from around the world.This year's opening keynote address will be delivered by Dr Catherine Middleton, Ted Rogers School of Information Technology Management, Ryerson University, Toronto, Canada.




Proceedings of the 2nd International Conference on Information Managemant and Evaluation


Book Description

Following on from the continued success of the European Conference on Information Management and Evaluation, we are delighted at the Ted Rogers School of Management, Ryerson University to be able to host the 2nd International Conference on Information Management and Evaluation (ICIME 2011).ICIME aims to bring together individuals researching and working in the broad field of information management, including information technology evaluation. We hope that this year's conference will provide you with plenty of opportunities to share your expertise with colleagues from around the world.This year's opening keynote address will be delivered by Dr Catherine Middleton, Ted Rogers School of Information Technology Management, Ryerson University, Toronto, Canada.










Information and Cyber Security


Book Description

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic. The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.




Handbook of Research on Mobile Devices and Applications in Higher Education Settings


Book Description

Mobile phones have become an integral part of society, as their convenience has helped democratize and revolutionize communication and the marketplace of ideas. Because of their ubiquity in higher education, undergraduate classrooms have begun to utilize smartphones and tablets as tools for learning. The Handbook of Research on Mobile Devices and Applications in Higher Education Settings explores and fosters new perspectives on the use of mobile applications in a classroom context. This timely publication will demonstrate the challenges that universities face when introducing new technologies to students and instructors, as well as the rewards of doing so in a thoughtful manner. This book is meant to present the latest research and become a source of inspiration for educators, administrators, researchers, app developers, and students of education and technology.




The SAGE Encyclopedia of Online Education


Book Description

Online education, both by for-profit institutions and within traditional universities, has seen recent tremendous growth and appeal - but online education has many aspects that are not well understood. The SAGE Encyclopedia of Online Education provides a thorough and engaging reference on all aspects of this field, from the theoretical dimensions of teaching online to the technological aspects of implementing online courses—with a central focus on the effective education of students. Key topics explored through over 350 entries include: · Technology used in the online classroom · Institutions that have contributed to the growth of online education · Pedagogical basis and strategies of online education · Effectiveness and assessment · Different types of online education and best practices · The changing role of online education in the global education system




ECKM2014-Proceedings of the 15th European conference on Knowledge Management


Book Description

The world economy in which we are living poses challenges that lead to a realization that 'more of the same' will be difficult to sustain. This provides an illustration that, in order to create new or modified knowledge practices, strengthen customer relationships and thus positively influence customer satisfaction, organizations must be flexible in configuring (combining) knowledge and knowledge structures in a way that is appropriate for delivering value to the customer. It must simultaneously develop effective strategies for updating the knowledge of its staff members necessary for underpinning the creation and delivery of appropriate knowledge services. Thus, unlearning (forgetting) becomes a critical means for organizational success. The ECKM community of scholars has already initiated dialogue that links its particular strengths to innovation issues. This conference aims to further that dialogue by attracting leading edge work that leverages the ECKM community's in-depth understanding of learning and unlearning to better understand knowledge management. Our aim is to stimulate breakthrough research streams linking learning, unlearning and knowledge management. How can organizations tailor, use, and extend techniques and tools from knowledge management for improving their business practices and processes? Building upon existing work on knowledge management (KM) and organizational learning, the conference will promote interdisciplinary approaches from computer science and information systems, business, management and organization science as well as cognitive science. Emphasis will be put on systematic learning from experience, KM tools and KM success factors. A special interest belongs to knowledge management initiatives which are lightweight (i.e., do not place considerable additional burden on users and KM experts), allow an incremental adoption (i.e., do not require large up-front investment before any return of investment is at least visible), and are flexible regarding frequent changes in experts and topics. Continuing the success of the ECKM conference series since 2000, the 2015 conference will provide an international communication forum bringing together academia and industry for discussing the progress made and addressing the challenges faced by continuous learning in knowledge-intensive organizations.




Model-Driven Business Process Engineering


Book Description

Model Driven development (MDD) is a software and systems development model that involves the application of visual modeling principles and best practices.