Skip to main content
A set of educational practices have been identified that offer a ‘high impact’ on student engagement, but the extent to which these practices can be transferred into the online setting has received only modest attention in the literature.... more
  • Download
    • by  and +2
    •   8  
      Instructional Design, Educational Technology, Distance Education, Instructional Technology
Presentation at Edulearn13 on a study of the role that reflexivity plays in fostering student engagement, in the context of study that is supported fully-online.
  • Download
    • by  and +1
    •   9  
      Instructional Design, Educational Technology, Distance Education, Instructional Technology
  • Download
    • by 
    •   12  
      Software Engineering, Director, Virtual Space, OPERATING SYSTEM
Professional organizations and employers continue to recommend the use of team based pro- jects for undergraduate and graduate degree programs in Information Systems and Technol- ogy. The delivery model of in-ground and on-line degree... more
  • Download
    • by 
    •   12  
      Software Engineering, Director, Virtual Space, OPERATING SYSTEM
This paper provides an overview and comparison of a one-year capstone experience using a two-semester software engineering project-based model, offered by two small, liberal- arts colleges, Lenoir-Rhyne College and Edgewood College. The... more
  • Download
    • by 
    •   5  
      Software Engineering, It Professional, Team work, For Capstone Project
  • Download
    • by 
    •   4  
      Information Systems, Computer Science, Computer Networks, Cloud Computing
Holocracy is the name given to the system of having no bosses and managers in an organization but where “authority and decision-making are distributed throughout a holarchy of self-organizing teams rather than being vested in a management... more
  • Download
    • by 
    •   4  
      Business/IT Alignment, Organizational Change, Organizational Culture, Holocracy
Geographic information is increasingly becoming an integral part of our lives. Sourcing and making a reliable geographical directory and database of the places we love, let alone one online, is a very expensive undertaking. However, with... more
  • Download
    • by 
    •   2  
      Google Maps, Geographic Information Systems (GIS)
Kenya has been a vibrant ICT hub in the region and for this reason; it is natural that the country enacts laws geared towards legislating and protecting the ICT industry and users. One such first attempt is in the form of the Kenya... more
  • Download
    • by 
    •   4  
      Information Technology, Privacy and data protection, Kenyan Law, Kenya Data Protection Law
The major social and ethical issues that IT has brought to individuals and society by extension, is the almost luck of personal privacy and space in the face of technology. Innovations in IT have made it possible to develop all kinds of... more
  • Download
    • by 
    •   5  
      Information Technology, Privacy, Consumer Protection, Privacy and data protection
The Hacking Team is an Italian based security company that provided " legal offensive security services, using malware and vulnerabilities to gain access to target's networks " to various " law enforcement and national security... more
  • Download
    • by 
    •   4  
      Cyber crime, Consumer Protection (Law), Consumer Law, Cyber Security
A population of northern snakeheads Channa argus was documented in the Potomac River system in 2004. The expansion of this population was monitored from 2004 to 2006. Boat electrofishing mean catch per unit effort increased significantly... more
    • by 
    •   3  
      Population Size, Fisheries Sciences, Analysis of Variance
ABSTRACT A population of northern snakeheads Channa argus was documented within a 23-km reach of the main-stem tidal freshwater Potomac River and associated tributaries in 2004. Twenty northern snakeheads were collected with a variety of... more
    • by 
    •   2  
      Fisheries Sciences, Shallow Water
  • Download
    • by 
    •   2  
      Experimental Tests, United States Air Force
This paper proposes a novel Context-Risk-Aware Access Control (CRAAC) model for Ubiquitous Computing (UbiComp) environments. Context-aware access control allows access permissions to be adjusted dynamically in adaptation to the changes in... more
    • by 
This paper reports our ongoing work to design a Context-Risk-Aware Access Control (CRAAC) model for Ubiquitous Computing (UbiComp) environments. CRAAC is designed to augment flexibility and generality over the current solutions. Risk... more
    • by 
    • by 
Abstract: The Internet has graduated from simple sharing of e-mail to business-critical applications that involve incredible amounts of private information. The need to protect sensitive data over an entrusted medium has led to the... more
    • by 
Establishing trust in a subject requesting access to a sensitive resource object is fundamental in history-aware access control models. A subject's past behaviour could be used as an indication about the subject's trustworthiness. In... more
    • by 
  • Download
    • by 
    • Literature Based Discovery