arch

Information Security Management: A Research Project




arch

Action-Guidance: An Action Research Project for the Application of Informing Science in Educational and Vocational Guidance




arch

Searching for Tomorrow's Programmers




arch

Exploring the Research Ethics Domain for Postgraduate Students in Computing




arch

Using a Blackboard Architecture in a Web Application




arch

Exploring the Key Informational, Ethical and Legal Concerns to the Development of Population Genomic Databases for Pharmacogenomic Research




arch

Mobile Learning, Cognitive Architecture and the Study of Literature




arch

PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns




arch

Analyzing the Affect of Culture on Curricular Content: A Research Conception




arch

An Architecture of a Computer Learning Environment for Mapping the Student’s Knowledge Level




arch

The Discovery Camp: A Talent Fostering Initiative for Developing Research Capabilities among Undergraduate Students




arch

Intelligent System for Information Security Management: Architecture and Design




arch

Informing through User-Centered Exploratory Search and Human-Computer Interaction Strategies




arch

In Search of New Identity for LIS Discipline, with Some References to Iran




arch

Interweaving Rubrics in Information Systems Program Assessments- Experiences from Action Research at Two Universities




arch

Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises:  A Research Agenda




arch

In Search of SecondLife Nirvana




arch

Emotion-Aware Education and Research Systems




arch

DigiStylus: A Socio-Technical Approach to Teaching and Research in Paleography




arch

Components- Based Access Control Architecture




arch

Influence on Student Academic Behaviour through Motivation, Self-Efficacy and Value-Expectation: An Action Research Project to Improve Learning




arch

Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods




arch

Focusing on SMTEs: Using Audience Response Technology to Refine a Research Project




arch

WWW Image Searching Delivers High Precision and No Misinformation: Reality or Ideal?




arch

Blended E-Learning in Higher Education: Research on Students’ Perspective




arch

Reinforcing and Enhancing Understanding of Students in Learning Computer Architecture




arch

Contents and Architecture of Nigerian Universities’ Websites




arch

A Research Study for the Development of a SOA Middleware Prototype that used Web Services to Bridge the LMS to LOR Data Movement Interoperability Gap for Education




arch

Transitioning from Data Storage to Data Curation: The Challenges Facing an Archaeological Institution




arch

Project Management Principles Applied in Academic Research Projects




arch

An E-Collaboration Activity System for Research Institutions




arch

Ransomware: A Research and a Personal Case Study of Dealing with this Nasty Malware

Aim/Purpose : Share research finding about ransomware, depict the ransomware work in a format that commonly used by researchers and practitioners and illustrate personal case experience in dealing with ransomware. Background: Author was hit with Ransomware, suffered a lot from it, and did a lot of research about this topic. Author wants to share findings in his research and his experience in dealing with the aftermath of being hit with ransomware. Methodology: Case study. Applying the literature review for a personal case study. Contribution: More knowledge and awareness about ransomware, how it attacks peoples’ computers, and how well informed users can be hit with this malware. Findings: Even advanced computer users can be hit and suffer from Ransomware attacks. Awareness is very helpful. In addition, this study drew in chart format what is termed “The Ransomware Process”, depicting in chart format the steps that ransomware hits users and collects ransom. Recommendations for Practitioners : Study reiterates other recommendations made for dealing with ransomware attacks but puts them in personal context for more effective awareness about this malware. Recommendation for Researchers: This study lays the foundation for additional research to find solutions to the ransomware problem. IT researchers are aware of chart representations to depict cycles (like SDLC). This paper puts the problem in similar representation to show the work of ransomware. Impact on Society: Society will be better informed about ransomware. Through combining research, illustrating personal experience, and graphically representing the work of ransomware, society at large will be better informed about the risk of this malware. Future Research: Research into solutions for this problem and how to apply them to personal cases.




arch

Design of a Knowledge Management System for the Research-Teaching Nexus: Evidence from Institutional Audit Reports

Aim/Purpose: The need for Higher Education Institutions (HEIs) to maximize the use of their intellectual property and strategic resources for research and teaching has become ever more evident in recent years. Furthermore, little attention is paid in developing an enabling system that will facilitate knowledge transfer in the Research-Teaching Nexus (RTN). Hence, this study assesses the current state of practice in knowledge management of the nexus in higher education in Oman. It also explores the context of how Knowledge Management System (KMS) for the nexus can be designed and utilized by HEIs and challenges them to rethink their traditional approaches in managing their knowledge as-sets to boost individual and organizational learning. Background: This study provides a Knowledge Management-based framework and design of a knowledge management system that support the academic community towards the improvement of the nexus. This study sets out ideas from various academic and professional experts on how academic stakeholders in the higher education can improve and promote knowledge transfer and make better use of its knowledge and research assets for teaching and learning. It stressed the importance of having the knowledge assets or resources that can easily be pooled, accessed, and made available to its intended stakeholders. Methodology: Data were gathered from 29 out of 49 institutional quality audit reports of all HEIs in Oman. The panel comments were coded and analysed to extract valuable insights regarding the management of knowledge assets in research. Additionally, data were gathered from the institutional accreditation outcomes page of the same website. Manifest and latent content analyses were used in reporting the findings of the panel. Contribution: The study will contribute to a greater understanding and acceptance of Knowledge Management (KM) in higher education and extended the body of knowledge concerning knowledge management for the RTN. Findings: The reports revealed a very limited practice of the nexus in terms of people and culture, structure ad processes, and computing and web technologies. A few staff are involved in RTN work, there is an uneven understanding of the RTN among staff, limited joint research between staff and students are some of the reasons for this. Significantly, there is no explicit research framework or policy for the RTN, and systems and/or mechanisms are limited. Further-more, the reports did not account any use of computing and web technologies for the nexus. These limitations can lead to students with less academic, research, and graduate skills. Hence, this study presents a feature design of a KMS that incorporates various RTN best practices, as informed by the reports and literature. The design will allow the staff to utilize the research assets in the classroom, at the same time, engages students in research and scholarly under-takings. Recommendations for Practitioners: All HEIs must have a innovative system that integrates a formal agenda and approach, and set initiatives, strategies, policies, and procedures for knowledge management in utilizing research assets for teaching and learning. It must be designed so that RTN practices remain up-to-date, relevant, and responsive to the needs of the stakeholders, as well as, address academic accreditation challenges. Recommendation for Researchers: Researchers can evaluate the knowledge management of RTN practices of other HEIs outside of Oman to effectively recommend the proper course of action for teaching and learning improvement. Impact on Society: This study will redefine the role and contribution of HEIs, which are key players in advancing a knowledge economy. HEIs are expected to be powerhouses where academic knowledge is discovered, created, disseminated, shared, and re-invented. They must be able to fully grasp the value of managing knowledge to be able to effect positive and purposeful change to the community. Future Research: Future work should include staff and student surveys that examine the knowledge management need of the learning organization to better inform the design of a KMS for the RTN. Thereafter, future research can test the stage to test the effectiveness of the conceptual design.




arch

Over Mountain Tops and Through the Valleys of Postgraduate Study and Research: A Transformative Learning Experience from Two Supervisees’ Perspectives

Aim/Purpose: The purpose of this paper is to illuminate the learning that happens in assuming a supervisee’s role during the postgraduate study. Background: The facilitators and barriers students encountered while pursuing postgraduate studies, strategies to achieve success in postgraduate studies, and how to decrease attrition rates of students, have been sufficiently explored in literature. However, there is little written about the personal and professional impact on students when they are being supervised to complete their postgraduate studies. Methodology: Autoethnographic method of deep reflection was used to examine the learning that transpired from the supervisee’s perspective. Two lecturers (a Senior Lecturer in Nursing and an Aboriginal Tutor) focused on their postgraduate journeys as supervisees, respectively, with over 30 years of study experience between them, in Australia and abroad. Contribution: Future postgraduate students, researchers, would-be supervisors and experienced supervisors could learn from the reflections of the authors’ postgraduate experiences. Findings: Four themes surfaced, and these were Eureka moments, Critical friend(s), Supervisory relationship, and Transformative learning. The authors highlighted the significance of a supervisory relationship which is key to negotiating the journey with the supervisor. Essential for these students also were insights on finding the path as well as the destination and the transformative aspects that happened as a necessary part of the journey. Conclusion. The postgraduate journey has taught them many lessons, the most profound of which was the change in perspective and attitude in the process of being and becoming. Personal and professional transformative learning did occur. At its deepest level, the authors’ reflections resulted in self-actualization and a rediscovery of their more authentic selves. Recommendations for Practitioners: This article highlights the importance of the supervisory relationship that must be negotiated to ensure the success of the candidate. Reflections of the transformation are recommended to support the students further. Recommendation for Researchers: Quality supervision can make a significant influence on the progress of students. Further research on the supervisory relationship is recommended. Impact on Society: The support in terms of supervision to ensure postgraduate students’ success is essential. Postgraduate students contribute to the human, social, professional, intellectual, and economic capital of universities and nations globally. Future Research: Further reflections of the transformative learning will advance the understanding of the personal and professional changes that occur with postgraduate supervision.




arch

Online Teaching With M-Learning Tools in the Midst of Covid-19: A Reflection Through Action Research

Aim/Purpose: In the midst of COVID-19, classes are transitioned online. Instructors and students scramble for ways to adapt to this change. This paper shares an experience of one instructor in how he has gone through the adaptation. Background: This section provides a contextual background of online teaching. The instructor made use of M-learning to support his online teaching and adopted the UTAUT model to guide his interpretation of the phenomenon. Methodology: The methodology used in this study is action research through participant-observation. The instructor was able to look at his own practice in teaching and reflect on it through the lens of the UTAUT conceptual frame-work. Contribution: The results helped the instructor improve his practice and better under-stand his educational situations. From the narrative, others can adapt and use various apps and platforms as well as follow the processes to teach online. Findings: This study shares an experience of how one instructor had figured out ways to use M-learning tools to make the online teaching and learning more feasible and engaging. It points out ways that the instructor could connect meaningfully with his students through the various apps and plat-forms. Recommendations for Practitioners: The social aspects of learning are indispensable whether it takes place in person or online. Students need opportunities to connect socially; there-fore, instructors should try to optimize technology use to create such opportunities for conducive learning. Recommendations for Researchers: Quantitative studies using surveys or quasi-experiment methods should be the next step. Validated inventories with measures can be adopted and used in these studies. Statistical analysis can be applied to derive more objective findings. Impact on Society: Online teaching emerges as a solution for the delivery of education in the midst of COVID-19, but more studies are needed to overcome obstacles and barriers to both instructors and students. Future Research: Future studies should look at the obstacles that instructors encounter and the barriers with technology access and inequalities that students face in online classes.




arch

Gamified Cybersecurity Education Through the Lens of the Information Search Process: An Exploratory Study of Capture-the-Flag Competitions [Research-in-Progress]

Aim/Purpose. Capture the Flag (CTF) challenges are a popular form of cybersecurity education where students solve hands-on tasks in a game-like setting. These exercises provide learning experiences with various specific technologies and subjects, as well as a broader understanding of cybersecurity topics. Competitions reinforce and teach problem-solving skills that are applicable in various technical and non-technical environments outside of the competitions. Background. The Information Search Process (ISP) is a framework developed to under-stand the process by which an individual goes about studying a topic, identifying emotional ties connected to each step an individual takes. As the individual goes through the problem-solving process, there is a clear flow from uncertainty to clarity; the individual’s feelings, thoughts, and actions are all interconnected. This study aims to investigate the learning of cybersecurity concepts within the framework of the ISP, specifically in the context of CTF competitions. Methodology. A comprehensive research methodology designed to incorporate quantitative and qualitative analyses to draw the parallels between the participants’ emotional experiences and the affective dimensions of learning will be implemented to measure the three primary goals. Contribution. This study contributes significantly to the broader landscape of cybersecurity education and cognitive-emotional experiences in problem-solving. Findings. The study has three primary goals. First, we seek to enhance our under-standing of the emotional and intellectual aspects involved in problem-solving, as demonstrated by the ISP approach. Second, we aim to gain in-sights into how the presentation of CTF challenges influences the learning experience of participants. Lastly, we strive to contribute to the improvement of cybersecurity education by identifying actionable steps for more effective teaching of technical skills and approaches. Recommendations for Practitioners. Competitions reinforce and teach problem-solving skills applicable in various technical and non-technical environments outside of the competitions. Recommendations for Researchers. The Information Search Process (ISP) framework may enhance our understanding of the emotional and intellectual aspects involved in problem-solving as we study the emotional ties connected to each step an individual takes as the individual goes through the problem-solving process. Impact on Society. Our pursuit of advancing our understanding of cybersecurity education will better equip future generations with the skills and knowledge needed to ad-dress the evolving challenges of the digital landscape. This will better pre-pare them for real-world challenges. Future Research. Future studies would include the development of a cybersecurity curriculum on vulnerability exploitation and defense. It would include practice exploiting practical web and binary vulnerabilities, reverse engineering, system hardening, security operations, and understanding how they can be chained together.




arch

A Guided Approach for Personalized Information Search and Visualization




arch

Using Research Techniques to Teach Management of IT Concepts to Postgraduate Business Students




arch

Analysis of Explanatory and Predictive Architectures and the Relevance in Explaining the Adoption of IT in SMEs




arch

A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research




arch

Innovation Capability: A Systematic Review and Research Agenda

Purpose: Innovation capability is a growing and significant area of academic research. However, there is little attempt to provide a cumulative overview of this phenomenon. The purpose of this systematic review is to synthesize peer reviewed articles published in the area to develop a conceptual framework and to aid future research. Design/Methodology/Approach: The paper adopted a systematic review of literature on innovation capability. The final screening generated 51 articles from 30 journals from 2000-2015. Findings: The examination and synthesis of the theoretical and the empirical articles show that (1) the authors applied narrow range of conceptual and theoretical foundations; (2) innovation capability is being investigated mostly at the firm level for about 90% of the articles, and marginally about 5% at network (supply) chain level; (3) the authors define innovation capability in different ways and use diverse set of dimensions to measure innovation capability; (4) there is potential for future research across firms in innovation management disciplines. Practical implications: The review contributes to theory development in organizational capability literature in general. Managers wishing to innovate need to examine critically and integrate some of the innovation capability dimensions proposed in this paper. Originality: The review is unique in the sense that it provides conceptualisation of innovation capability framework.




arch

Research Foci, Methodologies, and Theories Used in Addressing E-Government Accessibility for Persons with Disabilities in Developing Countries

Aim/Purpose: The purpose of this paper is to examine the key research foci, methodologies, and theoretical perspectives adopted by researchers when studying E-government accessibility for persons with disabilities (PWDs), particularly in developing countries. The study aims to develop a conceptual framework for designing accessible E-government for PWDs in developing countries. Background: Studies on E-government accessibility for persons with disabilities in developing countries have been minimal. The few studies conducted until now have failed to integrate PWDs, a population already marginalized, into the digital society. Accessibility has been identified by researchers as a major hindrance to PWDs participating in E-government. It is imperative therefore to examine the manner in which researchers investigate and acquire knowledge about this phenomenon. Methodology : The study synthesizes literature from top IS journals following a systematic literature review approach. The data synthesis focuses on identifying key concepts relating to E-government accessibility for PWDs. Contribution: The study contributes to the field of E-government, with a focus on how E-government services can be made accessible to PWDs. The study calls on researchers to reflect on their epistemological and ontological paradigms when examining accessibility of E-government services in developing countries. Findings: The findings show that most researchers focus on the evaluation of E-government websites and predominantly adopt quantitative methods. The study also reveals that the use of technological determinism as a theoretical lens is high among researchers. Recommendations for Practitioners : The study recommends that E-government web developers and policy makers involve PWDs from design to evaluation in the development of E-government applications. Recommendation for Researchers: The study advocates the need to conduct studies on E-government accessibility by employing more qualitative and mixed approaches to gain in-depth and better understanding of the phenomenon. Impact on Society : This study creates greater awareness and points out inadequacies that society needs to address to make E-government more inclusive of and participatory for PWDs. Future Research: Further empirical work is required in order to refine the relevance and applicability of various constructs in EADM so as to arrive at a framework for addressing E-government accessibility for PWDs in developing countries.




arch

A Systematic Literature Review of Agile Maturity Model Research

Background/Aim/Purpose: A commonly implemented software process improvement framework is the capability maturity model integrated (CMMI). Existing literature indicates higher levels of CMMI maturity could result in a loss of agility due to its organizational focus. To maintain agility, research has focussed attention on agile maturity models. The objective of this paper is to find the common research themes and conclusions in agile maturity model research. Methodology: This research adopts a systematic approach to agile maturity model research, using Google Scholar, Science Direct, and IEEE Xplore as sources. In total 531 articles were initially found matching the search criteria, which was filtered to 39 articles by applying specific exclusion criteria. Contribution:: The article highlights the trends in agile maturity model research, specifically bringing to light the lack of research providing validation of such models. Findings: Two major themes emerge, being the coexistence of agile and CMMI and the development of agile principle based maturity models. The research trend indicates an increase in agile maturity model articles, particularly in the latter half of the last decade, with concentrations of research coinciding with version updates of CMMI. While there is general consensus around higher CMMI maturity levels being incompatible with true agility, there is evidence of the two coexisting when agile is introduced into already highly matured environments. Future Research: Future research direction for this topic should include how to attain higher levels of CMMI maturity using only agile methods, how governance is addressed in agile environments, and whether existing agile maturity models relate to improved project success.




arch

A Framework for Ranking Critical Success Factors of Business Intelligence Based on Enterprise Architecture and Maturity Model

Aim/Purpose: The aim of this study is to identify Critical Success Factors (CSF) of Business Intelligence (BI) and provide a framework to classify CSF into layers or perspectives using an enterprise architecture approach, then rank CSF within each perspective and evaluate the importance of each perspective at different BI maturity levels as well. Background: Although the implementation of the BI project has a significant impact on creating analytical and competitive capabilities, the lack of evaluation of CSF holistically is still a challenge. Moreover, the BI maturity level of the organization has not been considered in the BI implementation project. Identifying BI critical success factors and their importance can help the project team to move to a higher maturity level in the organization. Methodology: First, a list of distinct CSF is identified through a literature review. Second, a framework is provided for categorizing these CSF using enterprise architecture. Interviewing is the research method used to evaluate the importance of CSF and framework layers with two questionnaires among experts. The first questionnaire was done by Analytical Hierarchy Process (AHP), a quantitative method of decision-making to calculate the weight of the CSF according to the importance of CSF in each of the framework layers. The second one was conducted to evaluate framework layers at different BI maturity levels using a Likert scale. Contribution: This paper contributes to the implementation of BI projects by identifying a comprehensive list of CSF in the form of a holistic multi-layered framework and ranking the importance of CSF and layers at BI maturity levels. Findings: The most important CSF in BI implementation projects include senior management support, process identification, data quality, analytics quality, hardware quality, security standards, scope management, documentation, project team skills, and customer needs transformation, which received the highest scores in framework layers. In addition, it was observed that as the organization moves to higher levels of maturity, the average importance of strategic business and security perspectives or layers increases. But the average importance of data, applications, infrastructure, and network, the project management layers in the proposed framework is the same regardless of the level of business intelligence maturity. Recommendations for Practitioners: The results of this paper can be used by academicians and practitioners to improve BI project implementation through understanding a comprehensive list of CSF and their importance. This awareness causes us to focus on the most important CSF and have better planning to reach higher levels of maturity according to the maturity level of the organization. Future Research: For future research, the interaction of critical success factors of business intelligence and framework layers can be examined with different methods.




arch

Analysis of the Scale Types and Measurement Units in Enterprise Architecture (EA) Measurement

Aim/Purpose: This study identifies the scale types and measurement units used in the measurement of enterprise architecture (EA) and analyzes the admissibility of the mathematical operations used. Background: The majority of measurement solutions proposed in the EA literature are based on researchers’ opinions and many with limited empirical validation and weak metrological properties. This means that the results generated by these solutions may not be reliable, trustworthy, or comparable, and may even lead to wrong investment decisions. While the literature proposes a number of EA measurement solutions, the designs of the mathematical operations used to measure EA have not yet been independently analyzed. It is imperative that the EA community works towards developing robust, reliable, and widely accepted measurement solutions. Only then can senior management make informed decisions about the allocation of resources for EA initiatives and ensure that their investment yields optimal results. Methodology: In previous research, we identified, through a systematic literature review, the EA measurement solutions proposed in the literature and classified them by EA entity types. In a subsequent study, we evaluated their metrology coverage from both a theoretical and empirical perspective. The metrology coverage was designed using a combination of the evaluation theory, best practices from the software measurement literature including the measurement context model, and representational theory of measurement to evaluate whether EA measurement solutions satisfy the metrology criteria. The research study reported here presents a more in-depth analysis of the mathematical operations within the proposed EA measurement solutions, and for each EA entity type, each mathematical operation used to measure EA was examined in terms of the scale types and measurement units of the inputs, their transformations through mathematical operations, the impact in terms of scale types, and measurement units of the proposed outputs. Contribution: This study adds to the body of knowledge on EA measurement by offering a metrology-based approach to analyze and design better EA measurement solutions that satisfy the validity of scale type transformations in mathematical operations and the use of explicit measurement units to allow measurement consistency for their usage in decision-making models. Findings: The findings from this study reveal that some important metrology and quantification issues have been overlooked in the design of EA measurement solutions proposed in the literature: a number of proposed EA mathematical operations produce numbers with unknown units and scale types, often the result of an aggregation of undetermined assumptions rather than explicit quantitative knowledge. The significance of such aggregation is uncertain, leading to numbers that have suffered information loss and lack clear meaning. It is also unclear if it is appropriate to add or multiply these numbers together. Such EA numbers are deemed to have low metrological quality and could potentially lead to incorrect decisions with serious and costly consequences. Recommendations for Practitioners: The results of the study provide valuable insights for professionals in the field of EA. Identifying the metrology limitations and weaknesses of existing EA measurement solutions may indicate, for instance, that practitioners should wait before using them until their design has been strengthened. In addition, practitioners can make informed choices and select solutions with a more robust metrology design. This, in turn, will benefit enterprise architects, software engineers, and other EA professionals in decision making, by enabling them to take into consideration factors more adequately such as cost, quality, risk, and value when assessing EA features. The study’s findings thus contribute to the development of more reliable and effective EA measurement solutions. Recommendation for Researchers: Researchers can use with greater confidence the EA measurement solutions with admissible mathematical operations and measurement units to develop new decision-making models. Other researchers can carry on research to address the weaknesses identified in this study and propose improved ones. Impact on Society: Developers, architects, and managers may be making inappropriate decisions based on seriously flawed EA measurement solutions proposed in the literature and providing undue confidence and a waste of resources when based on bad measurement design. Better quantitative tools will ultimately lead to better decision making in the EA domain, as in domains with a long history of rigor in the design of the measurement tools. Such advancements will benefit enterprise architects, software engineers, and other practitioners, by providing them with more meaningful measurements for informed decision making. Future Research: While the analysis described in this study has been explicitly applied to evaluating EA measurement solutions, researchers and practitioners in other domains can also examine measurement solutions proposed in their respective domains and design new ones.




arch

International Journal of Bioinformatics Research and Applications




arch

Decoupling the Information Application from the Information Creation: Video as Learning Objects in Three-Tier Architecture




arch

Social Bookmarking Tools as Facilitators of Learning and Research Collaborative Processes: The Diigo Case




arch

An Agent-based Federated Learning Object Search Service




arch

Medical Community of Inquiry: A Diagnostic Tool for Learning, Assessment, and Research

Aim/Purpose: These days educators are expected to integrate technological tools into classes. Although they acquire relevant skills, they are often reluctant to use these tools. Background: We incorporated online forums for generating a Community of Inquiry (CoI) in a faculty development program. Extending the Technology, Pedagogy, and Content Knowledge (TPACK) model with Assessment Knowledge and content analysis of forum discourse and reflection after each CoI, we offer the Diagnostic Tool for Learning, Assessment, and Research (DTLAR). Methodology: This study spanned over two cycles of a development program for medical faculty. Contribution: This study demonstrates how the DTLAR supports in-depth examination of the benefits and challenges of using CoIs for learning and teaching. Findings: Before the program, participants had little experience with, and were reluctant to use, CoIs in classes. At the program completion, many were willing to adopt CoIs and appreciated this method’s contribution. Both CoIs discourse and reflections included positive attitudes regarding cognitive and teacher awareness categories. However, negative attitudes regarding affective aspects and time-consuming aspects of CoIs were exposed. Participants who experienced facilitating a CoI gained additional insights into its usefulness. Recommendations for Practitioners : The DTLAR allows analyzing adaption of online forums for learning and teaching. Recommendation for Researchers: The DTLAR allows analyzing factors that affect the acceptance of online fo-rums for learning and teaching. Impact on Society : While the tool was implemented in the context of medical education, it can be readily applied in other adult learning programs. Future Research: The study includes several design aspects that probably affected the improve-ment and challenges we found. Future research is called for providing guidelines for identifying boundary conditions and potential for further improvement.