Encyclopedia of Information Science and Technology, Second EditionKhosrow-Pour, Mehdi As research advances in computing technology continue to accelerate, so too do the emerging opportunities, issues, and challenges facing individuals, organizations, and societies concerning the utilization and management of technology. This change-driven environment creates a critical need for a comprehensive, up-to-date reference to the full range of concepts, issues, methods, technologies, and trends associated with the field. The Encyclopedia of Information Science and Technology, Second Edition is a matchless compendium of over 750 authoritative, research-based entries/chapters contributed by nearly 1,200 researchers and experts from 60 countries on a complete range of topics that, together, define the contemporary state of knowledge on technology and its organizational, managerial, behavioral, and social implications. This indispensable reference work is also enhanced with thorough definitions of more than 6,000 technical and managerial terms, as well as an exhaustive reference section that directs researchers, scholars, students, and practitioners to more than 17,500 additional sources for further reading and research. An essential addition to any academic library's reference collection, this discipline defining encyclopedia will serve research needs in numerous fields that are affected by the rapid pace and profound impact of technological change. |
Contents
lxvi | |
1 | |
8 | |
14 | |
20 | |
25 | |
30 | |
37 | |
Intelligent Information Systems | 2118 |
Intelligent Software Agents and MultiAgent Systems | 2126 |
Intelligent Agents and Their Applications | 2132 |
Intelligent Software Agents in ECommerce | 2137 |
Intelligent Technologies for Tourism | 2141 |
Interactive Television Context and Advertising Recall | 2147 |
Interface Design Issues for Mobile Commerce | 2153 |
International Digital Studies Approach for Examining International Online Interactions | 2159 |
41 | |
46 | |
53 | |
59 | |
65 | |
72 | |
78 | |
83 | |
88 | |
93 | |
99 | |
104 | |
Agile Knowledge Management | 112 |
Agile Methodology Adoption | 118 |
Alignment of Business and Knowledge Management Strategy | 124 |
Alignment with Sound Relationships and SLA Support | 130 |
Ambient Intelligence in Perspective | 136 |
Analysis and Modelling of Hierarchical Fuzzy Logic Systems | 141 |
Anonymous Communications in Computer Networks | 148 |
Ant Colony Algorithms for Data Classification | 154 |
Antecedents of Trust in Online Communities | 160 |
Anytime Anywhere Mobility | 164 |
Application of Cognitive Map in Knowledge Management | 169 |
Application of Fuzzy Logic to Fraud Detection | 177 |
Application Service Provision for Intelligent Enterprises | 182 |
Applications for Data Mining Techniques in Customer Relationship Management | 188 |
Applying a Teaching Strategy to Create a Collaborative Educational Mode | 193 |
Applying Evaluation to Information Science and Technology | 200 |
An Approach to Optimize Multicast Transport Protocols | 206 |
Approaches to Telemedicine | 212 |
Architecture Methods and Frameworks Overview | 218 |
Architectures for Rich Internet RealTime Games | 226 |
Archival Issues Related to Digital Creations | 232 |
Artificial Intelligence and Investing | 237 |
Artificial Intelligence Applications in Tourism | 241 |
Assessing Critical Success Factors of ERP Implementation | 248 |
Assessing ERP Risks and Rewards | 256 |
Association Rules Mining for RetailOrganizations | 262 |
Attribute Grammars and Their Applications | 268 |
AudienceDriven Design Approach for Web Systems | 274 |
Audio Analysis Applications for Music | 279 |
Authentication Methods for Computer Systems Security | 288 |
Autognomic Intellisite | 294 |
Automation of American Criminal Justice | 300 |
Autopoietic Approach for InformationSystem and Knowledge ManagementSystem Development | 303 |
Bankruptcy Prediction through Artificial Intelligence | 308 |
Barriers to Successful Knowledge Management | 315 |
Benefits Realization through the Treatment of Organizational Issues | 322 |
Best Practices for IST Supervisors | 329 |
Better Executive Information with the Dashboard Approach | 335 |
Bibliomining for Library DecisionMaking | 341 |
Biometric Authentication | 346 |
Biometric Identification Techniques | 355 |
Biometric Paradigm Using Visual Evoked Potential | 362 |
Biometric Technologies | 369 |
Blended Learning Models | 375 |
Bonded Design | 383 |
Bridging the Digital Divide in Scotland | 389 |
A Brief Introduction to Sociotechnical Systems | 394 |
Building and Management of Trust inNetworked Information Systems | 401 |
Building Educational Technology Partnerships through Participatory Design | 410 |
Building Local Capacity via Scaleable WebBased Services | 415 |
Building PoliceCommunity Relations through Virtual Communities | 421 |
Building Secure and Dependable Online Gaming Applications | 428 |
Building Wireless Grids | 433 |
Business Informatization Level | 438 |
Business IT Systems Implementation | 445 |
Business Model Application of UML Stereotypes | 451 |
Business Models for Municipal Broadband Networks | 457 |
Business Process and Workflow Modeling in Web Services | 466 |
Business Processes and Knowledge Management | 471 |
Business Relationships and Organizational Structures in EBusiness | 477 |
Business Strategies for Outsourcing Information Technology Work | 483 |
BusinesstoConsumer Electronic Commerce in Developing Countries | 489 |
Challenges in Data Mining on Medical Databases | 502 |
Challenges of Interoperability in an Ecosystem | 512 |
Characteristics and Technologies of Advanced CNC Systems | 519 |
Chief Knowledge Officers | 527 |
A Classical Uncertainty Principle for Organizations | 532 |
A Classification of Approaches to WebEnhanced Learning | 538 |
Classification of Semantic Web Technologies | 545 |
Client Expectations in Virtual Construction Concepts | 556 |
Cluster Analysis Using Rough Clustering and kMeans Clustering | 561 |
Clustering Algorithms for Data Streams | 566 |
Cognitive Research in Information Systems | 572 |
A CognitivelyBased Framework for Evaluating Multimedia Systems | 578 |
Collaborative Virtual Environments | 583 |
Combination of Forecasts in Data Mining | 589 |
Combining Local and Global Expertise in Services | 594 |
Communicability of Natural Language in Software Representations | 601 |
Communication Integration in VirtualConstruction | 607 |
A Comparison of Data Modeling in UML and ORM | 613 |
Completeness Concerns in Requirements Engineering | 619 |
Complex Organizations and InformationSystems | 625 |
Complexity Factors in Networked and Virtual Working Environments | 634 |
Computational Biology | 641 |
Computer Attitude and Anxiety | 647 |
Computer Music Interface Evaluation | 654 |
ComputerAided Diagnosis of Cardiac Arrhythmias | 661 |
Computing Curriculum Analysis and Development | 667 |
ConceptOriented Programming | 672 |
Concepts and Dynamics of the Application Service Provider Industry | 681 |
Conceptual Commonalities in Modeling of Business and IT Artifacts | 686 |
Consistent Queries over Databases withIntegrity Constraints | 691 |
Constructionist Organizational Data Mining | 696 |
Constructivism in Online Distance Education | 701 |
Constructivist Apprenticeship throughAntagonistic Programming Activities | 708 |
Contactless Payment with RFID and NFC | 715 |
Contemporary Concerns of Digital Divide in an Information Society | 722 |
Contemporary Instructional Design | 728 |
Contemporary Issues in Teaching and Learning with Technology | 732 |
Contemporary ITAssisted Retail Management | 737 |
ContentBased Image Retrieval | 744 |
ContentBased Retrieval Concept | 750 |
A ContentSensitive Approach to Search in Shared File Storages | 755 |
ContextAware Framework for ERP | 762 |
Contingency Theory AgentBased Systems and a Virtual Advisor | 766 |
Contributions of Information TechnologyTools to Projects Accounting and Financing | 772 |
Application of the Intelligence Continuum for Emergency and Disaster Scenarios | 781 |
Creating Software System Context Glossaries | 789 |
Creating Superior Knowledge Discovery Solutions | 795 |
Credit Risk Assessment and Data Mining | 800 |
Critical Realism as an Underlying Philosophy for IS Research | 806 |
Critical Realist Information Systems Research | 811 |
Critical Success Factors for DistanceEducation Programs | 818 |
Critical Success Factors for EHealth | 824 |
Critical Trends Tools and Issues in Telecommunications | 831 |
CrossCultural Challenges for InformationResources Management | 840 |
CrossCultural Research in MIS | 847 |
Cultural Diversity in Collaborative Learning Systems | 852 |
Cultural Issues in the Globalisation of Distance Education | 858 |
Cultural Motives in Information Systems Acceptance and Use | 864 |
Culture and Anonymity in GSS Meetings | 872 |
Current Network Security Technology | 879 |
Current Practices in Electroencephalogram Based BrainComputer Interfaces | 888 |
Customer Relationship Management and Knowledge Discovery in Database | 902 |
Data Communications and ELearning | 908 |
Data Dissemination in Mobile Databases | 914 |
Data Mining | 921 |
Data Mining in Franchising | 927 |
Data Mining in Tourism | 936 |
Data Streams as an Element of Modern Decision Support | 941 |
Database Benchmarks | 950 |
Database Integration in the Grid Infrastructure | 955 |
Database Integrity Checking | 961 |
Database Support for MCommerce and LCommerce | 967 |
Decision Support Systems in Small Businesses | 974 |
DecisionMaking Support Systems | 978 |
Delivering WebBased Education | 985 |
Democratic EGovernance | 990 |
Departure of the Expert Systems Project Champion | 996 |
Deploying Pervasive Technologies | 1001 |
Deriving Formal Specifications from Natural Language Requirements | 1007 |
Design and Development of Communities ofWeb Services | 1024 |
Design and Implementation of Scenario Management Systems | 1030 |
Design Levels for Distance and Online Learning | 1040 |
Design Patterns from Theory to Practice | 1047 |
Designing Agents with Negotiation Capabilities | 1053 |
Designing LearnerCentered Multimedia Technology | 1059 |
Designing Web Systems for Adaptive Technology | 1065 |
Developing a Web Service Security Framework | 1072 |
Developing an Effective Online EvaluationSystem | 1079 |
Developing the Enterprise Architect Perspective | 1085 |
Developing Trust in Virtual Teams | 1092 |
Diffusion of ELearning as an Educational Innovation | 1097 |
A DiffusionBased Investigation into the Use of Lotus Domino Discussion Databases | 1101 |
Digital Asset Management Concepts | 1108 |
From Digital Divides to Digital Inequalities | 1114 |
Digital GameBased Learning in Higher Education | 1120 |
Digital Identity in Current Networks | 1125 |
A New Research Agenda | 1133 |
Digital Literacy and the Position of the EndUser | 1142 |
Digital Video Broadcasting Applications for Handhelds | 1147 |
Digital Watermarking Techniques | 1153 |
Distance Education Initiatives Apart from the PC | 1162 |
Distance Education Teaching Methods in Childcare Management | 1168 |
Distance Learning Overview | 1174 |
Distributed Construction through Participatory Design | 1181 |
Distributed Geospatial Processing Services | 1186 |
Distributed Systems for Virtual Museums | 1194 |
A Duplicate Chinese Document ImageRetrieval System | 1203 |
Dynamic Taxonomies for Intelligent Information Access | 1209 |
EBook Technology in Libraries | 1216 |
EBusiness Systems Security in Intelligent Organizations | 1222 |
ECollaboration in Organizations | 1227 |
ECommerce Taxation Issues | 1232 |
EContracting Challenges | 1237 |
eCRM Marketing Intelligence in a Manufacturing Environment | 1244 |
Education for Library and Information Science Professionals | 1251 |
The Effect of Sound Relationships on SLAs | 1255 |
Effective Leadership of Virtual Teams | 1260 |
Effective Learning Through Optimum Distance Among Team Members | 1268 |
Effective Virtual Teams | 1272 |
Mobile Agents Approach in ECommerce System | 1279 |
Effects of Extrinsic Rewards on Knowledge Sharing Initiatives | 1287 |
Efficient Multirate Filtering | 1294 |
From EGovernance Towards ESocietal Management | 1300 |
EGovernment and Digital Divide in Developing Countries | 1310 |
EGovernment and EDemocracy in the Making | 1318 |
ELearning Adaptability and Social Responsibility | 1323 |
Electronic Government and Integrated Library Systems | 1329 |
Electronic Marketplace Support for B2B Business Transactions | 1335 |
Electronic Payment | 1341 |
ELibraries and Distance Learning | 1349 |
The Slowly Evolving Platform Undrepinning EBusiness | 1354 |
Emergence Index in Image Databases | 1361 |
Emerging Online EPayment and Issues of Adoption | 1366 |
ENegotiation Support Systems Overview | 1374 |
Energy Management in Wireless Networked Embedded Systems | 1381 |
Enhancing Workplaces with Constructive Online Recreation | 1387 |
Enterprise Resource Planning ERP Maintenance Metrics for Management | 1392 |
Enterprise Resource Planning and Integration | 1398 |
Entrepreneurship in the Internet | 1405 |
Envisaging Business Integration in the Insurance Sector | 1412 |
ERP and the BestofBreed Alternative | 1420 |
An Extended Version | 1426 |
Establishing the Credibility of Social Web Applications | 1432 |
ETechnology Challenges to Information Privacy | 1438 |
Ethical Issues in Conducting Online Research | 1443 |
Ethics of New Technologies | 1450 |
Evaluating ComputerSupported Learning Initiatives | 1454 |
Evaluating UML Using a Generic Quality Framework | 1459 |
Evaluating Computer Network Packet InterArrival Distributions | 1465 |
Evolution of PostSecondary Distance Education | 1471 |
Executive Judgment in EBusiness Strategy | 1477 |
To Share or Not to Share | 1483 |
Exploiting Context in Mobile Applications | 1491 |
Exploiting the Strategic Potential of Data Mining | 1498 |
Extensions to UML Using Stereotypes | 1505 |
Extreme Programming for Web Applications | 1510 |
Facilitating Roles an EInstructor Undertakes | 1516 |
Factors for Global Diffusion of the Internet | 1522 |
Faculty Competencies and Incentives for Teaching in ELearning Environments | 1527 |
Financial Trading Systems Using Artificial Neural Networks | 1532 |
Focused Requirements Engineering Method for Web Application Development | 1537 |
A Formal Definition of Information Systems | 1546 |
Formal Development of Reactive AgentBased Systems | 1555 |
Formalization Process in Software Development | 1559 |
Foundations for MDA Case Tools | 1566 |
A Framework for Communicability of Software Documentation | 1574 |
Framing Political Personal Expression on the Web | 1580 |
Free and Open Source Software | 1586 |
Functional and ObjectOriented Methodology for Analysis and Design | 1592 |
Fundamentals of Multirate Systems | 1601 |
Fuzzy and Probabilistic ObjectOriented Databases | 1606 |
Genetic Algorithms in Multimodal Search Space | 1621 |
Geographic Information Systems as Decision Tools | 1630 |
Geography and Public Health | 1634 |
Geospatial Information Systems and Enterprise Collaboration | 1646 |
Geospatial Interoperability | 1652 |
GIS and Remote Sensing in Environmental Risk Assessment | 1659 |
Global Digital Divide | 1664 |
Global Software Team and Inexperienced Software Team | 1671 |
Globalization of Consumer ECommerce | 1678 |
Governance Structures for IT in the Health Care Industry | 1685 |
Government Intervention in SMEs ECommerce Adoption | 1689 |
Graph Encoding and Transitive Closure Representation | 1696 |
Handheld Programming Languages and Environments | 1708 |
Handling Extemporaneous Information in Requirements Engineering | 1718 |
Heuristics in Medical Data Mining | 1723 |
HighPerformance Virtual Teams | 1727 |
Highly Available Database Management Systems | 1733 |
Histogram Generation from the HSV Color Space | 1738 |
HistogramBased Compression of Databases and Data Cubes | 1743 |
Historical Overview of Decision Support Systems DSS | 1753 |
History of Artificial Intelligence | 1759 |
History of Artificial Intelligence Before Computers | 1763 |
History of Simulation | 1769 |
How Teachers Use Instructional Design in Real Classrooms | 1777 |
HumanCentric EBusiness | 1782 |
ICT and EDemocracy | 1789 |
ICT Exacerbates the Human Side of the Digital Divide | 1794 |
IDS and IPS Systems in Wireless Communication Scenarios | 1799 |
Image Compression Concepts Overview | 1805 |
Image Segmentation Evaluation in this Century | 1812 |
Image Segmentation in the Last 40 Years | 1818 |
Imaging Advances of the Cardiopulmonary System | 1824 |
The Impact of NetworkBased Parameters on Gamer Experience | 1830 |
The Impact of Risks and Challenges in ECommerce Adoption Among SMEs | 1838 |
Impediments for Knowledge Sharing in Professional Service Firms | 1845 |
Implementation Management of an ECommerceEnabled Enterprise Information System | 1851 |
Implementation of ERP in Human Resource Management | 1856 |
Implementation of Programming Languages Syntax and Semantics | 1863 |
Implementation of Web Accessibility Related Laws | 1870 |
Improving Data Quality in Health Care | 1877 |
Improving Public Sector Service Delivery through Knowledge Sharing | 1882 |
Improving the Usability in Learning and Course Materials | 1887 |
Improving Virtual Teams through Creativity | 1893 |
An Inclusive IST Work Climate | 1899 |
A Review of Ensembles of Classifiers | 1906 |
Indexing Techniques for Spatiotemporal Databases | 1911 |
Indexing Textual Information | 1917 |
Indicators and Measures of EGovernment | 1923 |
IndividualBased Modeling of Bacterial Genetic Elements | 1930 |
Influential Agile Software Parameters | 1938 |
Information and Communication Technology for ERegions | 1944 |
Information Fusion of MultiSensor Images | 1950 |
From Information Management to Knowledge Management | 1957 |
Information Project Assessment by the ANDA Method | 1964 |
Information Resources Development in China | 1973 |
Information Sharing in Innovation Networks | 1979 |
Information Society Discourse | 1985 |
Information Systems and Small Business | 1994 |
Information Systems Curriculum Using an Ecological Model | 1998 |
Information Systems Research Relevance | 2004 |
Information Technology Business Continuity | 2010 |
Information Technology in Franchising | 2016 |
Information Technology in Survey Research | 2024 |
Information Technology Outsourcing | 2030 |
Information Technology Strategy in Knowledge Diffusion Lifecycle | 2036 |
Inheritance in Programming Languages | 2042 |
Innovation Generation and InnovationAdoption | 2048 |
Innovations for Online Collaborative Learning in Mathematics | 2055 |
Innovative Thinking in Software Development | 2061 |
Institutional Isomorphism and New Technologies | 2066 |
Instructional Support for Distance Education | 2072 |
Integrating Domain Analysis into Formal Specifications | 2078 |
Integrating Enterprise Systems | 2086 |
Integrating Natural Language Requirements Models with MDA | 2091 |
Integration of MES and ERP | 2103 |
Integrative Document and Content Management Solutions | 2107 |
Intellectual Property Protection on Multimedia Digital Library | 2113 |
International Standards for Image Compression | 2164 |
Internet Abuse and Addiction in the Workplace | 2170 |
Internet and Multimedia Communications | 2176 |
An Analysis in Nigeria | 2183 |
The Internet and Tertiary Education | 2189 |
Internet Auctions | 2195 |
Internet Diffusion in the Hospitality Industry | 2200 |
Internet WorkPlay Balance | 2205 |
Interventions and Solutions in Gender and IT | 2216 |
An Intranet within a Knowledge Management Strategy | 2221 |
Introduction to Basic Concepts and Considerations of Wireless Networking Security | 2227 |
Intrusion Detection Based on P2P Software | 2232 |
Intrusion Tolerance in Information Systems | 2239 |
Inventing the Future of EHealth | 2244 |
Investigating Internet Relationships | 2249 |
IS Project Management Contemporary Research Challenges | 2254 |
Isochronous Distributed Multimedia Synchronization | 2260 |
Issues in Using WebBased Course Resources | 2266 |
Issues of ELearning in Third World Countries | 2273 |
IT Application Development with Web Services | 2278 |
IT Evaluation Practices in Electronic Customer Relationship Management eCRM | 2285 |
IT Outsourcing Practices in Australia and Taiwan | 2291 |
IT Supporting Strategy Formulation | 2298 |
Key Factors and Implications for EGovernment Diffusion in Developed Economies | 2305 |
Keystroke Dynamics and Graphical Authentication Systems | 2313 |
Knowledge Architecture and Knowledge Flows | 2319 |
Knowledge Combination vs MetaLearning | 2325 |
Knowledge Discovery from Genomics Microarrays | 2332 |
Knowledge Flow Identification | 2337 |
Knowledge Management as Organizational Strategy | 2343 |
Knowledge Management Challenges in the NonProfit Sector | 2348 |
Knowledge Management for Production | 2355 |
Knowledge Management in EGovernment | 2361 |
Knowledge Management Systems Acceptance | 2368 |
Knowledge Management Technology in Local Government | 2373 |
Knowledge Sharing Tools for IT Project Management | 2380 |
A LanguageAction Based Approach to Information Modelling | 2386 |
LeaderFacilitated Relationship Building inVirtual Teams | 2390 |
Leapfrogging an IT Sector | 2396 |
Learnability | 2400 |
Learning Systems Engineering | 2404 |
Legal Issues of Virtual Organizations | 2411 |
Leveraging Complementarity in Creating Business Value for EBusiness | 2414 |
Linguistic Indexing of Images with Database Mediation | 2420 |
Linking Individual Learning Plans to ePortfolios | 2426 |
Linking Information Technology Knowledge Management and Strategic Experimentation | 2431 |
Lip Extraction for Lipreading and Speaker Authentication | 2437 |
A Literacy Integral Definition | 2445 |
Location Information Management in LBS Applications | 2450 |
LocationBased Services | 2456 |
Machine Learning | 2462 |
Machine Learning Through Data Mining | 2469 |
Making Sense of IS Failures | 2476 |
Management Considerations for B2B Online Exchanges | 2484 |
Managing Converging Content in Organizations | 2490 |
Managing IS Security and Privacy | 2497 |
Managing Organizational Knowledge in the Age of Social Computing | 2504 |
Managing Relationships in Virtual Team Socialization | 2510 |
Managing the Integrated Online Marketing Communication | 2517 |
Marketing Vulnerabilities in an Age of Online Commerce | 2525 |
Measurement Issues in Decision Support Systems | 2530 |
Measuring Collaboration in Online Communication | 2537 |
Metrics for the Evaluation of TestDelivery Systems | 2542 |
Micro and Macro Level Issues in Curriculum Development | 2546 |
Migration of Legacy Information Systems | 2551 |
Mobile Ad Hoc Network Security Vulnerabilities | 2557 |
Mobile Ad Hoc Networks | 2562 |
Mobile Agent Authentication and Authorization in ECommerce | 2567 |
Mobile AgentBased Information Systems and Security | 2574 |
Mobile Commerce and the Evolving Wireless Technologies | 2580 |
Mobile Commerce Technology | 2584 |
Mobile Location Services | 2590 |
Mobile Positioning Technology | 2595 |
Mobile Spatial Interaction and Mediated Social Navigation | 2604 |
Mobile Technology Usage in Business Relationships | 2609 |
Mobile Telecommunications and MCommerce Applications | 2614 |
Mobile Payment | 2619 |
MobilityAware Grid Computing | 2626 |
A Model for Characterizing Web Engineering | 2631 |
Modeling ERP Academic Deployment via Adaptive Structuration Theory | 2638 |
Modeling for ELearning Systems | 2646 |
Modeling Information Systems in UML | 2651 |
Modeling Security Requirements for Trustworthy Systems | 2657 |
Models and Techniques for Approximate Queries in OLAP | 2665 |
Models in ELearning Systems | 2671 |
ModelSupported Alignment of IS Architecture | 2676 |
Moderation in GovernmentRun Online Fora | 2682 |
Modern Passive Optical Network PON Technologies | 2689 |
Monitoring Strategies for Internet Technologies | 2698 |
Motivation for Using Microcomputers | 2704 |
Motivational Matrix for Educational Games | 2710 |
Motivations for Internet Use | 2716 |
An Overview | 2728 |
Multiagent Systems in the Web | 2734 |
A Multidisciplinary View of Data Quality | 2741 |
Multimedia Content Adaptation | 2748 |
Multimedia Information Filtering | 2755 |
Multimedia Software Interface Design for SpecialNeeds Users | 2761 |
Music Score Watermarking | 2767 |
NeoSymbiosis | 2773 |
Network Effects of Knowledge Diffusion in Network Economy | 2778 |
Network Worms | 2783 |
Networked Virtual Environments | 2789 |
Neural Networks for Automobile Insurance Pricing | 2794 |
Neural Networks for Intrusion Detection | 2800 |
Neural Networks for Retail Sales Forecasting | 2806 |
New Perspectives on Rewards and Knowledge Sharing | 2811 |
New Technologies in Hospital Information Systems | 2817 |
NextGeneration Enterprise Systems | 2821 |
The Nomological Network and the Research Continuum | 2827 |
Nonlinear Approach to Brain Signal Modeling | 2834 |
Nonspeech AudioBased Interfaces | 2840 |
Object Classification Using CaRBS | 2850 |
ObjectOriented Software Reuse in Business Systems | 2855 |
Observations on Implementing Specializations within an IT Program | 2862 |
Offshore Software Development Outsourcing | 2869 |
OMISBased Collaboration with ServiceOriented Design | 2875 |
On a Design of Narrowband FIR LowPass Filters | 2882 |
One Organization One Strategy | 2888 |
Online Communities and Community Building | 2893 |
Online Communities and Online Community Building | 2899 |
Online Learning as a Form of Accommodation | 2906 |
Online Student and Instructor Characteristics | 2911 |
Organization of Home Video | 2917 |
Organizational Aspects of Cyberloafing | 2923 |
Organizational Assimilation Capacity and IT Business Value | 2929 |
Organizational Hypermedia Document Management Through Metadata | 2934 |
Organizational Project Management Models | 2941 |
An Overview of Asynchronous Online Learning | 2948 |
Overview of Electronic Auctions | 2953 |
An Overview of Enterprise Resource Planning for Intelligent Enterprises | 2958 |
An Overview of Executive Information SystemsEIS Research in South Africa | 2964 |
An Overview of Knowledge Translation | 2971 |
An Overview of SemanticBased Visual Information Retrieval | 2978 |
An Overview of Software Engineering Process and Its Improvement | 2984 |
An Overview of Threats to Information Security | 2990 |
An Overview of Trust Evaluation Models within ECommerce Domain | 2996 |
An Overview of Wireless Network Concepts | 3002 |
Web Ontology Language | 3009 |
Parallel and Distributed Visualization Advances | 3018 |
PatternOriented Use Case Modeling | 3026 |
Patterns in the Field of Software Engineering | 3032 |
Pedagogical Perspectives on MLearning | 3041 |
PeertoPeer Computing | 3047 |
Performance Implications of Pure Applied and Fully Formalized Communities of Practice | 3053 |
Personalization in the Information Era | 3059 |
Personalization Technologies in Cyberspace | 3065 |
Perspectives of Transnational Education | 3072 |
Pervasive Wireless Sensor Networks | 3080 |
Physiologic Adaptation by Means of Antagonistic Dynamics | 3086 |
Policy Frameworks for Secure Electronic Business | 3093 |
Policy Options for EEducation in Nigeria | 3098 |
A Survey of Regression Methods | 3105 |
A Primer on TextData Analysis | 3111 |
Principles of Digital Video Coding | 3119 |
ProcessAware Information Systems for Virtual Teamwork | 3125 |
ProcessBased Data Mining | 3132 |
Project Management and Graduate Education | 3137 |
ProjectBased Software Risk Management Approaches | 3142 |
PROLOG | 3147 |
Prolonging the Aging of Software Systems | 3152 |
Promotion of EGovernment in Japan and Its Operation | 3161 |
Proxy Caching Strategies for Internet Media Streaming | 3166 |
Qualitative Methods in IS Research | 3171 |
Qualitative Spatial Reasoning | 3175 |
Quality Assurance Issues for Online Universities | 3181 |
QualityofService Routing | 3186 |
Quantum Cryptography Protocols for Information Security | 3191 |
Real Time Interface for Fluidized Bed Reactor Simulator | 3205 |
Really Simple Syndication RSS | 3213 |
RealTime Thinking in the Digital Era | 3219 |
Recent Progress in Image and Video Segmentation for CBVIR | 3224 |
Reconciling the Perceptions and Aspirations of Stakeholders in a Technology Based Profession | 3230 |
Reconfigurable Computing Technologies Overview | 3241 |
Referential Constraints | 3251 |
Relating Cognitive ProblemSolving Style to User Resistance | 3258 |
Reliability Growth Models for Defect Prediction | 3263 |
Representational Decision Support Systems Success Surrogates | 3268 |
A Requirement Elicitation Methodology for Global Software Development Teams | 3273 |
Requirements Prioritization Techniques | 3283 |
Researching Technological Innovation in Small Business | 3292 |
Risk Management in the Digital Economy | 3298 |
A Road Map for the Validation Verification and Testing of Discrete Event Simulation | 3306 |
Robustness in Neural Networks | 3314 |
The Role of Business Case Development in the Diffusion of Innovations Theory for Enterprise Information Systems | 3322 |
The Role of EServices in the Library Virtualization Process | 3332 |
The Role of Human Factors in Web Personalization Environments | 3338 |
The Role of Information in the Choice of IT as a Career | 3345 |
Satellite Network Security | 3350 |
SatelliteBased Mobile Multiservices Platform | 3356 |
Sectoral Analysis of ICT Use in Nigeria | 3364 |
Security and Privacy in Social Networks | 3369 |
Security and Reliability of RFID Technology in Supply Chain Management | 3377 |
Security for Electronic Commerce | 3383 |
Security Issues in Distributed Transaction Processing Systems | 3392 |
Security Issues in Mobile Code Paradigms | 3396 |
SecurityBased Knowledge Management | 3401 |
Self Organization Algorithms for Mobile Devices | 3406 |
SelfOrganization in Social Software for Learning | 3413 |
Semantic Video Analysis and Understanding | 3419 |
Semantic Web and ETourism | 3426 |
Semantic Web in EGovernment | 3433 |
Semantic Web Uncertainty Management | 3439 |
Service Description Ontologies | 3445 |
Shortest Path Routing Algorithms in Multihop Networks | 3452 |
Signal Processing Techniques for Audio and Speech Applications | 3457 |
Simulation for Supporting Business Engineering of Service Networks | 3462 |
Simulation Model of Ant Colony Optimization for the FJSSP | 3468 |
Simulation Games and Virtual Environments in IT Education | 3475 |
Smart Assets Through Digital Capabilities | 3480 |
Smart Learning through Pervasive Computing Devices | 3486 |
SMEs Amidst Global Technological Changes | 3492 |
Social and Legal Dimensions of Online Pornography | 3496 |
Social Learning Aspects of Knowledge Management | 3501 |
SocioCognitive Model of Trust | 3508 |
Sociological Insights in Structuring Australian Distance Education | 3513 |
Software Agents in ECommerce Systems | 3520 |
Software and Systems Engineering Integration | 3525 |
The Software Industry in Egypt as a Potential Contributor to Economic Growth | 3531 |
Software Reuse in Hypermedia Applications | 3538 |
Solutions for Wireless City Networks in Finland | 3542 |
Spatial Data Infrastructures | 3548 |
Spatial Search Engines | 3554 |
Sponsorship in IT Project Management | 3559 |
Spreadsheet End User Development and Knowledge Management | 3564 |
Standardization in Learning Technology | 3570 |
Staying Up to Date with Changes in IT | 3577 |
Strategic Alignment Between Business and Information Technology | 3582 |
Strategic IT Investment Decisions | 3589 |
Strategic Knowledge Management in PublicOrganizations | 3594 |
A Structured Approach to Developing a Business Case for New Enterprise Information Systems | 3600 |
A Study of Image Engineering | 3608 |
Supporting ECommerce Strategy through Web Initiatives | 3616 |
Supporting Quality of Service for Internet Multimedia Applications | 3622 |
Supporting RealTime Services in Mobile AdHoc Networks | 3629 |
Supporting the Evaluation of Intelligent Sources | 3635 |
Supporting the Mentoring Process | 3641 |
System Dynamics Based Technology for Decision Support | 3647 |
Systems Thinking and the Internet from Independence to Interdependence | 3651 |
Taxonomy of C2C ECommerce Venues | 3663 |
Technical Communication in an Information Society | 3668 |
Technological and Social Issues of ECollaboration Support Systems | 3674 |
Technologies for Information Access and Knowledge Management | 3680 |
Technologies in Support of Knowledge Management Systems | 3686 |
Technology and Transformation in Government | 3695 |
Technology Discourses in Globalization Debates | 3700 |
Technology Leapfrogging for Developing Countries | 3707 |
TechnologyEnhanced Progressive Inquiry in Higher Education | 3714 |
Teens and Information and Communication Technologies | 3721 |
Telemedicine Applications and Challenges | 3728 |
Telescopic Ads on Interactive Digital Television | 3734 |
Testing Graphical User Interfaces | 3739 |
Third Places in the Blackosphere | 3745 |
3D Digitization Methodologies for CulturalArtifacts | 3750 |
3D Graphics Standardization in MPEG4 | 3757 |
TLearning Technologies | 3765 |
Toward a Framework of Programming Pedagogy | 3772 |
Toward Societal Acceptance of ArtificialBeings | 3778 |
Transforming Recursion to Iteration in Programming | 3784 |
Transmission of Scalable Video in Computer Networks | 3789 |
The Trends and Problems of Virtual Schools | 3795 |
Trends in Information Technology Governance | 3801 |
Trends in the Higher Education ELearning Markets | 3807 |
Triangular Strategic Analysis for Hybrid ERetailers | 3814 |
Triune Continuum Paradigm | 3821 |
Trust in B2C ECommerce Interface | 3826 |
Trust Management in Virtual Product Development Networks | 3831 |
US Disabilities Legislation Affecting Electronic and Information Technology | 3840 |
US Information Security Law and Regulation | 3845 |
Ubiquitous Computing and Communication for Product Monitoring | 3851 |
Underwater Wireless Networking Techniques | 3858 |
Underwriting Automobile Insurance Using Artificial Neural Networks | 3865 |
Unified Modeling Language 20 | 3871 |
A UniversityCommunity Partnership to Bridge the Digital Divide | 3880 |
Updated Architectures for the Integration of Decision Making Support Functionalities | 3884 |
Usability Engineering of UserCentered Web Sites | 3890 |
Usability Evaluation of ELearning Systems | 3897 |
Usable MCommerce Systems | 3904 |
Use Cases in the UML | 3909 |
The Use of Electronic Banking and New Technologies in Cash Management | 3914 |
The Use of ICTs in Small Business | 3921 |
User Modeling and Personalization of Advanced Information Systems | 3928 |
User Profile Modeling and Learning | 3934 |
Using an Architecture Approach to Manage Business Processes | 3940 |
Using Audience Response Systems in the Classroom | 3947 |
Using Ontology and User Profile for Web Services Query | 3953 |
Using Prolog for Developing Real World Artificial Intelligence Applications | 3960 |
Video ContentBased Retrieval | 3965 |
Videoconferencing for Schools in the Digital Age | 3970 |
Viewing TextBased Group Support Systems | 3975 |
Virtual Communities of Practice | 3981 |
Virtual Communities of Practice for Health Care Professionals | 3986 |
Virtual Corporations | 3992 |
Virtual Organization | 3997 |
A Virtual Reality System for Learning Science in a Science Center | 4004 |
Virtual Teams | 4012 |
Virtual Work Research Agenda | 4018 |
Virtual Work Trust and Rationality | 4024 |
Virtualization and Its Role in Business | 4028 |
Visual Medical Information Analysis | 4034 |
Web Access by Older Adult Users | 4041 |
Web Accessibility and Compliance Issues | 4047 |
WebBased GIS | 4053 |
Web Caching | 4058 |
Web Portal Research Issues | 4064 |
Web Services Coordination for Business Transactions | 4070 |
Web Usability | 4077 |
Web Usage Mining | 4082 |
WebBased 3D Real Time Experimentation | 4088 |
WebBased Algorithm and Program Visualization for Education | 4093 |
WebBased Customer Loyalty Efforts and Effects on EBusiness Strategy | 4099 |
WebBased Expert Systems | 4105 |
WebBased Personal Digital Library | 4111 |
A WebEnabled Course Partnership | 4119 |
A WebGeographical Information System toSupport Territorial Data Integration | 4125 |
Wireless Ad Hoc Networking | 4130 |
Wireless Networks for Vehicular Support | 4135 |
Wireless Technologies to Enable Electronic Business | 4141 |
The World Wide Web and CrossCultural Teaching in Online Education | 4146 |
ii | |
Other editions - View all
Encyclopedia of Information Science and Technology, Volume 1 Mehdi Khosrowpour No preview available - 2005 |