information

Create A Product - Teleseminar.  Learn About Creating Your Own Internet Information Product, Without Leaving Your Home!

WRITING ARTICLES SHOULD BE YOUR #1 FORM OF PROMOTION! But once you've put your masterpiece together, who should you send it to? Now there's a list of Ezine Editors who are simply crying out for your quality articles.




information

Some information on recording interviews for a podcast

I saw this at MacDevCenter.com: last week, a tips article on recording a podcast, focusing on turning interviews into podcasts in particular. Here's a quote. : "Podcasting could be seen as just another way to push audio to people who want to listen to it, but it's really a unique combination of subscription and publication.My stumbling block? Turning interviews into podcasts using entirely




information

Point to Ponder on information

Received recently from Rikkity




information

Fixed a typo, updated some minor information.

I fixed a typo on the front page, updated my about page.




information

Added some information about dailystrips and Userfriendly.org.

I gathered some information about dailystrips and userfriendly and how to use them when Arcor is blocked by UF's ISP.




information

Kenya: Athletes Urged Not to Fall Prey to Misinformation About Athletics Kenya

[Capital FM] Nairobi -- Athletics Kenya (AK) director of youth development Barnaba Korir has bemoaned the increasing mistrust certain athletes have towards the federation.




information

South Africa: Pregnant Teens - Girls in South Africa Need Focused, Supportive Healthcare and More Information About Safe Sex

[The Conversation Africa] An estimated 12 million teenage pregnancies are reported globally every year.




information

Africa: Misinformation Really Does Spread Like a Virus, Suggest Mathematical Models Drawn From Epidemiology

[The Conversation Africa] We're increasingly aware of how misinformation can influence elections. About 73% of Americans report seeing misleading election news, and about half struggle to discern what is true or false.




information

West Africa: RSF Calls on Authorities in the Sahel Region to Sign the Declaration on the Right to Information

[RSF] At the summit co-organised by UNESCO and the African Union (AU) in Addis Ababa on 6 and 7 November to mark the International Day to End Impunity for Crimes against Journalists, Reporters Without Borders (RSF) called on authorities in Sahel countries to sign a regional declaration on the right to information.




information

Zimbabwe: Govt Keen to Release Information in Real Time

[The Herald] The Government is making concerted efforts towards ensuring real-time dissemination of information, Information, Publicity and Broadcasting Services Minister, Dr Jenfan Muswere, has said.




information

10 U.S. Policies That Were Passed Based on False Information

Throughout history, governments have sometimes enacted policies based on flawed data, misunderstandings, or even myths. Some of these policies had lasting impacts on society, shaping public behavior, influencing economic trends, or restricting freedoms—all based on information that was later proven incorrect. Here are ten historical examples of policies that were set into motion by misinformation, […]

The post 10 U.S. Policies That Were Passed Based on False Information appeared first on Listverse.




information

HKBNES to distribute Information2 Software disaster recovery services in Hong Kong

(Telecompaper) HKBN Enterprise Solutions (HKBNES) has signed a partnership agreement with disaster recovery vendor Information2 Software. HKBNES becomes Information2 Software's general distributor in Hong Kong...




information

Learn about the Delhi-Alwar RRTS route map, stations, important information, and most recent updates in 2024

The Delhi-Alwar Regional Rapid Transit System (RRTS) is currently under construction and will link Delhi with the outlying satellite towns of Manesar, Rewari, and Alwwar. It will also link Delhi Metro’s four lines. Ten kilometers of the route are currently … Continue reading



  • Real Estate News
  • Alwar
  • Alwar real estate market
  • Alwar's real estate
  • Delhi
  • Delhi Metro
  • Delhi-Alwar metro
  • Delhi's real estate
  • Delhi's real estate market

information

Fed Trends in Restricting Information Access

Congress enacts open government legislation in three main areas: (1) laws that provide public access to federal records; (2) laws that allow the government to restrict public access to federal information; and (3) laws that provide for congressional access to federal records. A new 90-page Congressional Report by Rep. Henry A. Waxman provides a comprehensive, though arguably partisan, examination finding the Bush Administration has acted to restrict the amount of government information that is available.




information

研究情報のオープン化に関する国際会議Paris Conference on Open Research Informationの開催報告書が公開

2024年9月にフランス・パリのソルボンヌ大学で開催された研究情報のオープン化に関する国際会議Paris Conference on Open Research Informationの開催報告書が、リポジトリZenodo上に掲載されています。

同会議には、2024年4月に出された研究情報のオープン化に関するバルセロナ宣言(“Barcelona Declaration on Open Research Information”)の署名者や支援団体らが参加しました。オープンな研究情報の作成や管理、利活用に関する経験やベストプラクティスが共有されるとともに、宣言の内容を実現するためのロードマップ策定に向けた議論が行われたとあります。

Paris Conference on Open Research Information(Barcelona Declaration on Open Research Information)
https://barcelona-declaration.org/conference_2024_paris/

続きを読む





information

Navigating the world of disinformation, deepfakes and AI-generated deception [Book Review]

Online scams aren't anything new, but thanks to artificial intelligence they're becoming more sophisticated and harder to detect. We've also seen a rise in disinformation and deepfakes many of them made possible, or at least more plausible, by AI. This means that venturing onto the internet is increasingly like negotiating a digital minefield. With FAIK, risk management specialist at KnowBe4 Perry Carpenter sets out to dissect what makes these threats work and the motivations behind them as well as offering some strategies to protect yourself. This is no dry technical guide though, it's all presented in a very readable style,… [Continue Reading]




information

Information Wants to Be Free

Frederica explains the impact of technology on publishing and the distribution of the news.




information

Hearing and Doing God's Law in the Information Age (Sermon June 14, 2015)

On this Second Sunday after Pentecost, Fr. Andrew meditates on what it means both to hear and to do the Law in the midst of the noise of the Information Age.




information

Light From (and Upon) the Readable Books 8: Misinformation, Decrees, and the Life of Leaders

In this episode we read Esther 3:13a-g, 5:1-13 LXX, and 8:12a-I, considering the royal decrees of the king, the dramatic scene where Esther enters his presence without invitation, and the misinformation about the Jewish people which he finally rejects. We are helped in seeing the significance of these fascinating scenes by recourse to Psalm 85/6, Phil 2:5-11, and 1 Timothy 2:1-2




information

Too Much Information

Dr. Rossi thinks about overthinking.




information

Reward of £1,000 for information on wanted man

Ryan Ward, 31, is wanted in connection with incidents of assault and criminal damage.




information

Why is Cromer closing its information centre?

The tourist information centre in Cromer has been vital for some, but is set to close.




information

Information Consolidation in Large Bodies of Information

Due to information technologies the problem we are facing today is not a lack of information but too much information. This phenomenon becomes very clear when we consider two figures that are often quoted: Knowledge is doubling in many fields (biology, medicine, computer science, ...) within some 6 years; yet information is doubling every 8 months! This implies that the same piece of information/knowledge is published a large number of times with small variations.

Just look at an arbitrary news item. If considered of some general interest reports of it will appear in all major newspapers, journals, electronic media, etc. This is also the problem with information portals that tie together a number of large databases.

It is our contention that we need methods to reduce the huge set of information concerning a particular topic to a number of pieces of information (let us call each such piece an "essay" in what follows) that present a good cross-section of potential points of view. We will explain why one essay is usually not enough, yet the problem of reducing a huge amount of contributions to a digestible number of essays is formidable, indeed is science fiction at the moment. We will argue in this paper that it is one of the important tasks of computer sciences to start tackling this problem, and we will show that in some special cases partial solutions are possible.




information

An Empirical Study on Human and Information Technology Aspects in Collaborative Enterprise Networks

Small and Medium Enterprises (SMEs) face new challenges in the global market as customers require more complete and flexible solutions and continue to drastically reduce the number of suppliers. SMEs are trying to address these challenges through cooperation within collaborative enterprise networks (CENs). Human aspects constitute a fundamental issue in these networks as people, as opposed to organizations or Information Technology (IT) systems, cooperate. Since there is a lack of empirical studies on the role of human factors in IT-supported collaborative enterprise networks, this paper addresses the major human aspects encountered in this type of organization. These human aspects include trust issues, knowledge and know-how sharing, coordination and planning activities, and communication and mutual understanding, as well as their influence on the business processes of CENs supported by IT tools. This paper empirically proves that these aspects constitute key factors for the success or the failure of CENs. Two case studies performed on two different CENs in Switzerland are presented and the roles of human factors are identified with respect to the IT support systems. Results show that specific human factors, namely trust and communication and mutual understanding have to be well addressed in order to design and develop adequate software solutions for CENs.




information

A Framework to Evaluate Interface Suitability for a Given Scenario of Textual Information Retrieval

Visualization of search results is an essential step in the textual Information Retrieval (IR) process. Indeed, Information Retrieval Interfaces (IRIs) are used as a link between users and IR systems, a simple example being the ranked list proposed by common search engines. Due to the importance that takes visualization of search results, many interfaces have been proposed in the last decade (which can be textual, 2D or 3D IRIs). Two kinds of evaluation methods have been developed: (1) various evaluation methods of these interfaces were proposed aiming at validating ergonomic and cognitive aspects; (2) various evaluation methods were applied on information retrieval systems (IRS) aiming at measuring their effectiveness. However, as far as we know, these two kinds of evaluation methods are disjoint. Indeed, considering a given IRI associated to a given IRS, what happens if we associate this IRI to another IRS not having the same effectiveness. In this context, we propose an IRI evaluation framework aimed at evaluating the suitability of any IRI to different IR scenarios. First of all, we define the notion of IR scenario as a combination of features related to users, IR tasks and IR systems. We have implemented the framework through a specific evaluation platform that enables performing IRI evaluations and that helps end-users (e.g. IRS developers or IRI designers) in choosing the most suitable IRI for a specific IR scenario.




information

An Ontology based Agent Generation for Information Retrieval on Cloud Environment

Retrieving information or discovering knowledge from a well organized data center in general is requested to be familiar with its schema, structure, and architecture, which against the inherent concept and characteristics of cloud environment. An effective approach to retrieve desired information or to extract useful knowledge is an important issue in the emerging information/knowledge cloud. In this paper, we propose an ontology-based agent generation framework for information retrieval in a flexible, transparent, and easy way on cloud environment. While user submitting a flat-text based request for retrieving information on a cloud environment, the request will be automatically deduced by a Reasoning Agent (RA) based on predefined ontology and reasoning rule, and then be translated to a Mobile Information Retrieving Agent Description File (MIRADF) that is formatted in a proposed Mobile Agent Description Language (MADF). A generating agent, named MIRA-GA, is also implemented to generate a MIRA according to the MIRADF. We also design and implement a prototype to integrate these agents and show an interesting example to demonstrate the feasibility of the architecture.




information

Ascendancy of SNS information and age difference on intention to buy eco-friendly offerings: meaningful insights for e-tailers

Through the unparalleled espousal of theory of planned behaviour, this study intends to significantly add to the current knowledge on social networking sites (SNS) in <i>eWOM</i> information and its role in defining intentions to buy green products. In specie, this study seeks to first investigate the part played by <i>attitude towards SNS information</i> in influencing the <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> in effecting the <i>green purchase intention</i>. Besides this, it also aims to analyse the influence exerted by first <i>credibility of SNS information</i> on <i>acceptance of SNS information</i> and then by <i>acceptance of SNS information</i> on <i>green purchase intention</i>. In doing so, it also examines how well the age of the SNS users moderates all these four associations.




information

International Journal of Vehicle Information and Communication Systems




information

International Journal of Information and Computer Security




information

The discussion of information security risk control in mobile banking

The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services.




information

International Journal of Business Information Systems




information

E-portfolio Assessment System for an Outcome-Based Information Technology Curriculum




information

Straddling the Divide: Towards an Associate Degree in Information Technology




information

Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning




information

Didactics of Information Technology (IT) in a Science Degree: Conceptual Issues and Practical Application




information

Improving Outcome Assessment in Information Technology Program Accreditation




information

A Low Cost Course Information Syndication System




information

The Study of Motivation in Library and Information Management Education: Qualitative and Quantitative Research




information

Disaster at a University: A Case Study in Information Security




information

A Critical Analysis of Active Learning and an Alternative Pedagogical Framework for Introductory Information Systems Courses




information

Using the Work System Method with Freshman Information Systems Students




information

A Debate over the Teaching of a Legacy Programming Language in an Information Technology (IT) Program




information

Learning by Doing: Twenty Successful Active Learning Exercises for Information Systems Courses

Aim/Purpose: This paper provides a review of previously published work related to active learning in information systems (IS) courses. Background: There are a rising number of strategies in higher education that offer promise in regards to getting students’ attention and helping them learn, such as flipped classrooms and offering courses online. These learning strategies are part of the pedagogical technique known as active learning. Active learning is a strategy that became popular in the early 1990s and has proven itself as a valid tool for helping students to be engaged with learning. Methodology: This work follows a systematic method for identifying and coding previous research based on an aspect of interest. The authors identified and assessed research through a search of ABI/Inform scholarly journal abstracts and keywords, as well as additional research databases, using the search terms “active learning” and “information systems” from 2000 through June 2016. Contribution: This synthesis of active learning exercises provides guidance for information technology faculty looking to implement active learning strategies in their classroom by demonstrating how IS faculty might begin to introduce more active learning techniques in their teaching as well as by presenting a sample teaching agenda for a class that uses a mix of active and passive learning techniques to engage student learning. Findings: Twenty successful types of active learning exercises in IS courses are presented. Recommendations for Practitioners : This paper offers a “how to” resource of successful active learning strategies for IS faculty interested in implementing active learning in the classroom. Recommendation for Researchers: This work provides an example of a systematic literature review as a means to assess successful implementations of active learning in IS. Impact on Society: An updated definition of active learning is presented as well as a meaningful list of exercises that encourage active learning both inside and outside of the IS classroom. Future Research: In relation to future research, this study highlights a number of opportunities for IS faculty in regards to new active learning activities or trends to study further.




information

Introductory Information Systems Course Redesign: Better Preparing Business Students

Aim/Purpose: The dynamic nature of the information systems (IS) field presents educators with the perpetual challenge of keeping course offerings current and relevant. This paper describes the process at a College of Business (COB) to redesign the introductory IS course to better prepare students for advanced business classes and equip them with interdisciplinary knowledge and skills demanded in today’s workplace. Background: The course was previously in the Computer Science (CSC) Department, itself within the COB. However, an administrative restructuring resulted in the CSC department’s removal from the COB and left the core course in limbo. Methodology: This paper presents a case study using focus groups with students, faculty, and advisory council members to assess the value of the traditional introductory course. A survey was distributed to students after implementation of the newly developed course to assess the reception of the course. Contribution: This paper provides an outline of the decision-making process leading to the course redesign of the introductory IS course, including the context and the process of a new course development. Practical suggestions for implementing and teaching an introductory IS course in a business school are given. Findings: Focus group assessment revealed that stakeholders rated the existing introductory IS course of minimal value as students progressed through the COB program, and even less upon entering the workforce. The findings indicated a complete overhaul of the course was required. Recommendations for Practitioners: The subject of technology sometimes requires more than a simple update to the curriculum. When signs point to the need for a complete overhaul, this paper gives practical guidance supplemented with relevant literature for other academicians to follow. Recommendation for Researchers: Students are faced with increasing pressure to be proficient with the latest technology, in both the classroom where educators are trying to prepare them for the modern workplace, as well as the organization which faces an even greater pressure to leverage the latest technology. The newly designed introductory IS course provides students, and eventually organizations, a better measure of this proficiency. Future Research: Future research on the efficacy of this new course design should include longitudinal data to determine the impact on graduates, and eventually the assessment of those graduates’ performance in the workplace.




information

Design and Delivery of an Online Information Systems Management Course for MBA Programs

Aim/Purpose: In this paper, we present our experience in design and delivery of a graduate Information Systems Management (ISM) course in an online MBA program. Also presented are a detailed examination of the design and delivery of the online course, survey results of students’ perceptions and backgrounds, course evaluation results, best practices and lessons learned, and potential changes and future actions. Background: This graduate ISM course needs to not only cover a broad range of dynamic technology and business topics, but also strike a balance between the width and depth of the content. Effective course design and delivery are critical to improved teaching and learning, especially when the course is delivered online. Methodology: We provided a comprehensive review of the related literature to develop guidelines for the design and delivery of our ISM course; we collected survey data to evaluate the students’ backgrounds and their perceptions of the course; we used data analysis and content analysis methods to assess the course evaluation results. Contribution: A review of the related literature indicates that IS researchers and educators have not adequately studied online graduate education. Given the importance of the graduate ISM course in most MBA programs, and the lack of attention from the IS community, it is critical to address this gap in the research. We believe we have done so with this paper. Findings: The paper’s major findings are embedded in a detailed examination of the design and delivery of the online course, survey results of students’ perceptions and backgrounds, course evaluation results, best practices and lessons learned, and potential changes and future actions. Recommendations for Practitioners: Even though our experience may not be fully applicable to other institutions, we hope our IS colleagues can learn from the design and delivery of this online course, as well as our best practices and lessons learned to improve the teaching and learning effectiveness in IS online graduate education, in general. Furthermore, we provide instructors with an actionable framework onto which they can map their current course offering, and compare their current pedagogical offering to literature driven best practices for ISM courses, in particular. Recommendation for Researchers: It is our hope that the design and delivery of this online course, and our best practices and lessons learned can inspire our IS colleagues to search for innovative ways to improve the teaching and learning effectiveness in IS online graduate education. In addition, we distill a literature driven framework for ISM courses design and delivery that can help researchers frame their pedagogical research questions. Impact on Society: The online course in this study prepares students for more efficiently and effectively delivering IT systems in organizations. Many MBA students work for non-profits and other socially-focused organizations and are able to use the skills learned in the course for the betterment of society. Future Research: We will continue to monitor the impact of the changes on student learning effectiveness and attempt to identify additional innovative ways to improve the design and delivery of this online ISM course.




information

Incorporating Kinesthetic Learning into University Classrooms: An Example from Management Information Systems

Aim/Purpose: Students tend to learn best when an array of learning styles is used by instructors. The purpose of this paper is to add, to introduce, and to apply the concepts of kinesthetic learning and learning structures to university and STEM education. Background: The study applies the concept of kinesthetic learning and a learning structure called Think-Pair-Share to an experiential exercise about Moore’s Law in an introductory MIS classroom. The paper details the exercise and each of its components. Methodology: Students in two classes were asked to complete a short survey about their conceptual understanding of the course material before and after the experiential exercise. Contribution: The paper details the benefits of kinesthetic learning and learning structures and discusses how to apply these concepts through an experiential exercise used in an introductory MIS course. Findings: Results indicate that the kinesthetic learning activity had a positive impact on student learning outcomes. Recommendations for Practitioners: University educators can use this example to structure several other learning activities that apply kinesthetic learning principles. Recommendation for Researchers: Researchers can use this paper to study more about how to incorporate kinesthetic learning into education, and about teaching technology concepts to undergraduate students through kinesthetic learning. Impact on Society: The results of this study may be extremely beneficial for the university and STEM community and overall academic business community. Future Research: Researchers should consider longitudinal studies and other ways to incorporate kinesthetic learning activities into education.




information

Towards Understanding Information Systems Students’ Experience of Learning Introductory Programming: A Phenomenographic Approach

Aim/Purpose: This study seeks to understand the various ways information systems (IS) students experience introductory programming to inform IS educators on effective pedagogical approaches to teaching programming. Background: Many students who choose to major in information systems (IS), enter university with little or no experience of learning programming. Few studies have dealt with students’ learning to program in the business faculty, who do not necessarily have the computer science goal of programming. It has been shown that undergraduate IS students struggle with programming. Methodology: The qualitative approach was used in this study to determine students’ notions of learning to program and to determine their cognitive processes while learning to program in higher education. A cohort of 47 students, who were majoring in Information Systems within the Bachelor of Commerce degree programme were part of the study. Reflective journals were used to allow students to record their experiences and to study in-depth their insights and experiences of learning to program during the course. Using phenomenographic methods, categories of description that uniquely characterises the various ways IS students experience learning to program were determined. Contribution: This paper provides educators with empirical evidence on IS students’ experiences of learning to program, which play a crucial role in informing IS educators on how they can lend support and modify their pedagogical approach to teach programming to students who do not necessarily need to have the computer science goal of programming. This study contributes additional evidence that suggests more categories of description for IS students within a business degree. It provides valuable pedagogical insights for IS educators, thus contributing to the body of knowledge Findings: The findings of this study reveal six ways in which IS students’ experience the phenomenon, learning to program. These ways, referred to categories of description, formed an outcome space. Recommendations for Practitioners: Use the experiences of students identified in this study to determine approach to teaching and tasks or assessments assigned Recommendation for Researchers: Using phenomenographic methods researchers in IS or IT may determine pedagogical content knowledge in teaching specific aspects of IT or IS. Impact on Society: More business students would be able to program and improve their logical thinking and coding skills. Future Research: Implement the recommendations for practice and evaluate the students’ performance.




information

Navigating e-customer relationship management through emerging information and communication technologies: moderation of trust and financial risk

This study examines the relationships between ICTs (e.g., chatbots, virtual assistants, social media platforms, e-mail marketing, mobile marketing, data analytics, interactive voice response, big data analytics, push notifications, cloud computing, and augmented reality) and e-customer relationship management (e-CRM) from the banking industry of China. Similarly, this study unfolds the moderation interference of trust and risk between the association of ICTs and e-CRM, respectively. The study provided a positive nexus between ICTs and e-CRM. On the other side, a significant moderation of trust, as well as financial risk was observed between the correlation of ICTs and customer relationship management. This study endows with insights into ICTs which are critical for achieving e-CRM by streamlining interactions and enhancing their experience. Similarly, trust and financial risk were observed as potential forces that sway the association between ICTs and e-CRM.




information

International Journal of Information Systems and Change Management