stem The Ecclesio-Political System of Byzantium and Its Shortcomings By www.ancientfaith.com Published On :: 2015-08-13T05:56:54+00:00 Fr. John draws attention to a feature of Byzantine statecraft in which the Emperor persecuted and manipulated the leadership of the Church. Full Article
stem The Synodal System By www.ancientfaith.com Published On :: 2017-07-06T21:32:22+00:00 Fr. Ted explains the way in which decisions, like recognizing saints, are made in the Orthodox Church through a synodal system. Full Article
stem Family Systems By www.ancientfaith.com Published On :: 2018-03-10T22:05:20+00:00 Dr. Rossi once again interviews Fr. Sean Levine, a graduate of St. Vladimir's Orthodox Theological Seminary and now chaplain in the United States Army, regarding Family Systems Theory and how it applies to our healing the growth. Full Article
stem Systematics By www.ancientfaith.com Published On :: 2020-02-17T16:07:13+00:00 Dr. Albert Rossi discusses how we express our beliefs as Orthodox Christians with Dr. Peter Bouteneff, Professor of Systematic Theology at St. Vladimir's Orthodox Theological Seminary in Younkers, NY. Full Article
stem Orthodoxy and Bioethics: Abortion, Euthanasia, and Stem-Cell Research By www.ancientfaith.com Published On :: 2014-09-10T21:16:30+00:00 Today on the program we feature a lecture by Fr. Stanley Harakas, the Archbishop Iakovos Professor of Orthodox Theology, Emeritus, at Holy Cross, given at the first annual Anne and Theodore Phillips Paschal Lecture Series in Chicago, Illinois. Full Article
stem Interview with Dr. John Burgess of Systematic Theology at Pittsburgh Theological Seminary By www.ancientfaith.com Published On :: 2024-03-13T05:00:01+00:00 Bobby Maddex, the Director of Digital Media for Ancient Faith Ministries, interviews Dr. John Burgess, the James Henry Snowden, professor of Systematic Theology at Pittsburgh Theological Seminary. Full Article
stem Systemic By www.ancientfaith.com Published On :: 2020-08-17T23:50:46+00:00 Here is part two of my perspective on race matters. Again, this is my own perspective, but it's important that we keep communicating and trying to understand one another. Full Article
stem Creator Flywheels – The Operating System for Your Business By nathanbarry.com Published On :: Tue, 09 May 2023 14:00:12 +0000 What is a flywheel? My first real life encounter with a flywheel was on a water well in South Africa. I was working at an orphanage where one of our projects was to provide a reliable water source. Because electricity was unreliable, we mounted a hand-powered pump. But we couldn’t use the kind of pump […] Full Article Audience Building Business Marketing
stem Singer calls for stem cell donors as cancer returns By www.bbc.com Published On :: Tue, 12 Nov 2024 06:14:59 GMT Mike Peters says his future is unclear as he loses his chance for a stem cell donation. Full Article
stem Invoicing system for freelancers – beta testers needed By blog.cinciala.eu Published On :: Thu, 08 Jan 2015 06:28:54 +0000 I used to keep the records on my clients, projects, invoices, etc. in Excel sheets and to generate my monthly invoices manually. However, with growing client base, invoicing became a time-consuming and annoying work that had to be performed at the … Continue reading → Full Article General discussion Software-related
stem TR?ICTIO Invoicing System development approaches the finish line By blog.cinciala.eu Published On :: Thu, 12 Mar 2015 12:06:21 +0000 As some of you already know, the TR?ICTIO Invoicing System is a simple invoicing platform focusing on freelance translators. I have been developing the system for about 12 months and after extensive personal testing and actual use in my business, as … Continue reading → Full Article General discussion Software-related
stem The Iceberg Effect: Behind the User Interface of Mobile Collaborative Systems By www.jucs.org Published On :: 2011-07-08T12:29:59+02:00 Advances in mobile technologies are opening new possibilities to support collaborative activities through mobile devices. Unfortunately, mobile collaborative systems have been difficult to conceive, design and implement. These difficulties are caused in part by their unclear requirements and developers' lack of experience with this type of systems. However, several requirements involved in the collaborative back-end of these products are recurrent and should be considered in every development. This paper introduces a characterization of mobile collaboration and a framework that specifies a list of general requirements to be considered during the conception and design of a system in order to increase its probability of success. This framework was used in the development of two mobile collaborative systems, providing developers with a base of back-end requirements to aid system design and implementation. The systems were positively evaluated by their users. Full Article
stem LaSca: a Large Scale Group Decision Support System By www.jucs.org Published On :: 2011-07-08T12:30:04+02:00 Decision-making involves choosing between one ore more alternatives, to achieve one or more goals. To support this process, there are decision support systems that employ different approaches, supporting groups or not. Generally, however, these systems do not have great flexibility; their users have to follow preestablished decision methods. This paper, after exposing some decision-making processes, describes a system, LaSca (from Large Scale), to support decisions in large-scale groups. This system, besides allowing effective achievement of the benefits of deciding in large groups through the proper structuring of the group, also allows its users to define themselves how this structuring will happen, based or not in the existing theories on the subject. So, in addition to facilitate the decision-making process, LaSca also allows its users to decide how to decide. Full Article
stem Coordinated System for Real Time Muscle Deformation during Locomotion By www.jucs.org Published On :: 2011-04-24T11:14:51+02:00 This paper presents a system that simulates, in real time, the volumetric deformation of muscles during human locomotion. We propose a two-layered motion model. The requirements of realism and real time computation lead to a hybrid locomotion system that uses a skeleton as first layer. The muscles, represented by an anatomical surface model, constitute the second layer, whose deformations are simulated with a finite element method (FEM). The FEM subsystem is fed by the torques and forces got from the locomotion system, through a line of action model, and takes into account the geometry and material properties of the muscles. High level parameters (like height, weight, physical constitution, step frequency, step length or speed) allow to customize the individuals and the locomotion and therefore, the deformation of the persons' muscles. Full Article
stem The Architectural Design of a System for Interpreting Multilingual Web Documents in E-speranto By www.jucs.org Published On :: 2011-04-24T11:14:58+02:00 E-speranto is a formal language for generating multilingual texts on the World Wide Web. It is currently still under development. The vocabulary and grammar rules of E-speranto are based on Esperanto; the syntax of E-speranto, however, is based on XML (eXtensible Markup Language). The latter enables the integration of documents generated in E-speranto into web pages. When a user accesses a web page generated in E-speranto, the interpreter interprets the document into a chosen natural language, which enables the user to read the document in any arbitrary language supported by the interpreter. The basic parts of the E-speranto interpreting system are the interpreters and information resources, which complies with the principle of separating the interpretation process from the data itself. The architecture of the E-speranto interpreter takes advantage of the resemblance between the languages belonging to the same linguistic group, which consequently results in a lower production cost of the interpreters for the same linguistic group. We designed a proof-of-concept implementation for interpreting E-speranto in three Slavic languages: Slovenian, Serbian and Russian. These languages share many common features in addition to having a similar syntax and vocabulary. The content of the information resources (vocabulary, lexicon) was limited to the extent that was needed to interpret the test documents. The testing confirmed the applicability of our concept and also indicated the guidelines for future development of both the interpreters and E-speranto itself. Full Article
stem An Aspect-Oriented Framework for Weaving Domain-Specific Concerns into Component-Based Systems By www.jucs.org Published On :: 2011-05-06T16:03:36+02:00 Software components are used in various application domains, and many component models and frameworks have been proposed to fulfill domain-specific requirements. The general trend followed by these approaches is to provide ad-hoc models and tools for capturing these requirements and for implementing their support within dedicated runtime platforms, limited to features of the targeted domain. The challenge is then to propose more flexible solutions, where components reuse is domain agnostic. In this article, we present a framework supporting compositional construction and development of applications that must meet various extra-functional/domain-specific requirements. The key points of our contribution are: i) We target development of component-oriented applications where extra-functional requirements are expressed as annotations on the units of composition in the application architecture. ii) These annotations are implemented as open and extensible component-based containers, achieving full separation of functional and extra-functional concerns. iii) Finally, the full machinery is implemented using the Aspect-Oriented Programming paradigm. We validate our approach with two case studies: the first is related to real-time and embedded applications, while the Full Article
stem Service Oriented Multimedia Delivery System in Pervasive Environments By www.jucs.org Published On :: 2011-07-04T16:04:50+02:00 Service composition is an effective approach for large-scale multimedia delivery. In previous works, user requirement is represented as one fixed functional path which is composed of several functional components in a certain order. Actually, there may be several functional paths (deliver different quality level multimedia data, e.g., image pixel, frame rate) that can meet one request. And due to the diversity of devices and connections in pervasive environment, system should choose a suitable media quality delivery path in accordance with context, instead of one fixed functional path. This paper presents a deep study of multimedia delivery problem and proposes an on-line algorithm LDPath and an off-line centralized algorithm LD/RPath respectively. LDPath aims at delivering multimedia data to end user with lowest delay by choosing services to build delivery paths hop-by-hop, which is adapted to the unstable open environment. And LD/RPath is developed for a relatively stable environment, which generates delivery paths according to the trade-off between delay and reliability metrics, because the service reliability is also an important fact in such scenario. Experimental results show that both algorithms have good performance with low overhead to the system. Full Article
stem ORPMS: An Ontology-based Real-time Project Monitoring System in the Cloud By www.jucs.org Published On :: 2011-07-20T10:35:18+02:00 Project monitoring plays a crucial role in project management, which is a part of every stage of a project's life-cycle. Nevertheless, along with the increasing ratio of outsourcing in many companies' strategic plans, project monitoring has been challenged by geographically dispersed project teams and culturally diverse team members. Furthermore, because of the lack of a uniform standard, data exchange between various project monitoring software becomes an impossible mission. These factors together lead to the issue of ambiguity in project monitoring processes. Ontology is a form of knowledge representation with the purpose of disambiguation. Consequently, in this paper, we propose the framework of an ontology-based real-time project monitoring system (ORPSM), in order to, by means of ontologies, solve the ambiguity issue in project monitoring processes caused by multiple factors. The framework incorporates a series of ontologies for knowledge capture, storage, sharing and term disambiguation in project monitoring processes, and a series of metrics for assisting management of project organizations to better monitor projects. We propose to configure the ORPMS framework in a cloud environment, aiming at providing the project monitoring service to geographically distributed and dynamic project members with great flexibility, scalability and security. A case study is conducted on a prototype of the ORPMS in order to evaluate the framework. Full Article
stem L'aide militaire américaine à Israël va se poursuivre après un ajustement de l'aide à Gaza By fr.euronews.com Published On :: Wed, 13 Nov 2024 07:27:57 +0100 L'aide militaire américaine à Israël va se poursuivre après un ajustement de l'aide à Gaza Full Article
stem An efficient edge swap mechanism for enhancement of robustness in scale-free networks in healthcare systems By www.inderscience.com Published On :: 2024-07-05T23:20:50-05:00 This paper presents a sequential edge swap (SQES) mechanism to design a robust network for a healthcare system utilising energy and communication range of nodes. Two operations: sequential degree difference operation (SQDDO) and sequential angle sum operation (SQASO) are performed to enhance the robustness of network. With equivalent degrees of nodes from the network's centre to its periphery, these operations build a robust network structure. Disaster attacks that have a substantial impact on the network are carried out using the network information. To identify a link between the malicious and disaster attacks, the Pearson coefficient is employed. SQES creates a robust network structure as a single objective optimisation solution by changing the connections of nodes based on the positive correlation of these attacks. SQES beats the current methods, according to simulation results. When compared to hill-climbing algorithm, simulated annealing, and ROSE, respectively, the robustness of SQES is improved by roughly 26%, 19% and 12%. Full Article
stem International Journal of Vehicle Information and Communication Systems By www.inderscience.com Published On :: Full Article
stem Secure digital academic certificate verification system using blockchain By www.inderscience.com Published On :: 2024-09-26T23:20:50-05:00 At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving. Full Article
stem Nexus between artificial intelligence and marketing: a systematic review and bibliometric analysis By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Although artificial intelligence provides a new method to gather, process, analyse data, generate insights, and offer customised solutions, such methods could change how marketers deal with customers, and there is a lack of literature to portray the application of artificial intelligence in marketing. This study aims to recognise and portray the use of artificial intelligence from a marketing standpoint, as well as to provide a conceptual framework for the application of artificial intelligence in marketing. This study uses a systematic literature review analysis as a research method to achieve the aims. Data from 142 articles were extracted from the Scopus database using relevant search terms for artificial intelligence and marketing. The systematic review identified significant usage of artificial intelligence in conversational artificial intelligence, content creation, audience segmentation, predictive analytics, personalisation, paid ads, sales forecasting, dynamic pricing, and recommendation engines and the bibliometric analysis produced the trend in co-authorship, citation, bibliographic coupling, and co-citation analysis. Practitioners and academics may use this study to decide on the marketing area in which artificial intelligence can be invested and used. Full Article
stem A constant temperature control system for indoor environments in buildings using internet of things By www.inderscience.com Published On :: 2024-07-01T23:20:50-05:00 The performance of a building's internal environment, which includes the air temperature, lighting and acoustics, is what determines the quality of the environment inside the building. We present a thermal model for achieving thermal comfort in buildings that makes use of a multimodal analytic framework as a solution to this challenge. In this study, a multimodal combination is used to evaluate several temperature and humidity sensors as well as an area image. Additionally, a CNN and LSTM combination is used to process the image and sensor data. The results show that heating setback and interior set point temperatures, as well as mechanical ventilation based on real people's presence and CO<SUB align=right>2 levels, are all consistently reduced when ICT-driven intelligent solutions are used. The CNN-LSTM model has a goodness of fit that is 0.7258 on average, which is much higher than both the CNN (0.5291) and LSTM (0.5949) models. Full Article
stem Design of traffic signal automatic control system based on deep reinforcement learning By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 Aiming at the problem of aggravation of traffic congestion caused by unstable signal control of traffic signal control system, the Multi-Agent Deep Deterministic Policy Gradient-based Traffic Cyclic Signal (MADDPG-TCS) control algorithm is used to control the time and data dimensions of the signal control scheme. The results show that the maximum vehicle delay time and vehicle queue length of the proposed algorithm are 11.33 s and 27.18 m, which are lower than those of the traditional control methods. Therefore, this method can effectively reduce the delay of traffic signal control and improve the stability of signal control. Full Article
stem QoS-based handover approach for 5G mobile communication system By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 5G mobile communication systems are an in-depth fusion of multi-radio access technologies characterised with frequent handover between cells. Handover management is a particularly challenging issue for 5G networks development. In this article, a novel optimised handover framework is proposed to find the optimal network to connect with a good quality of service in accordance with the user's preferences. This framework is based on an extension of IEEE 802.21 standard with new components and new service primitives for seamless handover. Moreover, the proposed vertical handover process is based on an adaptive heuristic model aimed at achieving an optimised network during the decision-making stage. Simulation results demonstrate that, compared to other existing works, the proposed framework is capable of selecting the best network candidate accurately based on the quality-of-service requirements of the application, network conditions, mobile terminal conditions and user preferences. It significantly reduces the handover delay, handover blocking probability and packet loss rate. Full Article
stem International Journal of Agile Systems and Management By www.inderscience.com Published On :: Full Article
stem Integrating big data collaboration models: advancements in health security and infectious disease early warning systems By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In order to further improve the public health assurance system and the infectious diseases early warning system to give play to their positive roles and enhance their collaborative capacity, this paper, based on the big and thick data analytics technology, designs a 'rolling-type' data synergy model. This model covers districts and counties, municipalities, provinces, and the country. It forms a data blockchain for the public health assurance system and enables high sharing of data from existing system platforms such as the infectious diseases early warning system, the hospital medical record management system, the public health data management system, and the health big and thick data management system. Additionally, it realises prevention, control and early warning by utilising data mining and synergy technologies, and ideally solves problems of traditional public health assurance system platforms such as excessive pressure on the 'central node', poor data tamper-proofing capacity, low transmission efficiency of big and thick data, bad timeliness of emergency response, and so on. The realisation of this technology can greatly improve the application and analytics of big and thick data and further enhance the public health assurance capacity. Full Article
stem Dual network control system for bottom hole throttling pressure control based on RBF with big data computing By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 In the context of smart city development, the managed pressure drilling (MPD) drilling process faces many uncertainties, but the characteristics of the process are complex and require accurate wellbore pressure control. However, this process runs the risk of introducing un-modelled dynamics into the system. To this problem, this paper employs neural network control techniques to construct a dual-network system for throttle pressure control, the design encompasses both the controller and identifier components. The radial basis function (RBF) network and proportional features are connected in parallel in the controller structure, and the RBF network learning algorithm is used to train the identifier structure. The simulation results show that the actual wellbore pressure can quickly track the reference pressure value when the pressure setpoint changes. In addition, the controller based on neural network realises effective control, which enables the system to track the input target quickly and achieve stable convergence. Full Article
stem Design of data mining system for sports training biochemical indicators based on artificial intelligence and association rules By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 Physiological indicators are an important basis for reflecting the physiological health status of the human body and play an important role in medical practice. Association rules have also been one of the important research hotspots in recent years. This study aims to create a data mining system of association rules and artificial intelligence in biochemical indicators of sports training. This article uses Markov logic for network creation and system training, and tests whether the Markov logic network can be associated with the training system. The results show that the accuracy and recall rate obtained are about 90%, which shows that it is feasible to establish biochemical indicators of sports training based on Markov logic network, and the system has universal, guiding and constructive significance, ensuring that the construction of training system indicators will not go in the wrong direction. Full Article
stem Evaluation on stock market forecasting framework for AI and embedded real-time system By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 Since its birth, the stock market has received widespread attention from many scholars and investors. However, there are many factors that affect stock prices, including the company's own internal factors and the impact of external policies. The extent and manner of fundamental impacts also vary, making stock price predictions very difficult. Based on this, this article first introduces the research significance of the stock market prediction framework, and then conducts academic research and analysis on two key sentences of stock market prediction and artificial intelligence in stock market prediction. Then this article proposes a constructive algorithm theory, and finally conducts a simulation comparison experiment and summarises and discusses the experiment. Research results show that the neural network prediction method is more effective in stock market prediction; the minimum training rate is generally 0.9; the agency's expected dilution rate and the published stock market dilution rate are both around 6%. Full Article
stem Navigating the digital frontier: a systematic review of digital governance's determinants in public administration By www.inderscience.com Published On :: 2024-10-29T23:20:50-05:00 The aim of the study is to examine the determinants of digitalisation in public sector. This research is particularly relevant as digital transformation has become a crucial factor in modernising public sector and enhancing service delivery to citizens. The method of the systematic literature review (SLR) was implemented by searching documents on the Scopus database. The initial research reached the 7902 documents and after specifying the keywords the authors found 207 relevant documents. Finally; after the careful read of their abstracts and the use of inclusion and exclusion criteria; the most cited and relevant 32 papers constituted the final sample. Findings highlighted the focus of the literature on technological factors such as the sense of trust and safety as well as the ease of use in the adoption of digital governance; emphasising the need for effective; trustworthy and user-friendly digital services. The most discussed internal factors were leadership and organisational culture. The study offers a deeper understanding of the factors that shape the successful implementation of digital governance initiatives. Full Article
stem International Journal of Business Information Systems By www.inderscience.com Published On :: Full Article
stem From Requirements to Code: Issues and Learning in IS Students’ Systems Development Projects By Published On :: Full Article
stem E-portfolio Assessment System for an Outcome-Based Information Technology Curriculum By Published On :: Full Article
stem Algorithm Visualization System for Teaching Spatial Data Algorithms By Published On :: Full Article
stem Study of the Impact of Collaboration among Teachers in a Collaborative Authoring System By Published On :: Full Article
stem Designing a Network and Systems Computing Curriculum: The Stakeholders and the Issues By Published On :: Full Article
stem Making Information Systems less Scrugged: Reflecting on the Processes of Change in Teaching and Learning By Published On :: Full Article
stem A Hybrid Approach for Selecting a Course Management System: A Case Study By Published On :: Full Article
stem Re-purposing Google Maps Visualisation for Teaching Logistics Systems By Published On :: Full Article
stem A Critical Analysis of Active Learning and an Alternative Pedagogical Framework for Introductory Information Systems Courses By Published On :: Full Article
stem Using the Work System Method with Freshman Information Systems Students By Published On :: Full Article
stem Secure E-Examination Systems Compared: Case Studies from Two Countries By Published On :: 2017-04-12 Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment. Full Article
stem Learning by Doing: Twenty Successful Active Learning Exercises for Information Systems Courses By Published On :: 2017-01-19 Aim/Purpose: This paper provides a review of previously published work related to active learning in information systems (IS) courses. Background: There are a rising number of strategies in higher education that offer promise in regards to getting students’ attention and helping them learn, such as flipped classrooms and offering courses online. These learning strategies are part of the pedagogical technique known as active learning. Active learning is a strategy that became popular in the early 1990s and has proven itself as a valid tool for helping students to be engaged with learning. Methodology: This work follows a systematic method for identifying and coding previous research based on an aspect of interest. The authors identified and assessed research through a search of ABI/Inform scholarly journal abstracts and keywords, as well as additional research databases, using the search terms “active learning” and “information systems” from 2000 through June 2016. Contribution: This synthesis of active learning exercises provides guidance for information technology faculty looking to implement active learning strategies in their classroom by demonstrating how IS faculty might begin to introduce more active learning techniques in their teaching as well as by presenting a sample teaching agenda for a class that uses a mix of active and passive learning techniques to engage student learning. Findings: Twenty successful types of active learning exercises in IS courses are presented. Recommendations for Practitioners : This paper offers a “how to” resource of successful active learning strategies for IS faculty interested in implementing active learning in the classroom. Recommendation for Researchers: This work provides an example of a systematic literature review as a means to assess successful implementations of active learning in IS. Impact on Society: An updated definition of active learning is presented as well as a meaningful list of exercises that encourage active learning both inside and outside of the IS classroom. Future Research: In relation to future research, this study highlights a number of opportunities for IS faculty in regards to new active learning activities or trends to study further. Full Article
stem Introductory Information Systems Course Redesign: Better Preparing Business Students By Published On :: 2018-05-29 Aim/Purpose: The dynamic nature of the information systems (IS) field presents educators with the perpetual challenge of keeping course offerings current and relevant. This paper describes the process at a College of Business (COB) to redesign the introductory IS course to better prepare students for advanced business classes and equip them with interdisciplinary knowledge and skills demanded in today’s workplace. Background: The course was previously in the Computer Science (CSC) Department, itself within the COB. However, an administrative restructuring resulted in the CSC department’s removal from the COB and left the core course in limbo. Methodology: This paper presents a case study using focus groups with students, faculty, and advisory council members to assess the value of the traditional introductory course. A survey was distributed to students after implementation of the newly developed course to assess the reception of the course. Contribution: This paper provides an outline of the decision-making process leading to the course redesign of the introductory IS course, including the context and the process of a new course development. Practical suggestions for implementing and teaching an introductory IS course in a business school are given. Findings: Focus group assessment revealed that stakeholders rated the existing introductory IS course of minimal value as students progressed through the COB program, and even less upon entering the workforce. The findings indicated a complete overhaul of the course was required. Recommendations for Practitioners: The subject of technology sometimes requires more than a simple update to the curriculum. When signs point to the need for a complete overhaul, this paper gives practical guidance supplemented with relevant literature for other academicians to follow. Recommendation for Researchers: Students are faced with increasing pressure to be proficient with the latest technology, in both the classroom where educators are trying to prepare them for the modern workplace, as well as the organization which faces an even greater pressure to leverage the latest technology. The newly designed introductory IS course provides students, and eventually organizations, a better measure of this proficiency. Future Research: Future research on the efficacy of this new course design should include longitudinal data to determine the impact on graduates, and eventually the assessment of those graduates’ performance in the workplace. Full Article
stem Design and Delivery of an Online Information Systems Management Course for MBA Programs By Published On :: 2020-07-06 Aim/Purpose: In this paper, we present our experience in design and delivery of a graduate Information Systems Management (ISM) course in an online MBA program. Also presented are a detailed examination of the design and delivery of the online course, survey results of students’ perceptions and backgrounds, course evaluation results, best practices and lessons learned, and potential changes and future actions. Background: This graduate ISM course needs to not only cover a broad range of dynamic technology and business topics, but also strike a balance between the width and depth of the content. Effective course design and delivery are critical to improved teaching and learning, especially when the course is delivered online. Methodology: We provided a comprehensive review of the related literature to develop guidelines for the design and delivery of our ISM course; we collected survey data to evaluate the students’ backgrounds and their perceptions of the course; we used data analysis and content analysis methods to assess the course evaluation results. Contribution: A review of the related literature indicates that IS researchers and educators have not adequately studied online graduate education. Given the importance of the graduate ISM course in most MBA programs, and the lack of attention from the IS community, it is critical to address this gap in the research. We believe we have done so with this paper. Findings: The paper’s major findings are embedded in a detailed examination of the design and delivery of the online course, survey results of students’ perceptions and backgrounds, course evaluation results, best practices and lessons learned, and potential changes and future actions. Recommendations for Practitioners: Even though our experience may not be fully applicable to other institutions, we hope our IS colleagues can learn from the design and delivery of this online course, as well as our best practices and lessons learned to improve the teaching and learning effectiveness in IS online graduate education, in general. Furthermore, we provide instructors with an actionable framework onto which they can map their current course offering, and compare their current pedagogical offering to literature driven best practices for ISM courses, in particular. Recommendation for Researchers: It is our hope that the design and delivery of this online course, and our best practices and lessons learned can inspire our IS colleagues to search for innovative ways to improve the teaching and learning effectiveness in IS online graduate education. In addition, we distill a literature driven framework for ISM courses design and delivery that can help researchers frame their pedagogical research questions. Impact on Society: The online course in this study prepares students for more efficiently and effectively delivering IT systems in organizations. Many MBA students work for non-profits and other socially-focused organizations and are able to use the skills learned in the course for the betterment of society. Future Research: We will continue to monitor the impact of the changes on student learning effectiveness and attempt to identify additional innovative ways to improve the design and delivery of this online ISM course. Full Article
stem Incorporating Kinesthetic Learning into University Classrooms: An Example from Management Information Systems By Published On :: 2020-03-27 Aim/Purpose: Students tend to learn best when an array of learning styles is used by instructors. The purpose of this paper is to add, to introduce, and to apply the concepts of kinesthetic learning and learning structures to university and STEM education. Background: The study applies the concept of kinesthetic learning and a learning structure called Think-Pair-Share to an experiential exercise about Moore’s Law in an introductory MIS classroom. The paper details the exercise and each of its components. Methodology: Students in two classes were asked to complete a short survey about their conceptual understanding of the course material before and after the experiential exercise. Contribution: The paper details the benefits of kinesthetic learning and learning structures and discusses how to apply these concepts through an experiential exercise used in an introductory MIS course. Findings: Results indicate that the kinesthetic learning activity had a positive impact on student learning outcomes. Recommendations for Practitioners: University educators can use this example to structure several other learning activities that apply kinesthetic learning principles. Recommendation for Researchers: Researchers can use this paper to study more about how to incorporate kinesthetic learning into education, and about teaching technology concepts to undergraduate students through kinesthetic learning. Impact on Society: The results of this study may be extremely beneficial for the university and STEM community and overall academic business community. Future Research: Researchers should consider longitudinal studies and other ways to incorporate kinesthetic learning activities into education. Full Article