The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices create learning opportunities to which you cannot remain indifferent. If you combine these capabilities to specific needs of students and teachers, you will be on the path towards academic success. It was in this context that Letrinhas arose, an information system aimed at improving students' reading literacy developed by the Polytechnic Institute of Tomar (IPT) in response to a challenge...
The security community has established a number of knowledge sources, including security catalogues and controls, that capture security expertise and can support elicitation of security requirements. Providing additional guidance on how and when to leverage the security information available in the existing knowledge sources in the context of the given system can support security requirements engineering...
The relevance of usability with regard to Blended Shopping concepts is addressed in this paper. First an introduction into usability as a crucial acceptance factor for applications is given. Then Blended Shopping - the combination of traditional retail and eCommerce - in practice is analyzed. Research findings presented reveal that merchants do not apply Blended Shopping concepts in practice until...
A well-designed field trip can promote active learning and reinforce classroom materials (Kisiel, 2006). Few studies examine the potential of using social media to enhance IS field trip experiences by promoting active and collaborative learning. One major barrier to the exploitation of this potential is the adoption of social media by students as a learning tool to enhance field trip experiences....
Growing spontaneous mobility and decreasing affinity to automobile ownership in younger generations demand for an integrated service for intermodal mobility. In areas with lacking coverage of traditional public transportation, extending the coverage by integrating alternative services like car sharing, seems promising. Because of the very different nature, the collaboration between traditional public...
Higher Education environment is moving to a data-oriented philosophy, as it has happened in general in other contexts, transforming the society in general and popularizing the term analytics. The motivation factor is the paradigm shift that is being experimented in the higher education context, with a high increment of the competition at international level and with the irruption of new kinds of teaching,...
Access control is an important technical method to protect the sensitive data in the information system. This paper mainly focuses on the issue of privacy preserving for patients' information in HIS. On the basis of providing hospital employees necessary patient information that can support the treatment, the proposed Knowledge-Constrained Role Based Access Control (KC-RBAC) model tries to reduce...
The increasing growth of cities, the concurrent trend toward "smart" environments put the topic of mobility into the focus of information service developers. The increasing prevalence of smart devices allows an enhanced automated harvesting of data that can be processed to satisfy information needs of the actors within the mobility system thus, providing an environment for frequent interaction...
As the Internet has become a popular avenue for users to seek health-related information, the prevalence of online rumors represents a growing concern. If users trust and share bogus health information on the Internet, repurcussions could be serious. Therefore, this paper examines how users' intention to trust and share rumors vary as a function of three factors: length, sentiment of rumors, and presence...
Process Mining aims to extract information from event logs to highlight the underlying business processes. It is useful in situations where there is no detailed and complete knowledge of how an overall system works, such as in a hospital where most processes are complex and ad-hoc. Many Process Mining discovery techniques have been proposed so far, but many challenges are still to be faced. Implicit...
Situational Method Engineering aims at constructing methods adapted to a given situation, either by a construction from a set of predefined method components or by a customization of an existing method using different techniques: configuration, extension, reduction, and so on. However, these techniques are still limited in practice, as considered complicated and heavy to implement. In this paper,...
Information systems become more accessible as a service offered to anybody, anywhere, at any time, via almost any device and computing platform. The continuous growth and the heterogeneity of these devices induce diverse user experiences depending on the device and challenge designers to creating methods and tools for engineering usable, yet accessible, information systems. Instead of repeating a...
Web 2.0 resources such as online forum messages are of growing value in supporting education and research, and new information systems are aimed at synthesizing these resources into environments facilitating collaboration, learning and other goals. To support the automatic identification of valuable Web 2.0 resources, this paper presents an approach for estimating the information value of messages...
Information and Communication Technology (ICT) spearheads a country's social and economic development and studies have established that there is a relationship between ICTs and a country's social and economic development. Development of ICT policies in African countries has been through the adoption of prescribed models: blue print and an incremental approach based on the blue print approach. Despite...
Human activity is almost always intentional. By understanding why user-generated events are happening and what purposes they serve, a system can offer a significantly improved and more engaging experience. Analyzing user actions such as clicks can reveal patterns and behaviors. However, understanding the goals behind these actions is a more challenging issue since goals cannot be easily captured....
Cases have become commonplace for learning as they bring a connection to reality though rarely used for assessment. The case-based exam combines learning with assessment in the same instrument. Students familiarize themselves with a pre-exam version of the case while applying their textbook knowledge to the expected questions. The actual exam case adds additional information that invokes higher cognitive...
The overall aim of learning outcomes and competency based education is to improve the efficiency and effectiveness of higher education. It's important to track regularly student's competency acquisition so that the faculty can improve the teaching delivery and adapt the content accordingly. Student based self-assessment of competency tracking on a weekly basis aids faculty to intervene in course delivery...
Symbolic execution can automatically explore different execution paths in a system under test and generate tests to precisely cover them. It has two main advantages—being automatic and thorough within a theory—and has many successful applications. The bottleneck of symbolic execution currently is the computation consumption for complex systems. Compositional Symbolic Execution (CSE) introduces a summarisation...
The advancements in information and communication technologies (ICT), helps to develop the large scale systems that can be used to manage the governance matters all over the world. Although Kingdom of Saudi Arabia, has been involved in number of ongoing projects in the country where IT enabled system are planned to initiate in different sectors as part of the IT policy of the country. However the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.