SlideShare a Scribd company logo
1 of 19
Download to read offline
Breakthrough Discoveries in Information
Technology Research: Advancing Trends
Part of the Advances in Information Technology
Research (AITR) Book Series
Edited By: Mehdi Khosrow-Pour, Information Resources
Management Association, USA

Table of Contents:
Chapter 1: Information Technology/Systems Offshore Outsourcing: Key
Risks and Success Factors
  Mahesh S. Raisinghani, Texas Woman’s University, USA Brandi Starr,
      Texas Woman’s University, USA
  Blake Hickerson, Texas Woman’s University, USA
  Marshelle Morrison, Texas Woman’s University, USA
  Michael Howard, Texas Woman’s University, USA


 The operation of information technology and information systems
     (IT/IS) offshore outsourcing is being increasingly practiced among
     firms that are focusing on core competencies and cost
     effectiveness. With the increase in offshore IT/IS operations, a
     growing number of companies are encountering negative
     experiences and unpredicted results. The analysis performed in
     this chapter reveals the possible risks and perceived success
     factors of companies outsourcing IT/IS operations offshore. The
     major points of interest are operational and strategic risks; legal
     contracts; cultural, security, and financial issues; and noted
     success factors by companies that participate in offshore
     outsourcing. The research indicates the importance of risk
     identification and the formulation of strategic plans that include
     preventive, detective, and corrective control methods of
     implementation and evaluation. Effective methods and metrics for
     measuring the success or failure of IT/IS offshore outsourcing
     operations is expected to be a continuing development with the
     increasing growth of this phenomenon.
Chapter 2: Emerging Trends in Outsourcing

 Tapasya Patki, University of Arizona, Tucson, USA
 A.B. Patki, Government of India, New Delhi, India
 Mahesh Kulkarni, Center for Development of Advanced Computing,
     Pune, India


 Outsourcing has been conventionally viewed as a solution to generate
     quick profits and provide business continuity. The previous
     decades have seen the emergence of the Information Age, where
the key focus was on knowledge acquisition and application. We
      are now progressing towards the era that revolves around
      “concept” development from an era that was information-
      dependent. This age, referred to as the Conceptual Age, will be
      dominated by six new senses: Design, Story, Symphony,
      Empathy, Play and Meaning; and shall focus on the human
      resource development aspects. This creates a need to diverge
      from the current reliance on linear and sequential algorithmic
      practices in outsourcing and to adopt cognition based engineering
      and management approaches. This chapter lays the foundation
      for Offshore Engineering and Management (OEM) and discusses
      estimation issues in OEM that have their roots in software
      engineering. Also, this chapter identifies the limitations of the
      current methodologies from an outsourcing point of view, and
      delineates how they can be deployed effectively for an outsourced
      environment.
Chapter 3: Agile Software Processes for the 24-Hour Knowledge Factory
Environment

 Nathan Denny, University of Arizona, USA
 Igor Crk, University of Arizona, USA
 Ravi Sheshu, University of Arizona, USA


 The growing adoption of outsourcing and offshoring concepts is
     presenting new opportunities for distributed software
     development. Inspired by the paradigm of round-the-clock
     manufacturing, the concept of the 24-hour knowledge factory
     (24HrKF) attempts to make similar transformations in the arena
     of IS: specifically to transform the production of software and
     allied intangibles to benefit from the notion of continuous
     development by establishing multiple collaborating sites at
     strategically selected locations around the globe. As the sun sets
     on one site, it rises on another site with the day’s work being
     handed off from the closing site to the opening site. In order to
     enable such hand offs to occur in an effective manner, new agile
     and distributed software processes are needed, as delineated in
     this chapter.
Chapter 4: Leveraging Knowledge Reuse and Systems Agility in the
Outsourcing Era

 Igor Crk, University of Arizona, USA
 Dane Sorensen, Raytheon Missile Systems, USA
 Amit Mitra, TCS Global Consulting Practice, USA
Collaborative work groups that span multiple locations and time
      zones, or “follow the sun,” create a growing demand for creating
      new technologies and methodologies that enable traditional
      spatial and temporal separations to be surmounted in an effective
      and productive manner. The hurdles faced by members of such
      virtual teams are in three key areas: differences in concepts and
      terminologies used by the different teams; differences in
      understanding the problem domain under consideration; and
      differences in training, knowledge, and skills that exist across the
      teams. These reasons provide some of the basis for the
      delineation of new architectural approaches that can normalize
      knowledge and provide reusable artifacts in a knowledge
      repository.
Chapter 5: Extending the Balanced Scorecard for Outsourcing: The
Goals Alignment Perspective

 Preeti Goyal, Faculty of Management Studies, University of Delhi,
     India
 Bhimaraya A. Metri, Management Development Institute, India


 Alliances, collaborations and networks are synonymous with strategy
      today. Business Process Outsourcing (BPO) is one such type of
      alliance. With increasing reliance on outsourcing, the
      organizational boundaries are blurring. The implications for the
      client organization can be tremendous, as it now relies on an
      outside organization to fulfill its operational objectives. Currently,
      there is no single framework, which can effectively measure
      performance for BPO arrangements. In its present form, the
      Balanced Scorecard (BSC) only addresses, the performance
      measurement needs of a single enterprise and any perspective on
      any external relationships is completely missing. The traditional
      BSC does not suffice as a performance measurement framework
      for BPO. While both the client and the vendor can use a BSC for
      their respective organizations, the strategic objectives of the
      organizations may not be met. In this chapter, the authors
      propose a new perspective as an extension to the BSC, namely
      the goals alignment perspective. Goals alignment of the two
      organizations will enable creation of performance measures that
      will help participating organizations to achieve their respective
      goals.
Chapter 6: Business Process Onshore Outsourcing within the
Community Banking System: An Investigative Study

 B. Dawn Medlin, Appalachian State University, USA Adriana
     Romaniello, Universidad Rey Juan Carlos, Spain
Business processes refer to the activities that are performed within an
     organization that are used in order to produce value for the
     organization and its customers. Through the use of onshore
     outsourcing, banks as do other industries expect several benefits
     such as cost savings and reduction in overhead. Using knowledge
     management concepts, banks can better understand their firm’s
     performance as well as their own needs. This knowledge may also
     lead to the increase of employees’ skill sets. This study surveyed
     members of the North Carolina Bankers Association in order to
     determine what if any of their business processes they selected to
     outsource.
Chapter 7: Offshoring in the Pharmaceutical Industry

 Jason McCoy, Global Seawater, Inc., USA
 Johannes Sarx, ALCIMED, France


 Offshoring has been adopted as a tool for reducing costs and for
     gaining strategic advantages by financial services, software
     development, and other competitive industries. For a variety of
     reasons, the pharmaceutical industry has been slow to take
     advantage of the benefits that offshoring can provide. The
     purpose of this chapter is to explore the internal and exogenous
     factors motivating global pharmaceutical firms to increase and
     expand their sourcing activities. And, instead of discussing global
     sourcing in general, India has been analyzed as a unique and
     explanatory case study for this new, emerging trend. The reasons
     behind this decision include India’s position as a renowned global
     IT hub, the country’s “home grown” biotechnology and
     biopharmaceutical industries, the numerous strategic partnerships
     and offshoring relationships between global and Indian firms, as
     well as its significant advances in IT and information
     management.
Chapter 8: Enhancing e-Business Decision Making: An Application of
Consensus Theory

 William J. Tastle, Ithaca College, New York, USA and University of
      Iceland, Iceland
 Mark J. Wierman, Creighton University, Nebraska, USA


 Statistical analysis is the universally accepted method by which sense
     is created from raw data. Successful requirements determination
     is often dependent upon the gathering customer data over the
Internet, and it may be largely limited to collecting the responses
     such as Yes/No and Likert scale categories. These data are then
     analyzed to identify customer trends or other items of interest to
     management. The data can be useful, but key to their usage is
     the application of suitable mathematical tools. Traditionally little
     more than standard statistics has been used in the analysis of
     ordinal, or category, data. This chapter introduces measures of
     agreement and dissent to the field of e-business analysis and
     shows how ordinal data can be analyzed in meaningful ways.
Chapter 9: Changing Healthcare Institutions with Large Information
Technology Projects

 Matthew W. Guah, Erasmus University Rotterdam, The Netherlands


  This chapter reviews the development of institutional theory in direct
      relations to historical changes within the UK’s National Health
      Service (NHS) with an eye to contributing to the theoretical
      specification of healthcare information processes. This is done
      partly by extending certain paradigms (see Meyer & Rowan,
      1991; Powell & DiMaggio, 1991; Tolbert & Zucker, 1994) through
      a proposed model of causes and consequences of variations in
      levels of institutionalisation in the healthcare industry. It reports
      finding from a 5-year study on the NHS implementation of the
      largest civil ISs worldwide at an estimated cost of $10 billion over
      a 10-year period. The theoretical basis for analysis is developed,
      using concepts drawn from neo-institutionalism, realisation of
      business value, and organisational logic, as well as mixed
      empirical results about the lack of IT investments value in the
      NHS. The findings suggest that large scale, IT change imposed
      upon a highly institutionalised healthcare industry is fraught with
      difficulty mainly because culturally embedded norms, values, and
      behavioural patterns serve to impede centrally imposed initiatives
      to automate clinical working practices. It concludes with a
      discussion about the nature of evaluation procedures in relation to
      the process of institutionalising IS in healthcare.
Chapter 10: Crisis Compliance: Using Information Technology to
Predict, Prevent and Prevail Over Disasters

 Laura Lally, Hofstra University, USA

 This chapter develops the concept of crisis compliance (CC)—defined
     as making appropriate use of IT, and non-IT methodologies to
     predict, prevent, and prevail over disasters. CC emerges from
     Lally’s Target Shield and Weapon Model, which is grounded in the
     theories of crisis management, normal accident theory, and high
reliability organizations. CC is then applied to a case study
     involving Hurricane Katrina, with examples drawn from other
     recent disasters. Emerging IT-based crisis management initiatives
     will be examined with an emphasis on how the impacts of
     Hurricane Katrina could have been mitigated. Recommendations
     for predicting, preventing, and prevailing over future disasters will
     emerge from the analysis.
Chapter 11: Ethical Concerns in Usability Research Involving Children

 Kirsten Ellis, Monash University, Australia
 Marian Quigley, Monash University, Australia
 Mark Power, Monash University, Australia


 This chapter examines the issues in conducting ethical usability
     testing with children including the special complications presented
     by the unique characteristics of children. It outlines the process of
     gaining approval of overseeing bodies to conduct research with
     children and discusses the difficulties in gaining informed consent
     from teachers, parents and the children themselves; protection of
     the research subject from harm and the difficulty of empowering
     children to instigate their right to refuse to participate in the
     research project. The chapter also discusses practical issues
     regarding the research design such as age appropriate practice,
     the duration of testing and recruitment of participants.
Chapter 12: A Generic Framework for Bluetooth Promoted Multimedia
on Demand (BlueProMoD)

 Panayotis Fouliras, University of Macedonia, Greece
 Nikolaos Samaras, University of Macedonia, Greece


 In recent years many technologies have converged to integrated
     solutions and one of the hottest topics has been the deployment
     of wireless personal area networks (WPANs). This chapter
     presents a generic architecture scheme that allows voice and
     other real-time traffic to be carried over longer distances. The
     proposed scheme is a novel framework that combines a wired
     backbone network including Bluetooth access points (APs) with
     the mobile Bluetooth-enabled devices of the end users. This
     scheme is called Bluetooth Promoted Multimedia on Demand
     (BlueProMoD). BlueProMoD is a hybrid network and provides free-
     of-charge communication among customers, multimedia
     advertisements, as well as location-based and other value-added
     services.
Chapter 13: Social Interaction with a Conversational Agent: An
Exploratory Study

 Yun-Ke Chang, Nanyang Technological University, Singapore
 Miguel A. Morales-Arroyo, Nanyang Technological University,
     Singapore
 Mark Chavez, Nanyang Technological University, Singapore
 Jaime Jimenez-Guzman, National University of Mexico, Mexico


  Conversational agents that display many human qualities have
     become a valuable method business uses to communicate with
     online users to supply services or products, to help in online order
     process or to search the Web. The gaming industry and education
     may benefit from this type of interface. In this type of chats,
     users could have different alternatives: text display, photo of a
     real person, or a cartoon drawing and others. This is an
     exploratory study that reviews five randomly chosen
     conversations that an animated chatbot has with Web users. The
     character simulates human gestures, but they are stylized to
     reproduce animation standards. The goal of this exploratory study
     is to provide feedback that will help designers to improve the
     functionality of the conversational agent, identify user’s needs,
     define future research, and learn from previous errors. The
     methodology used was qualitative content analysis.
Chapter 14: Voice-Based Approach for Surmounting Spatial and
Temporal Separations

 Kate O’Toole, GreenSun and Kastle Data Systems, USA
 Srividhya Subramanian, University of Arizona, USA
 Nathan Denny, University of Arizona, USA


 This chapter describes a new voice-based tool for global collaboration.
     This tool, called EchoEdit, attempts to provide multimedia
     capabilities to program source code editing for the purpose of
     eliciting in situ vocal commentary from active developers.
Chapter 15: Intelligent Biometric System Using Soft Computing Tools

 Anupam Shukla, ABV- Indian Institute of Information Technology and
    Management, Gwalior, India Ritu Tiwari, ABV- Indian Institute of
    Information Technology and Management, Gwalior, India Chandra
    Prakash Rathore, ABV- Indian Institute of Information Technology
    and Management, Gwalior, India


 Biometric Systems verify the identity of a claimant based on the
     person’s physical attributes, such as voice, face or fingerprints. Its
application areas include security applications, forensic work, law
     enforcement applications etc. This work presents a novel concept
     of applying Soft Computing Tools, namely Artificial Neural
     Networks and Neuro-Fuzzy System, for person identification using
     speech and facial features. The work is divided in four cases,
     which are Person Identification using speech biometrics, facial
     biometrics, fusion of speech and facial biometrics and finally
     fusion of optimized speech and facial biometrics.
Chapter 16: Analysis and Modelling of Hierarchical Fuzzy Logic Systems

 Masoud Mohammadian, University of Canberra, Australia


 This chapter investigates the design and development of a hierarchical
     fuzzy logic system. A new method using an evolutionary algorithm
     for design of hierarchical fuzzy logic system for prediction and
     modelling of interest rates in Australia is developed. The
     hierarchical system is developed to model and predict three
     months (quarterly) interest rate fluctuations. This research study
     is unique in the way proposed method is applied to design and
     development of fuzzy logic systems. The new method proposed
     determines the number of layer for hierarchical fuzzy logic
     system. The advantages and disadvantages of using fuzzy logic
     systems for financial modeling is also considered. Conclusions on
     the accuracy of prediction using hierarchical fuzzy logic systems
     compared to a back-propagation neural network system and a
     hierarchical neural network are reported.
Chapter 17: Fuzzy Logic in Medicine

 Michelle LaBrunda, Cabrini Medical Center, USA
 Andrew LaBrunda, University of Guam, USA


 This chapter explores the use of fuzzy logic in the medical field. While
     giving a comparison of classic and fuzzy logic the authors present
     the various uses of the applications made possible by fuzzy logic,
     focusing on diagnosis and treatment. The ever evolving
     technology making the line between medicine and technology
     thinner every year, is helping to make the treatment of disease
     and the mending of injury easier for medical professionals. The
     authors also propose several questions that arise from, and may
     by answered by, fuzzy logic and its applications.
Chapter 18: On Bias-Variance Analysis for Probabilistic Logic Models

 Huma Lodhi, Imperial College London, UK
The chapter introduces bias-variance decomposition in probabilistic logic
learning. The author uses Stochastic Logic Programs for probabilistic
logic representation. In order to learn probabilistic logic models the
author uses Failure Adjusted Maximization (FAM) that is an instance of
the Expectation Maximization (EM) algorithm for first order logic.
Experiments are carried out by concentrating on one kind of
application: quantitative modelling of metabolic pathways that is a
complex and challenging task in computational systems biology. The
author applies bias-variance definitions to analyze quantitative
modelling of amino acid pathways of Saccharomyces cerevisiae (yeast).
The results show the phenomenon of bias-variance trade-off in
probabilistic logic learning.
Handbook of Research on Web 2.0, 3.0,
and X.0: Technologies, Business, and
Social Applications
Part of the Advances in E-Business Research
Series (AEBR) Book Series
Edited By: San Murugesan, Multimedia University, Malaysia &
University of Western Sydney, Australia

Table of Contents:
TENTATIVE
Section I: Overview

Chapter I: Web X.0 Roadmap

  San Murugesan, Southern Cross University & University of Western
     Sydney, Australia
Chapter II: An Overview and Differentiation of the Evolutionary Steps of
the Web X.Y Movement: The Web Before and Beyond 2.0

 Sebastian Weber, Fraunhofer Institute for Experimental Software
     Engineering (IESE), Germany
 Jörg Rech, Fraunhofer Institute for Experimental Software Engineering
     (IESE), Germany
Section II: Web Modeling and Design

Chapter III: A Model-Driven Engineering Approach for Defining Rich
Internet Applications: a Web 2.0 Case Study

 Francisco Valverde, Centro de Investigación en Métodos de Producción
      de Software, Universidad Politécnica de Valencia, Spain
 Oscar Pastor, Centro de Investigación en Métodos de Producción de
      Software, Universidad Politécnica de Valencia, Spain
 Pedro Valderas, Centro de Investigación en Métodos de Producción de
      Software, Universidad Politécnica de Valencia, Spain
 Vicente Pelechano, Centro de Investigación en Métodos de Producción
      de Software, Universidad Politécnica de Valencia, Spain
Chapter IV: Modular and Systematic Interface Design for Rich Internet
Applications

 Gustavo Rossi, LIFIA, Facultad de Informática, UNLP and Conicet,
     Argentina
 Matias Urbieta, LIFIA, Facultad de Informática, UNLP and Conicet,
     Argentina
 Jeronimo Ginzburg, Departamento de Computación, FCEyN, UBA,
     Argentina
Chapter V: Towards Web 2.0 Applications: A Conceptual Model for Rich
Internet Applications

 Alessandro Bozzon, Politecnico di Milano, Italy
 Sara Comai, Politecnico di Milano, Italy
 Piero Fraternali, Politecnico di Milano, Italy
 Giovanni Toffetti Carughi, Università della Svizzera Italiana, Lugano,
     Switzerland
Chapter VI: A Tool for Model-driven Design of Rich Internet Applications
based on AJAX

 Marco Brambilla, Politecnico di Milano, Italy
 Piero Fraternali, Politecnico di Milano, Italy
 Emanuele Molteni, Web Models S.r.l., Italy
Chapter VII: Web 2.0: Self-Managing System Based On SOA Model and
Grid Computing Overlay

 Wail M. Omar, Sohar University , Sultanate of Oman
Section III: Web Architecture

Chapter VIII: An Overview of and Criteria for the Differentiation and
Evaluation of RIA Architectures

 Marcel Linnenfelser, Synflag Web Engineering, Germany
 Sebastian Weber, Fraunhofer Institute for Experimental Software
     Engineering (IESE), Germany
 Jörg Rech, Fraunhofer Institute for Experimental Software Engineering
     (IESE), Germany
Chapter IX: Service-Oriented Architecture Framework for Cross-
Organizational Interoperation

  Christoph Schroth, University of St. Gallen, MCM Institute and SAP,
      Switzerland
  Beat Schmid, University of St. Gallen, Switzerland
Chapter X: The Layered Virtual Reality Commerce System (LaVRCS):
Proposing an Immersive Web X.0 Framework for E-Commerce

  Alan Rea, Western Michigan University, USA
Chapter XI: Mobile Service Oriented Architecture (MSOA) for Businesses
in the Web 2.0 Era

 Ming-Chien (Mindy) Wu, University of Western Sydney
 Bhuvan Unhelkar, University of Western Sydney
Chapter XII: Towards Web 3.0: A Unifying Architecture for Next
Generation Web Applications

 Tzanetos Pomonis, University of Patras, Greece
 Dimitrios A. Koutsomitropoulos, University of Patras, Greece
Sotiris P. Christodoulou, University of Patras, Greece
 Theodore S. Papatheodorou, University of Patras, Greece
Section IV: Information Search, Bookmarking, and Tagging

Chapter XIII: Web 2.0: Social Bookmarking: An Overview of
Folksonomies

 Richard Derham, University of Canterbury, New Zealand
 Annette Mills, University of Canterbury, New Zealand
Chapter XIV: Social Semantic Bookmarking with SOBOLEO

 Valentin Zacharias, FZI Research Center for Information Technology,
     Germany
 Simone Braun, FZI Research Center for Information Technology,
     Germany
 Andreas Schmidt, FZI Research Center for Information Technology,
     Germany
Chapter XV: Social Bookmarking and Web Search

 Yusuke Yanbe, Graduate School of Informatics, Kyoto University,
     Japan
 Adam Jatowt, Graduate School of Informatics, Kyoto University, Japan
 Satoshi Nakamura, Graduate School of Informatics, Kyoto University,
     Japan
 Katsumi Tanaka, Graduate School of Informatics, Kyoto University,
     Japan
Chapter XVI: Social Tagging: Properties and Applications

 Yong Yu, Shanghai Jiao Tong University, China
 Rui Li, Shanghai Jiao Tong University, China
 Shenghua Bao, Shanghai Jiao Tong University, China
 Ben Fei, IBM China Research Lab, China
 Zhong Su, IBM China Research Lab, China
Chapter XVII: Improving Cross-Language Information Retrieval by
Harnessing the Social Web

  Diana Irina Tanase, School of Computer Science, University of
      Westminster, UK
  Epaminondas Kapetanios, School of Computer Science, University of
      Westminster, UK
Chapter XVIII: Leveraging User-specified Metadata to Personalize
Image Search

 Kristina Lerman, USC Information Sciences Institute, USA
 Anon Plangprasopchok, USC Information Sciences Institute, USA
Section V: Semantic Analysis and Semantic Web
Chapter XIX: Accessing, Analyzing, and Extracting Information from
User Generated Contents

 Paolo Casoto, University of Udine, Italy
 Antonina Dattolo, University of Udine, Italy
 Paolo Omero, University of Udine, Italy
 Nirmala Pudota, University of Udine, Italy
 Carlo Tasso, University of Udine, Italy
Chapter XX: Wiki Semantics via Wiki Templating

 Angelo Di Iorio, Department of Computer Science, University of
     Bologna, Italy
 Fabio Vitali, Department of Computer Science, University of Bologna,
     Italy
 Stefano Zacchiroli, Universitè Paris Diderot, PPS, UMR 7126, Paris,
     France
Chapter XI: Towards Disambiguating Social Tagging Systems

 Antonina Dattolo, Dept. of Mathematics and Computer Science,
      University of Udine, Italy
 Silvia Duca, Dept. of Computer Science, University of Bologna, Italy
 Francesca Tomasi, Dept. of Classical and Medieval Philology,
      University of Bologna, Italy
 Fabio Vitali, Dept. of Computer Science, University of Bologna, Italy
Section VI: Web Quality, Trust, Security, and Effort Estimation

Chapter XXII: Modeling Content Quality for the Web 2.0 and Follow-on
Applications

  Roberto Sassano, University of Trento, Italy
  Luis Olsina, National University of La Pampa, Argentina
  Luisa Mich, University of Trento, Italy
Chapter XXIII: A New Website Quality Assessment Model for the Web
2.0 Era

 Minseok Panga, Stephen M. Ross School of Business, University of
     Michigan, USA
 Woojong Suhb, College of Business Administration, Inha University,
     Korea
 Jinwon Hongc, College of Business Administration, Inha University,
     Korea
 Jongho Kimd, Department of Corporate Strategy, Hyundai Research
     Institute, Korea
 Heeseok Leee, Graduate School of Management, Korea Advanced
     Institute of Science and Technology, Korea
Chapter XXIV: Electronic Reputation Systems
Mario Paolucci, LABSS-ISTC-CNR, Rome, Italy
  Walter Quattrociocchi, LABSS-ISTC-CNR, Rome, Italy
  Stefano Picascia, LABSS-ISTC-CNR, Rome, Italy
Chapter XXV: Improving the Information Security of Collaborative Web
Portals via Fine-Grained Role-Based Access Control

 S. Demurjian, University of Connecticut, USA
 H. Ren, University of Connecticut, USA
 S. Berhe, University of Connecticut, USA
 M. Devineni, Serebrum Cooperation, USA
 S. Kopparti, Serebrum Cooperation, USA
 K. Polineni, Serebrum Cooperation, USA
Chapter XXVI: Web 2.0 Effort Estimation

 Emilia Mendes, The University of Auckland, New Zealand
Section VII: Educational Applications

Chapter XVII: A Social Web Perspective of Software Engineering
Education

  Pankaj Kamthan, Concordia University, Canada
Chapter XVIII: University 2.0: Embracing Social Networking to better
engage the Facebook-generation in University Life

  David Griffin, Leeds Metropolitan University, UK
Chapter XXIX: On Using Wiki as a Tool for Collaborative Online Blended
Learning

  Steve Wheeler, University of Plymouth, UK
Chapter XXX: Integration of Web 2.0 Collaboration Tools into Education:
Lessons Learned

 Phillip Olla, Madonna University, USA
 Elena Qureshi, Madonna University, USA
Chapter XXXI: ECHO: A Layered Model for the Design of a Context-
Aware Learning Experience

 Hadas Weinberger, HIT – Holon Institute of Technology, Department
     of Instructional Systems Technology, Israel
Chapter XXXII: Advancing Learning through Virtual Worlds

 Steve Mahaley, Duke Corporate Education, USA
 Robin Teigland, Stockholm School of Economics, Sweden
Chapter XXXIII: Virtual Reality 2.0 and Its Application in Knowledge
Building

 Johannes Moskaliuk, University of Tuebingen, Germany
Joachim Kimmerle, University of Tuebingen, Germany
  Ulrike Cress, Knowledge Media Research Center, Tuebingen, Germany
Chapter XXXIV: Student and Faculty Use and Perceptions of Web 2.0
Technologies in Higher Education

  Haya Ajjan, University of North Carolina at Charlotte, USA
  Richard Hartshorne, University of North Carolina at Charlotte, USA
  Richard E. Ferdig, University of Florida, USA
Chapter XXXV: Social Issues and Web 2.0: A Closer Look at Culture in
eLearning

 Bolanle A.Olaniran, Texas Tech University, Lubbock Texas, USA
 Hansel Burley, Texas Tech University, Lubbock Texas, USA
 Maiga Chang, Athabasca University (AU), Alberta, Canada
Section VIII: Enterprise 2.0, Healthcare, Finance and Other
Applications

Chapter XXXVI: Enterprise 2.0: Leveraging Prosumerism 2.0 Using Web
2.0 and Web 3.0

 Chaka Chaka, Walter Sisulu University, South Africa
Chapter XXXVII: Capturing Online Collaboration in the Design Elements
Model for Web 2.0 and Beyond

  T. Andrew Yang, University of Houston-Clear Lake, USA
  Dan J. Kim, University of Houston-Clear Lake, USA
  Tri Vu, University of Houston-Clear Lake, USA
  Vishal Dhalwani, University of Houston-Clear Lake, USA
Chapter XXXVIII: A Comparative Analysis of Online Social Networking
Sites and Their Business Models
  T. Andrew Yang, University of Houston-Clear Lake, USA
  Dan J. Kim, University of Houston-Clear Lake, USA
Chapter IXL: Health Care 2.0: The Use of Web 2.0 in Health Care

 Shakib Manouchehri, University of Kassel, Germany
 Udo Winand, University of Kassel, Germany
Chapter XL: Using a Web-based Collaboration Portal and Wiki for
Making Health Information Technology Decisions

 R. Crowell, University of Connecticut Health Center, USA
 T. Agresta, University of Connecticut Health Center, USA
 M. J. Cook, University of Connecticut Health Center, USA
 J. Fifield, University of Connecticut Health Center, USA
 S. Demurjian, University of Connecticut, USA
 S. Carter, Community Health Centers, Inc., USA
 I. Becerra-Ortiz, Fair Haven Community Health Center, USA
 L. Tracey, StayWell Health Care, Inc., USA
S. Vegad, Serebrum Corporation, USA
 K. Polineni, Serebrum Corporation, USA
Chapter XLI: Assessing the Total Cost of Ownership of Virtual
Communities – The Case of the Berlin Stock Exchange

 Jan vom Brocke, University of Liechtenstein, Principality of
     Liechtenstein
 Christian Sonnenberg, University of Liechtenstein, Principality of
     Liechtenstein
 Christoph Lattemann, University of Potsdam, Germany
 Stefan Stieglitz, University of Potsdam, Germany
Chapter XLII: Connecting the Real World with the Virtual World: The
SmartRFLib RFID-Supported Library System on Second Life

 Katinka Kromwijk, ETH Zurich, Department of Computer Science,
      Zurich, Switzerland
 Çaðrý Balkesen, ETH Zurich, Department of Computer Science,
      Zurich, Switzerland
 Gautier Boder, ETH Zurich, Department of Computer Science, Zurich,
      Switzerland
 Nihal Dindar, ETH Zurich, Department of Computer Science, Zurich,
      Switzerland
 Florian Keusch, ETH Zurich, Department of Computer Science, Zurich,
      Switzerland
 Ali Þengül, ETH Zurich, Department of Computer Science, Zurich,
      Switzerland
 Nesime Tatbul, ETH Zurich, Department of Computer Science, Zurich,
      Switzerland
Chapter XLIII: Embracing the Social Web for Managing Patterns

 Pankaj Kamthan, Concordia University, Canada
Chapter XLIV: Extending and Applying Web 2.0 and Beyond for
Environmental Intelligence

 Bhuvan Unhelkar, Univ. of Western Sydney & MethodScience.com,
     Australia
 Bharti Trivedi, DD University - Nadiad , India
Section IX: Social Web: Foundations, Analysis and Visualisation

Chapter XLV: Social Software and Web 2.0: Their Sociological
Foundations and Implications

 Christian Fuchs, University of Salzburg, Austria
Chapter XLVI: Sociology of Virtual Communities and Social Software
Design

 Daniel Memmi, University of Quebec in Montreal, Canada
Chapter XLVII: Online Human Activity Networks (OnHANs): An Analysis
Based On Activity Theory

 Dan J. Kim, University of Houston-Clear Lake, USA
 T. Andrew Yang, University of Houston-Clear Lake, USA
 Ninad Naik, University of Houston-Clear Lake, USA
Chapter XLVIII: Visualising Social Networks in Collaborative
Environments

  Stephen T. O’Rourke, The University of Sydney, Australia
  Rafael A. Calvo, The University of Sydney, Australia
Chapter IL: The Discourses of Empowerment and Web 2.0: The
Dilemmas of User-Generated Content

 Yasmin Ibrahim, University of Brighton, UK
Chapter L: How Employees Can Leverage Web 2.0 in New Ways to
Reflect on Employment and employers

 James Richards, Heriot-Watt University, UK
Chapter LI: Privacy Implications and Protection in the New Ubiquitous
Web Environment

  Charalampos Z. Patrikakis, National Technical University of Athens,
      Greece
  Ioannis G. Nikolakopoulos, National Technical University of Athens,
      Greece
Athanasios S. Voulodimos, National Technical University of Athens,
Greece	
  

More Related Content

What's hot

MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
 
RecordsManagementProposalforSMEs
RecordsManagementProposalforSMEsRecordsManagementProposalforSMEs
RecordsManagementProposalforSMEsLacey Wilson
 
Alessandro Comai (2005) Discover Hidden Needs brf frontiers - proceeding pa...
Alessandro Comai (2005) Discover Hidden Needs   brf frontiers - proceeding pa...Alessandro Comai (2005) Discover Hidden Needs   brf frontiers - proceeding pa...
Alessandro Comai (2005) Discover Hidden Needs brf frontiers - proceeding pa...miniera
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Momo Scott
 
Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...
Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...
Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...journal ijrtem
 
Best Practices in Creating and Using Employee Survey Feedback Data as a Means...
Best Practices in Creating and Using Employee Survey Feedback Data as a Means...Best Practices in Creating and Using Employee Survey Feedback Data as a Means...
Best Practices in Creating and Using Employee Survey Feedback Data as a Means...Ardavan Shahroodi
 
PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...
PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...
PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...Fayaz01
 
Mobile Analytics Literature Review
Mobile Analytics Literature ReviewMobile Analytics Literature Review
Mobile Analytics Literature ReviewChristopher DeFields
 
Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...
Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...
Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...wolanita
 
Debabrata pruseth ramanandg_lakshmivaragand - final
Debabrata pruseth ramanandg_lakshmivaragand - finalDebabrata pruseth ramanandg_lakshmivaragand - final
Debabrata pruseth ramanandg_lakshmivaragand - finalPMI2011
 
Strategic Sensitivity and Innovative Capabilities of Software Development Com...
Strategic Sensitivity and Innovative Capabilities of Software Development Com...Strategic Sensitivity and Innovative Capabilities of Software Development Com...
Strategic Sensitivity and Innovative Capabilities of Software Development Com...ijtsrd
 
Integrated Strategy and Business Architecture Meta Model
Integrated Strategy and Business Architecture Meta ModelIntegrated Strategy and Business Architecture Meta Model
Integrated Strategy and Business Architecture Meta ModelGraham McLeod
 
Making the Cut: A Review of Open Talent Analytics Job Postings
Making the Cut: A Review of Open Talent Analytics Job PostingsMaking the Cut: A Review of Open Talent Analytics Job Postings
Making the Cut: A Review of Open Talent Analytics Job PostingsAndrea Kropp
 
IRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET Journal
 
CIS 336 STR Education Begins--cis336.com
CIS 336 STR Education Begins--cis336.comCIS 336 STR Education Begins--cis336.com
CIS 336 STR Education Begins--cis336.comclaric231
 
CIS 336 STR Become Exceptional--cis336str.com
CIS 336 STR Become Exceptional--cis336str.comCIS 336 STR Become Exceptional--cis336str.com
CIS 336 STR Become Exceptional--cis336str.comclaric132
 
A case study of using the hybrid model of scrum and six sigma in software dev...
A case study of using the hybrid model of scrum and six sigma in software dev...A case study of using the hybrid model of scrum and six sigma in software dev...
A case study of using the hybrid model of scrum and six sigma in software dev...IJECEIAES
 

What's hot (20)

MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
 
RecordsManagementProposalforSMEs
RecordsManagementProposalforSMEsRecordsManagementProposalforSMEs
RecordsManagementProposalforSMEs
 
Alessandro Comai (2005) Discover Hidden Needs brf frontiers - proceeding pa...
Alessandro Comai (2005) Discover Hidden Needs   brf frontiers - proceeding pa...Alessandro Comai (2005) Discover Hidden Needs   brf frontiers - proceeding pa...
Alessandro Comai (2005) Discover Hidden Needs brf frontiers - proceeding pa...
 
Employee Engagement within the IT Industry
Employee Engagement within the IT Industry Employee Engagement within the IT Industry
Employee Engagement within the IT Industry
 
Traits of Managers in Academic and Corporate IT
Traits of Managers in Academic and Corporate ITTraits of Managers in Academic and Corporate IT
Traits of Managers in Academic and Corporate IT
 
Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...
Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...
Case Study, Cairo-Amman Bank-Jordan: Improving an Organization by the use of ...
 
Best Practices in Creating and Using Employee Survey Feedback Data as a Means...
Best Practices in Creating and Using Employee Survey Feedback Data as a Means...Best Practices in Creating and Using Employee Survey Feedback Data as a Means...
Best Practices in Creating and Using Employee Survey Feedback Data as a Means...
 
PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...
PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...
PhD Thesis Defense Knowledge Management and Strategically Suitable Decision M...
 
1569251281
15692512811569251281
1569251281
 
Mobile Analytics Literature Review
Mobile Analytics Literature ReviewMobile Analytics Literature Review
Mobile Analytics Literature Review
 
Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...
Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...
Interactive strategy formation_organizational_and_entrepreneurial_factors_rel...
 
Debabrata pruseth ramanandg_lakshmivaragand - final
Debabrata pruseth ramanandg_lakshmivaragand - finalDebabrata pruseth ramanandg_lakshmivaragand - final
Debabrata pruseth ramanandg_lakshmivaragand - final
 
Strategic Sensitivity and Innovative Capabilities of Software Development Com...
Strategic Sensitivity and Innovative Capabilities of Software Development Com...Strategic Sensitivity and Innovative Capabilities of Software Development Com...
Strategic Sensitivity and Innovative Capabilities of Software Development Com...
 
Integrated Strategy and Business Architecture Meta Model
Integrated Strategy and Business Architecture Meta ModelIntegrated Strategy and Business Architecture Meta Model
Integrated Strategy and Business Architecture Meta Model
 
Making the Cut: A Review of Open Talent Analytics Job Postings
Making the Cut: A Review of Open Talent Analytics Job PostingsMaking the Cut: A Review of Open Talent Analytics Job Postings
Making the Cut: A Review of Open Talent Analytics Job Postings
 
IRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score Indexing
 
CIS 336 STR Education Begins--cis336.com
CIS 336 STR Education Begins--cis336.comCIS 336 STR Education Begins--cis336.com
CIS 336 STR Education Begins--cis336.com
 
CIS 336 STR Become Exceptional--cis336str.com
CIS 336 STR Become Exceptional--cis336str.comCIS 336 STR Become Exceptional--cis336str.com
CIS 336 STR Become Exceptional--cis336str.com
 
A case study of using the hybrid model of scrum and six sigma in software dev...
A case study of using the hybrid model of scrum and six sigma in software dev...A case study of using the hybrid model of scrum and six sigma in software dev...
A case study of using the hybrid model of scrum and six sigma in software dev...
 
Detailed Synopsis
Detailed SynopsisDetailed Synopsis
Detailed Synopsis
 

Viewers also liked

Apresentação Pd Mcmm
Apresentação Pd McmmApresentação Pd Mcmm
Apresentação Pd McmmLuis Pedro
 
Áreas interesse investigacão Francislê Sousa
Áreas interesse investigacão Francislê SousaÁreas interesse investigacão Francislê Sousa
Áreas interesse investigacão Francislê SousaLuis Pedro
 
PLEConf_2013_FatimaPais
PLEConf_2013_FatimaPaisPLEConf_2013_FatimaPais
PLEConf_2013_FatimaPaisLuis Pedro
 
Apresentação Seminário MCMM 2013_14
Apresentação Seminário MCMM 2013_14Apresentação Seminário MCMM 2013_14
Apresentação Seminário MCMM 2013_14Luis Pedro
 
Apresentação Seminário Mcmm
Apresentação Seminário McmmApresentação Seminário Mcmm
Apresentação Seminário McmmLuis Pedro
 
Mp 2012 13_intro
Mp 2012 13_introMp 2012 13_intro
Mp 2012 13_introLuis Pedro
 
Projecto dissertação Aula01P
Projecto dissertação Aula01PProjecto dissertação Aula01P
Projecto dissertação Aula01PLuis Pedro
 
Programa mac 2012_13
Programa mac 2012_13Programa mac 2012_13
Programa mac 2012_13Luis Pedro
 
Tecnologias da Comunicação em contextos educativos
Tecnologias da Comunicação em contextos educativosTecnologias da Comunicação em contextos educativos
Tecnologias da Comunicação em contextos educativosLuis Pedro
 
Apresentação Projeto Dissertação MCMM 2013_14
Apresentação Projeto Dissertação MCMM 2013_14Apresentação Projeto Dissertação MCMM 2013_14
Apresentação Projeto Dissertação MCMM 2013_14Luis Pedro
 
Guiao elaboracao projetos investigação (Moreira, 2003)
Guiao elaboracao projetos investigação (Moreira, 2003)Guiao elaboracao projetos investigação (Moreira, 2003)
Guiao elaboracao projetos investigação (Moreira, 2003)Luis Pedro
 
Painel Avaliação Digital - Challenges 2015
Painel Avaliação Digital - Challenges 2015Painel Avaliação Digital - Challenges 2015
Painel Avaliação Digital - Challenges 2015Luis Pedro
 
Rita Santos - Projecto De Tese
Rita Santos - Projecto De TeseRita Santos - Projecto De Tese
Rita Santos - Projecto De TeseLuis Pedro
 
Apresentação pré projeto de Doutoramento
Apresentação pré projeto de DoutoramentoApresentação pré projeto de Doutoramento
Apresentação pré projeto de DoutoramentoSusana Lemos
 
Apresentação Pré- projeto tese
Apresentação Pré- projeto tese Apresentação Pré- projeto tese
Apresentação Pré- projeto tese João Piedade
 

Viewers also liked (16)

Apresentação Pd Mcmm
Apresentação Pd McmmApresentação Pd Mcmm
Apresentação Pd Mcmm
 
Áreas interesse investigacão Francislê Sousa
Áreas interesse investigacão Francislê SousaÁreas interesse investigacão Francislê Sousa
Áreas interesse investigacão Francislê Sousa
 
PLEConf_2013_FatimaPais
PLEConf_2013_FatimaPaisPLEConf_2013_FatimaPais
PLEConf_2013_FatimaPais
 
Apresentação Seminário MCMM 2013_14
Apresentação Seminário MCMM 2013_14Apresentação Seminário MCMM 2013_14
Apresentação Seminário MCMM 2013_14
 
Apresentação Seminário Mcmm
Apresentação Seminário McmmApresentação Seminário Mcmm
Apresentação Seminário Mcmm
 
Metodologias
MetodologiasMetodologias
Metodologias
 
Mp 2012 13_intro
Mp 2012 13_introMp 2012 13_intro
Mp 2012 13_intro
 
Projecto dissertação Aula01P
Projecto dissertação Aula01PProjecto dissertação Aula01P
Projecto dissertação Aula01P
 
Programa mac 2012_13
Programa mac 2012_13Programa mac 2012_13
Programa mac 2012_13
 
Tecnologias da Comunicação em contextos educativos
Tecnologias da Comunicação em contextos educativosTecnologias da Comunicação em contextos educativos
Tecnologias da Comunicação em contextos educativos
 
Apresentação Projeto Dissertação MCMM 2013_14
Apresentação Projeto Dissertação MCMM 2013_14Apresentação Projeto Dissertação MCMM 2013_14
Apresentação Projeto Dissertação MCMM 2013_14
 
Guiao elaboracao projetos investigação (Moreira, 2003)
Guiao elaboracao projetos investigação (Moreira, 2003)Guiao elaboracao projetos investigação (Moreira, 2003)
Guiao elaboracao projetos investigação (Moreira, 2003)
 
Painel Avaliação Digital - Challenges 2015
Painel Avaliação Digital - Challenges 2015Painel Avaliação Digital - Challenges 2015
Painel Avaliação Digital - Challenges 2015
 
Rita Santos - Projecto De Tese
Rita Santos - Projecto De TeseRita Santos - Projecto De Tese
Rita Santos - Projecto De Tese
 
Apresentação pré projeto de Doutoramento
Apresentação pré projeto de DoutoramentoApresentação pré projeto de Doutoramento
Apresentação pré projeto de Doutoramento
 
Apresentação Pré- projeto tese
Apresentação Pré- projeto tese Apresentação Pré- projeto tese
Apresentação Pré- projeto tese
 

Similar to Recursos TIC e Educação

MIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxMIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxannandleola
 
Running title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docx
Running title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docxRunning title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docx
Running title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docxanhlodge
 
Synthesis of questions and analysis and create grid.pdf
Synthesis of questions and analysis and create grid.pdfSynthesis of questions and analysis and create grid.pdf
Synthesis of questions and analysis and create grid.pdfsdfghj21
 
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...Rochelle Schear
 
Running head DATA GATHERING PLAN .docx
Running head DATA GATHERING PLAN                                 .docxRunning head DATA GATHERING PLAN                                 .docx
Running head DATA GATHERING PLAN .docxhealdkathaleen
 
Driving A Data-Centric Culture: The Leadership Challenge
Driving A Data-Centric Culture: The Leadership ChallengeDriving A Data-Centric Culture: The Leadership Challenge
Driving A Data-Centric Culture: The Leadership ChallengePlatfora
 
Wistar Rat Orchiectomy
Wistar Rat OrchiectomyWistar Rat Orchiectomy
Wistar Rat OrchiectomyRachel Davis
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft CorpAntoinette Williams
 
Mit tech review_machinelearning
Mit tech review_machinelearningMit tech review_machinelearning
Mit tech review_machinelearningAbhishek Sood
 
Technology Implementation Paper
Technology Implementation PaperTechnology Implementation Paper
Technology Implementation PaperDeb Birch
 
Are QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docxAre QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docxsiyoumnegash1
 
Decision Support systems
Decision Support systemsDecision Support systems
Decision Support systemsIkram KASSOU
 
mHealth and Wireless Technology Conference Partnering with academic organizat...
mHealth and Wireless Technology Conference Partnering with academic organizat...mHealth and Wireless Technology Conference Partnering with academic organizat...
mHealth and Wireless Technology Conference Partnering with academic organizat...P. Kenyon Crowley
 
Case Study: Business Management School at the Turkish Republic of North Cypru...
Case Study: Business Management School at the Turkish Republic of North Cypru...Case Study: Business Management School at the Turkish Republic of North Cypru...
Case Study: Business Management School at the Turkish Republic of North Cypru...journal ijrtem
 
15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri Chaita15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri ChaitaAnastaciaShadelb
 
15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri Chaita15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri ChaitaKiyokoSlagleis
 
Analysing Knowledge Requirements A Case Study
Analysing Knowledge Requirements  A Case StudyAnalysing Knowledge Requirements  A Case Study
Analysing Knowledge Requirements A Case StudyAaron Anyaakuu
 

Similar to Recursos TIC e Educação (20)

MIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docxMIST.601 Management Information SystemsResearch Project Proposal.docx
MIST.601 Management Information SystemsResearch Project Proposal.docx
 
Analytics in the boardroom
Analytics in the boardroomAnalytics in the boardroom
Analytics in the boardroom
 
Running title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docx
Running title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docxRunning title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docx
Running title TRENDS IN COMPUTER INFORMATION SYSTEMS1TRENDS I.docx
 
Synthesis of questions and analysis and create grid.pdf
Synthesis of questions and analysis and create grid.pdfSynthesis of questions and analysis and create grid.pdf
Synthesis of questions and analysis and create grid.pdf
 
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
IMPACT BIG DATA ANALYTIC AND KNOWLEDGE MANAGEMENT AS STRATEGY SERVICE ADVANTA...
 
Running head DATA GATHERING PLAN .docx
Running head DATA GATHERING PLAN                                 .docxRunning head DATA GATHERING PLAN                                 .docx
Running head DATA GATHERING PLAN .docx
 
Driving A Data-Centric Culture: The Leadership Challenge
Driving A Data-Centric Culture: The Leadership ChallengeDriving A Data-Centric Culture: The Leadership Challenge
Driving A Data-Centric Culture: The Leadership Challenge
 
Driving a data-centric culture
Driving a data-centric cultureDriving a data-centric culture
Driving a data-centric culture
 
Wistar Rat Orchiectomy
Wistar Rat OrchiectomyWistar Rat Orchiectomy
Wistar Rat Orchiectomy
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
Mit tech review_machinelearning
Mit tech review_machinelearningMit tech review_machinelearning
Mit tech review_machinelearning
 
Lecture12 (is353-business strategy)
Lecture12 (is353-business strategy)Lecture12 (is353-business strategy)
Lecture12 (is353-business strategy)
 
Technology Implementation Paper
Technology Implementation PaperTechnology Implementation Paper
Technology Implementation Paper
 
Are QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docxAre QM models aligned with Industry 4.docx
Are QM models aligned with Industry 4.docx
 
Decision Support systems
Decision Support systemsDecision Support systems
Decision Support systems
 
mHealth and Wireless Technology Conference Partnering with academic organizat...
mHealth and Wireless Technology Conference Partnering with academic organizat...mHealth and Wireless Technology Conference Partnering with academic organizat...
mHealth and Wireless Technology Conference Partnering with academic organizat...
 
Case Study: Business Management School at the Turkish Republic of North Cypru...
Case Study: Business Management School at the Turkish Republic of North Cypru...Case Study: Business Management School at the Turkish Republic of North Cypru...
Case Study: Business Management School at the Turkish Republic of North Cypru...
 
15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri Chaita15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri Chaita
 
15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri Chaita15Reflection and Discussion Forum Week 3Sri Chaita
15Reflection and Discussion Forum Week 3Sri Chaita
 
Analysing Knowledge Requirements A Case Study
Analysing Knowledge Requirements  A Case StudyAnalysing Knowledge Requirements  A Case Study
Analysing Knowledge Requirements A Case Study
 

More from Luis Pedro

Seminario ADA 2021
Seminario ADA 2021Seminario ADA 2021
Seminario ADA 2021Luis Pedro
 
2014 school onthecloud_porto
2014 school onthecloud_porto2014 school onthecloud_porto
2014 school onthecloud_portoLuis Pedro
 
Projeto Dissertação MCMM 2013_12_13
Projeto Dissertação MCMM 2013_12_13Projeto Dissertação MCMM 2013_12_13
Projeto Dissertação MCMM 2013_12_13Luis Pedro
 
Projeto dissertação MCMM 2013_11_15
Projeto dissertação MCMM 2013_11_15Projeto dissertação MCMM 2013_11_15
Projeto dissertação MCMM 2013_11_15Luis Pedro
 
Projeto dissertação MCMM 2013_11_01
Projeto dissertação MCMM 2013_11_01Projeto dissertação MCMM 2013_11_01
Projeto dissertação MCMM 2013_11_01Luis Pedro
 
Projeto dissertação MCMM 2013_10_11
Projeto dissertação MCMM 2013_10_11Projeto dissertação MCMM 2013_10_11
Projeto dissertação MCMM 2013_10_11Luis Pedro
 
Projeto dissertação MCMM 2013_10_04
Projeto dissertação MCMM 2013_10_04Projeto dissertação MCMM 2013_10_04
Projeto dissertação MCMM 2013_10_04Luis Pedro
 
Projeto dissertação MCMM 2013_09_27
Projeto dissertação MCMM 2013_09_27Projeto dissertação MCMM 2013_09_27
Projeto dissertação MCMM 2013_09_27Luis Pedro
 
Mp 2012 13_educacao
Mp 2012 13_educacaoMp 2012 13_educacao
Mp 2012 13_educacaoLuis Pedro
 
Mp 2012 13_cidadania
Mp 2012 13_cidadaniaMp 2012 13_cidadania
Mp 2012 13_cidadaniaLuis Pedro
 
Mp 2012 13_enunciado_tp
Mp 2012 13_enunciado_tpMp 2012 13_enunciado_tp
Mp 2012 13_enunciado_tpLuis Pedro
 
Projeto MCMM 2012_11_23
Projeto MCMM 2012_11_23Projeto MCMM 2012_11_23
Projeto MCMM 2012_11_23Luis Pedro
 
Seminario mcmm mariajoao_2012
Seminario mcmm mariajoao_2012Seminario mcmm mariajoao_2012
Seminario mcmm mariajoao_2012Luis Pedro
 
2012 11 09_v_baldi_filtros_smartcities
2012 11 09_v_baldi_filtros_smartcities2012 11 09_v_baldi_filtros_smartcities
2012 11 09_v_baldi_filtros_smartcitiesLuis Pedro
 
2012 11 02_seminario_lidia_oliveira
2012 11 02_seminario_lidia_oliveira2012 11 02_seminario_lidia_oliveira
2012 11 02_seminario_lidia_oliveiraLuis Pedro
 
Projeto MCMM 2012_11_09
Projeto MCMM 2012_11_09Projeto MCMM 2012_11_09
Projeto MCMM 2012_11_09Luis Pedro
 
Projeto MCMM 2012_10_26
Projeto MCMM 2012_10_26Projeto MCMM 2012_10_26
Projeto MCMM 2012_10_26Luis Pedro
 
Oscar Mealha seminario mcmm_2012_out19
Oscar Mealha seminario mcmm_2012_out19Oscar Mealha seminario mcmm_2012_out19
Oscar Mealha seminario mcmm_2012_out19Luis Pedro
 
Seminário MCMM Prof. Fernando Ramos
Seminário MCMM Prof. Fernando RamosSeminário MCMM Prof. Fernando Ramos
Seminário MCMM Prof. Fernando RamosLuis Pedro
 

More from Luis Pedro (20)

Seminario ADA 2021
Seminario ADA 2021Seminario ADA 2021
Seminario ADA 2021
 
2014 school onthecloud_porto
2014 school onthecloud_porto2014 school onthecloud_porto
2014 school onthecloud_porto
 
Projeto Dissertação MCMM 2013_12_13
Projeto Dissertação MCMM 2013_12_13Projeto Dissertação MCMM 2013_12_13
Projeto Dissertação MCMM 2013_12_13
 
Projeto dissertação MCMM 2013_11_15
Projeto dissertação MCMM 2013_11_15Projeto dissertação MCMM 2013_11_15
Projeto dissertação MCMM 2013_11_15
 
Projeto dissertação MCMM 2013_11_01
Projeto dissertação MCMM 2013_11_01Projeto dissertação MCMM 2013_11_01
Projeto dissertação MCMM 2013_11_01
 
Projeto dissertação MCMM 2013_10_11
Projeto dissertação MCMM 2013_10_11Projeto dissertação MCMM 2013_10_11
Projeto dissertação MCMM 2013_10_11
 
Projeto dissertação MCMM 2013_10_04
Projeto dissertação MCMM 2013_10_04Projeto dissertação MCMM 2013_10_04
Projeto dissertação MCMM 2013_10_04
 
Projeto dissertação MCMM 2013_09_27
Projeto dissertação MCMM 2013_09_27Projeto dissertação MCMM 2013_09_27
Projeto dissertação MCMM 2013_09_27
 
Mp 2012 13_educacao
Mp 2012 13_educacaoMp 2012 13_educacao
Mp 2012 13_educacao
 
Mp 2012 13_cidadania
Mp 2012 13_cidadaniaMp 2012 13_cidadania
Mp 2012 13_cidadania
 
Mp 2012 13_enunciado_tp
Mp 2012 13_enunciado_tpMp 2012 13_enunciado_tp
Mp 2012 13_enunciado_tp
 
Mac 2012 13
Mac 2012 13Mac 2012 13
Mac 2012 13
 
Projeto MCMM 2012_11_23
Projeto MCMM 2012_11_23Projeto MCMM 2012_11_23
Projeto MCMM 2012_11_23
 
Seminario mcmm mariajoao_2012
Seminario mcmm mariajoao_2012Seminario mcmm mariajoao_2012
Seminario mcmm mariajoao_2012
 
2012 11 09_v_baldi_filtros_smartcities
2012 11 09_v_baldi_filtros_smartcities2012 11 09_v_baldi_filtros_smartcities
2012 11 09_v_baldi_filtros_smartcities
 
2012 11 02_seminario_lidia_oliveira
2012 11 02_seminario_lidia_oliveira2012 11 02_seminario_lidia_oliveira
2012 11 02_seminario_lidia_oliveira
 
Projeto MCMM 2012_11_09
Projeto MCMM 2012_11_09Projeto MCMM 2012_11_09
Projeto MCMM 2012_11_09
 
Projeto MCMM 2012_10_26
Projeto MCMM 2012_10_26Projeto MCMM 2012_10_26
Projeto MCMM 2012_10_26
 
Oscar Mealha seminario mcmm_2012_out19
Oscar Mealha seminario mcmm_2012_out19Oscar Mealha seminario mcmm_2012_out19
Oscar Mealha seminario mcmm_2012_out19
 
Seminário MCMM Prof. Fernando Ramos
Seminário MCMM Prof. Fernando RamosSeminário MCMM Prof. Fernando Ramos
Seminário MCMM Prof. Fernando Ramos
 

Recently uploaded

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Recently uploaded (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Recursos TIC e Educação

  • 2. Technology Research: Advancing Trends Part of the Advances in Information Technology Research (AITR) Book Series Edited By: Mehdi Khosrow-Pour, Information Resources Management Association, USA Table of Contents: Chapter 1: Information Technology/Systems Offshore Outsourcing: Key Risks and Success Factors Mahesh S. Raisinghani, Texas Woman’s University, USA Brandi Starr, Texas Woman’s University, USA Blake Hickerson, Texas Woman’s University, USA Marshelle Morrison, Texas Woman’s University, USA Michael Howard, Texas Woman’s University, USA The operation of information technology and information systems (IT/IS) offshore outsourcing is being increasingly practiced among firms that are focusing on core competencies and cost effectiveness. With the increase in offshore IT/IS operations, a growing number of companies are encountering negative experiences and unpredicted results. The analysis performed in this chapter reveals the possible risks and perceived success factors of companies outsourcing IT/IS operations offshore. The major points of interest are operational and strategic risks; legal contracts; cultural, security, and financial issues; and noted success factors by companies that participate in offshore outsourcing. The research indicates the importance of risk identification and the formulation of strategic plans that include preventive, detective, and corrective control methods of implementation and evaluation. Effective methods and metrics for measuring the success or failure of IT/IS offshore outsourcing operations is expected to be a continuing development with the increasing growth of this phenomenon. Chapter 2: Emerging Trends in Outsourcing Tapasya Patki, University of Arizona, Tucson, USA A.B. Patki, Government of India, New Delhi, India Mahesh Kulkarni, Center for Development of Advanced Computing, Pune, India Outsourcing has been conventionally viewed as a solution to generate quick profits and provide business continuity. The previous decades have seen the emergence of the Information Age, where
  • 3. the key focus was on knowledge acquisition and application. We are now progressing towards the era that revolves around “concept” development from an era that was information- dependent. This age, referred to as the Conceptual Age, will be dominated by six new senses: Design, Story, Symphony, Empathy, Play and Meaning; and shall focus on the human resource development aspects. This creates a need to diverge from the current reliance on linear and sequential algorithmic practices in outsourcing and to adopt cognition based engineering and management approaches. This chapter lays the foundation for Offshore Engineering and Management (OEM) and discusses estimation issues in OEM that have their roots in software engineering. Also, this chapter identifies the limitations of the current methodologies from an outsourcing point of view, and delineates how they can be deployed effectively for an outsourced environment. Chapter 3: Agile Software Processes for the 24-Hour Knowledge Factory Environment Nathan Denny, University of Arizona, USA Igor Crk, University of Arizona, USA Ravi Sheshu, University of Arizona, USA The growing adoption of outsourcing and offshoring concepts is presenting new opportunities for distributed software development. Inspired by the paradigm of round-the-clock manufacturing, the concept of the 24-hour knowledge factory (24HrKF) attempts to make similar transformations in the arena of IS: specifically to transform the production of software and allied intangibles to benefit from the notion of continuous development by establishing multiple collaborating sites at strategically selected locations around the globe. As the sun sets on one site, it rises on another site with the day’s work being handed off from the closing site to the opening site. In order to enable such hand offs to occur in an effective manner, new agile and distributed software processes are needed, as delineated in this chapter. Chapter 4: Leveraging Knowledge Reuse and Systems Agility in the Outsourcing Era Igor Crk, University of Arizona, USA Dane Sorensen, Raytheon Missile Systems, USA Amit Mitra, TCS Global Consulting Practice, USA
  • 4. Collaborative work groups that span multiple locations and time zones, or “follow the sun,” create a growing demand for creating new technologies and methodologies that enable traditional spatial and temporal separations to be surmounted in an effective and productive manner. The hurdles faced by members of such virtual teams are in three key areas: differences in concepts and terminologies used by the different teams; differences in understanding the problem domain under consideration; and differences in training, knowledge, and skills that exist across the teams. These reasons provide some of the basis for the delineation of new architectural approaches that can normalize knowledge and provide reusable artifacts in a knowledge repository. Chapter 5: Extending the Balanced Scorecard for Outsourcing: The Goals Alignment Perspective Preeti Goyal, Faculty of Management Studies, University of Delhi, India Bhimaraya A. Metri, Management Development Institute, India Alliances, collaborations and networks are synonymous with strategy today. Business Process Outsourcing (BPO) is one such type of alliance. With increasing reliance on outsourcing, the organizational boundaries are blurring. The implications for the client organization can be tremendous, as it now relies on an outside organization to fulfill its operational objectives. Currently, there is no single framework, which can effectively measure performance for BPO arrangements. In its present form, the Balanced Scorecard (BSC) only addresses, the performance measurement needs of a single enterprise and any perspective on any external relationships is completely missing. The traditional BSC does not suffice as a performance measurement framework for BPO. While both the client and the vendor can use a BSC for their respective organizations, the strategic objectives of the organizations may not be met. In this chapter, the authors propose a new perspective as an extension to the BSC, namely the goals alignment perspective. Goals alignment of the two organizations will enable creation of performance measures that will help participating organizations to achieve their respective goals. Chapter 6: Business Process Onshore Outsourcing within the Community Banking System: An Investigative Study B. Dawn Medlin, Appalachian State University, USA Adriana Romaniello, Universidad Rey Juan Carlos, Spain
  • 5. Business processes refer to the activities that are performed within an organization that are used in order to produce value for the organization and its customers. Through the use of onshore outsourcing, banks as do other industries expect several benefits such as cost savings and reduction in overhead. Using knowledge management concepts, banks can better understand their firm’s performance as well as their own needs. This knowledge may also lead to the increase of employees’ skill sets. This study surveyed members of the North Carolina Bankers Association in order to determine what if any of their business processes they selected to outsource. Chapter 7: Offshoring in the Pharmaceutical Industry Jason McCoy, Global Seawater, Inc., USA Johannes Sarx, ALCIMED, France Offshoring has been adopted as a tool for reducing costs and for gaining strategic advantages by financial services, software development, and other competitive industries. For a variety of reasons, the pharmaceutical industry has been slow to take advantage of the benefits that offshoring can provide. The purpose of this chapter is to explore the internal and exogenous factors motivating global pharmaceutical firms to increase and expand their sourcing activities. And, instead of discussing global sourcing in general, India has been analyzed as a unique and explanatory case study for this new, emerging trend. The reasons behind this decision include India’s position as a renowned global IT hub, the country’s “home grown” biotechnology and biopharmaceutical industries, the numerous strategic partnerships and offshoring relationships between global and Indian firms, as well as its significant advances in IT and information management. Chapter 8: Enhancing e-Business Decision Making: An Application of Consensus Theory William J. Tastle, Ithaca College, New York, USA and University of Iceland, Iceland Mark J. Wierman, Creighton University, Nebraska, USA Statistical analysis is the universally accepted method by which sense is created from raw data. Successful requirements determination is often dependent upon the gathering customer data over the
  • 6. Internet, and it may be largely limited to collecting the responses such as Yes/No and Likert scale categories. These data are then analyzed to identify customer trends or other items of interest to management. The data can be useful, but key to their usage is the application of suitable mathematical tools. Traditionally little more than standard statistics has been used in the analysis of ordinal, or category, data. This chapter introduces measures of agreement and dissent to the field of e-business analysis and shows how ordinal data can be analyzed in meaningful ways. Chapter 9: Changing Healthcare Institutions with Large Information Technology Projects Matthew W. Guah, Erasmus University Rotterdam, The Netherlands This chapter reviews the development of institutional theory in direct relations to historical changes within the UK’s National Health Service (NHS) with an eye to contributing to the theoretical specification of healthcare information processes. This is done partly by extending certain paradigms (see Meyer & Rowan, 1991; Powell & DiMaggio, 1991; Tolbert & Zucker, 1994) through a proposed model of causes and consequences of variations in levels of institutionalisation in the healthcare industry. It reports finding from a 5-year study on the NHS implementation of the largest civil ISs worldwide at an estimated cost of $10 billion over a 10-year period. The theoretical basis for analysis is developed, using concepts drawn from neo-institutionalism, realisation of business value, and organisational logic, as well as mixed empirical results about the lack of IT investments value in the NHS. The findings suggest that large scale, IT change imposed upon a highly institutionalised healthcare industry is fraught with difficulty mainly because culturally embedded norms, values, and behavioural patterns serve to impede centrally imposed initiatives to automate clinical working practices. It concludes with a discussion about the nature of evaluation procedures in relation to the process of institutionalising IS in healthcare. Chapter 10: Crisis Compliance: Using Information Technology to Predict, Prevent and Prevail Over Disasters Laura Lally, Hofstra University, USA This chapter develops the concept of crisis compliance (CC)—defined as making appropriate use of IT, and non-IT methodologies to predict, prevent, and prevail over disasters. CC emerges from Lally’s Target Shield and Weapon Model, which is grounded in the theories of crisis management, normal accident theory, and high
  • 7. reliability organizations. CC is then applied to a case study involving Hurricane Katrina, with examples drawn from other recent disasters. Emerging IT-based crisis management initiatives will be examined with an emphasis on how the impacts of Hurricane Katrina could have been mitigated. Recommendations for predicting, preventing, and prevailing over future disasters will emerge from the analysis. Chapter 11: Ethical Concerns in Usability Research Involving Children Kirsten Ellis, Monash University, Australia Marian Quigley, Monash University, Australia Mark Power, Monash University, Australia This chapter examines the issues in conducting ethical usability testing with children including the special complications presented by the unique characteristics of children. It outlines the process of gaining approval of overseeing bodies to conduct research with children and discusses the difficulties in gaining informed consent from teachers, parents and the children themselves; protection of the research subject from harm and the difficulty of empowering children to instigate their right to refuse to participate in the research project. The chapter also discusses practical issues regarding the research design such as age appropriate practice, the duration of testing and recruitment of participants. Chapter 12: A Generic Framework for Bluetooth Promoted Multimedia on Demand (BlueProMoD) Panayotis Fouliras, University of Macedonia, Greece Nikolaos Samaras, University of Macedonia, Greece In recent years many technologies have converged to integrated solutions and one of the hottest topics has been the deployment of wireless personal area networks (WPANs). This chapter presents a generic architecture scheme that allows voice and other real-time traffic to be carried over longer distances. The proposed scheme is a novel framework that combines a wired backbone network including Bluetooth access points (APs) with the mobile Bluetooth-enabled devices of the end users. This scheme is called Bluetooth Promoted Multimedia on Demand (BlueProMoD). BlueProMoD is a hybrid network and provides free- of-charge communication among customers, multimedia advertisements, as well as location-based and other value-added services. Chapter 13: Social Interaction with a Conversational Agent: An
  • 8. Exploratory Study Yun-Ke Chang, Nanyang Technological University, Singapore Miguel A. Morales-Arroyo, Nanyang Technological University, Singapore Mark Chavez, Nanyang Technological University, Singapore Jaime Jimenez-Guzman, National University of Mexico, Mexico Conversational agents that display many human qualities have become a valuable method business uses to communicate with online users to supply services or products, to help in online order process or to search the Web. The gaming industry and education may benefit from this type of interface. In this type of chats, users could have different alternatives: text display, photo of a real person, or a cartoon drawing and others. This is an exploratory study that reviews five randomly chosen conversations that an animated chatbot has with Web users. The character simulates human gestures, but they are stylized to reproduce animation standards. The goal of this exploratory study is to provide feedback that will help designers to improve the functionality of the conversational agent, identify user’s needs, define future research, and learn from previous errors. The methodology used was qualitative content analysis. Chapter 14: Voice-Based Approach for Surmounting Spatial and Temporal Separations Kate O’Toole, GreenSun and Kastle Data Systems, USA Srividhya Subramanian, University of Arizona, USA Nathan Denny, University of Arizona, USA This chapter describes a new voice-based tool for global collaboration. This tool, called EchoEdit, attempts to provide multimedia capabilities to program source code editing for the purpose of eliciting in situ vocal commentary from active developers. Chapter 15: Intelligent Biometric System Using Soft Computing Tools Anupam Shukla, ABV- Indian Institute of Information Technology and Management, Gwalior, India Ritu Tiwari, ABV- Indian Institute of Information Technology and Management, Gwalior, India Chandra Prakash Rathore, ABV- Indian Institute of Information Technology and Management, Gwalior, India Biometric Systems verify the identity of a claimant based on the person’s physical attributes, such as voice, face or fingerprints. Its
  • 9. application areas include security applications, forensic work, law enforcement applications etc. This work presents a novel concept of applying Soft Computing Tools, namely Artificial Neural Networks and Neuro-Fuzzy System, for person identification using speech and facial features. The work is divided in four cases, which are Person Identification using speech biometrics, facial biometrics, fusion of speech and facial biometrics and finally fusion of optimized speech and facial biometrics. Chapter 16: Analysis and Modelling of Hierarchical Fuzzy Logic Systems Masoud Mohammadian, University of Canberra, Australia This chapter investigates the design and development of a hierarchical fuzzy logic system. A new method using an evolutionary algorithm for design of hierarchical fuzzy logic system for prediction and modelling of interest rates in Australia is developed. The hierarchical system is developed to model and predict three months (quarterly) interest rate fluctuations. This research study is unique in the way proposed method is applied to design and development of fuzzy logic systems. The new method proposed determines the number of layer for hierarchical fuzzy logic system. The advantages and disadvantages of using fuzzy logic systems for financial modeling is also considered. Conclusions on the accuracy of prediction using hierarchical fuzzy logic systems compared to a back-propagation neural network system and a hierarchical neural network are reported. Chapter 17: Fuzzy Logic in Medicine Michelle LaBrunda, Cabrini Medical Center, USA Andrew LaBrunda, University of Guam, USA This chapter explores the use of fuzzy logic in the medical field. While giving a comparison of classic and fuzzy logic the authors present the various uses of the applications made possible by fuzzy logic, focusing on diagnosis and treatment. The ever evolving technology making the line between medicine and technology thinner every year, is helping to make the treatment of disease and the mending of injury easier for medical professionals. The authors also propose several questions that arise from, and may by answered by, fuzzy logic and its applications. Chapter 18: On Bias-Variance Analysis for Probabilistic Logic Models Huma Lodhi, Imperial College London, UK
  • 10. The chapter introduces bias-variance decomposition in probabilistic logic learning. The author uses Stochastic Logic Programs for probabilistic logic representation. In order to learn probabilistic logic models the author uses Failure Adjusted Maximization (FAM) that is an instance of the Expectation Maximization (EM) algorithm for first order logic. Experiments are carried out by concentrating on one kind of application: quantitative modelling of metabolic pathways that is a complex and challenging task in computational systems biology. The author applies bias-variance definitions to analyze quantitative modelling of amino acid pathways of Saccharomyces cerevisiae (yeast). The results show the phenomenon of bias-variance trade-off in probabilistic logic learning.
  • 11. Handbook of Research on Web 2.0, 3.0,
  • 12. and X.0: Technologies, Business, and Social Applications Part of the Advances in E-Business Research Series (AEBR) Book Series Edited By: San Murugesan, Multimedia University, Malaysia & University of Western Sydney, Australia Table of Contents: TENTATIVE Section I: Overview Chapter I: Web X.0 Roadmap San Murugesan, Southern Cross University & University of Western Sydney, Australia Chapter II: An Overview and Differentiation of the Evolutionary Steps of the Web X.Y Movement: The Web Before and Beyond 2.0 Sebastian Weber, Fraunhofer Institute for Experimental Software Engineering (IESE), Germany Jörg Rech, Fraunhofer Institute for Experimental Software Engineering (IESE), Germany Section II: Web Modeling and Design Chapter III: A Model-Driven Engineering Approach for Defining Rich Internet Applications: a Web 2.0 Case Study Francisco Valverde, Centro de Investigación en Métodos de Producción de Software, Universidad Politécnica de Valencia, Spain Oscar Pastor, Centro de Investigación en Métodos de Producción de Software, Universidad Politécnica de Valencia, Spain Pedro Valderas, Centro de Investigación en Métodos de Producción de Software, Universidad Politécnica de Valencia, Spain Vicente Pelechano, Centro de Investigación en Métodos de Producción de Software, Universidad Politécnica de Valencia, Spain Chapter IV: Modular and Systematic Interface Design for Rich Internet Applications Gustavo Rossi, LIFIA, Facultad de Informática, UNLP and Conicet, Argentina Matias Urbieta, LIFIA, Facultad de Informática, UNLP and Conicet, Argentina Jeronimo Ginzburg, Departamento de Computación, FCEyN, UBA, Argentina Chapter V: Towards Web 2.0 Applications: A Conceptual Model for Rich
  • 13. Internet Applications Alessandro Bozzon, Politecnico di Milano, Italy Sara Comai, Politecnico di Milano, Italy Piero Fraternali, Politecnico di Milano, Italy Giovanni Toffetti Carughi, Università della Svizzera Italiana, Lugano, Switzerland Chapter VI: A Tool for Model-driven Design of Rich Internet Applications based on AJAX Marco Brambilla, Politecnico di Milano, Italy Piero Fraternali, Politecnico di Milano, Italy Emanuele Molteni, Web Models S.r.l., Italy Chapter VII: Web 2.0: Self-Managing System Based On SOA Model and Grid Computing Overlay Wail M. Omar, Sohar University , Sultanate of Oman Section III: Web Architecture Chapter VIII: An Overview of and Criteria for the Differentiation and Evaluation of RIA Architectures Marcel Linnenfelser, Synflag Web Engineering, Germany Sebastian Weber, Fraunhofer Institute for Experimental Software Engineering (IESE), Germany Jörg Rech, Fraunhofer Institute for Experimental Software Engineering (IESE), Germany Chapter IX: Service-Oriented Architecture Framework for Cross- Organizational Interoperation Christoph Schroth, University of St. Gallen, MCM Institute and SAP, Switzerland Beat Schmid, University of St. Gallen, Switzerland Chapter X: The Layered Virtual Reality Commerce System (LaVRCS): Proposing an Immersive Web X.0 Framework for E-Commerce Alan Rea, Western Michigan University, USA Chapter XI: Mobile Service Oriented Architecture (MSOA) for Businesses in the Web 2.0 Era Ming-Chien (Mindy) Wu, University of Western Sydney Bhuvan Unhelkar, University of Western Sydney Chapter XII: Towards Web 3.0: A Unifying Architecture for Next Generation Web Applications Tzanetos Pomonis, University of Patras, Greece Dimitrios A. Koutsomitropoulos, University of Patras, Greece
  • 14. Sotiris P. Christodoulou, University of Patras, Greece Theodore S. Papatheodorou, University of Patras, Greece Section IV: Information Search, Bookmarking, and Tagging Chapter XIII: Web 2.0: Social Bookmarking: An Overview of Folksonomies Richard Derham, University of Canterbury, New Zealand Annette Mills, University of Canterbury, New Zealand Chapter XIV: Social Semantic Bookmarking with SOBOLEO Valentin Zacharias, FZI Research Center for Information Technology, Germany Simone Braun, FZI Research Center for Information Technology, Germany Andreas Schmidt, FZI Research Center for Information Technology, Germany Chapter XV: Social Bookmarking and Web Search Yusuke Yanbe, Graduate School of Informatics, Kyoto University, Japan Adam Jatowt, Graduate School of Informatics, Kyoto University, Japan Satoshi Nakamura, Graduate School of Informatics, Kyoto University, Japan Katsumi Tanaka, Graduate School of Informatics, Kyoto University, Japan Chapter XVI: Social Tagging: Properties and Applications Yong Yu, Shanghai Jiao Tong University, China Rui Li, Shanghai Jiao Tong University, China Shenghua Bao, Shanghai Jiao Tong University, China Ben Fei, IBM China Research Lab, China Zhong Su, IBM China Research Lab, China Chapter XVII: Improving Cross-Language Information Retrieval by Harnessing the Social Web Diana Irina Tanase, School of Computer Science, University of Westminster, UK Epaminondas Kapetanios, School of Computer Science, University of Westminster, UK Chapter XVIII: Leveraging User-specified Metadata to Personalize Image Search Kristina Lerman, USC Information Sciences Institute, USA Anon Plangprasopchok, USC Information Sciences Institute, USA Section V: Semantic Analysis and Semantic Web
  • 15. Chapter XIX: Accessing, Analyzing, and Extracting Information from User Generated Contents Paolo Casoto, University of Udine, Italy Antonina Dattolo, University of Udine, Italy Paolo Omero, University of Udine, Italy Nirmala Pudota, University of Udine, Italy Carlo Tasso, University of Udine, Italy Chapter XX: Wiki Semantics via Wiki Templating Angelo Di Iorio, Department of Computer Science, University of Bologna, Italy Fabio Vitali, Department of Computer Science, University of Bologna, Italy Stefano Zacchiroli, Universitè Paris Diderot, PPS, UMR 7126, Paris, France Chapter XI: Towards Disambiguating Social Tagging Systems Antonina Dattolo, Dept. of Mathematics and Computer Science, University of Udine, Italy Silvia Duca, Dept. of Computer Science, University of Bologna, Italy Francesca Tomasi, Dept. of Classical and Medieval Philology, University of Bologna, Italy Fabio Vitali, Dept. of Computer Science, University of Bologna, Italy Section VI: Web Quality, Trust, Security, and Effort Estimation Chapter XXII: Modeling Content Quality for the Web 2.0 and Follow-on Applications Roberto Sassano, University of Trento, Italy Luis Olsina, National University of La Pampa, Argentina Luisa Mich, University of Trento, Italy Chapter XXIII: A New Website Quality Assessment Model for the Web 2.0 Era Minseok Panga, Stephen M. Ross School of Business, University of Michigan, USA Woojong Suhb, College of Business Administration, Inha University, Korea Jinwon Hongc, College of Business Administration, Inha University, Korea Jongho Kimd, Department of Corporate Strategy, Hyundai Research Institute, Korea Heeseok Leee, Graduate School of Management, Korea Advanced Institute of Science and Technology, Korea Chapter XXIV: Electronic Reputation Systems
  • 16. Mario Paolucci, LABSS-ISTC-CNR, Rome, Italy Walter Quattrociocchi, LABSS-ISTC-CNR, Rome, Italy Stefano Picascia, LABSS-ISTC-CNR, Rome, Italy Chapter XXV: Improving the Information Security of Collaborative Web Portals via Fine-Grained Role-Based Access Control S. Demurjian, University of Connecticut, USA H. Ren, University of Connecticut, USA S. Berhe, University of Connecticut, USA M. Devineni, Serebrum Cooperation, USA S. Kopparti, Serebrum Cooperation, USA K. Polineni, Serebrum Cooperation, USA Chapter XXVI: Web 2.0 Effort Estimation Emilia Mendes, The University of Auckland, New Zealand Section VII: Educational Applications Chapter XVII: A Social Web Perspective of Software Engineering Education Pankaj Kamthan, Concordia University, Canada Chapter XVIII: University 2.0: Embracing Social Networking to better engage the Facebook-generation in University Life David Griffin, Leeds Metropolitan University, UK Chapter XXIX: On Using Wiki as a Tool for Collaborative Online Blended Learning Steve Wheeler, University of Plymouth, UK Chapter XXX: Integration of Web 2.0 Collaboration Tools into Education: Lessons Learned Phillip Olla, Madonna University, USA Elena Qureshi, Madonna University, USA Chapter XXXI: ECHO: A Layered Model for the Design of a Context- Aware Learning Experience Hadas Weinberger, HIT – Holon Institute of Technology, Department of Instructional Systems Technology, Israel Chapter XXXII: Advancing Learning through Virtual Worlds Steve Mahaley, Duke Corporate Education, USA Robin Teigland, Stockholm School of Economics, Sweden Chapter XXXIII: Virtual Reality 2.0 and Its Application in Knowledge Building Johannes Moskaliuk, University of Tuebingen, Germany
  • 17. Joachim Kimmerle, University of Tuebingen, Germany Ulrike Cress, Knowledge Media Research Center, Tuebingen, Germany Chapter XXXIV: Student and Faculty Use and Perceptions of Web 2.0 Technologies in Higher Education Haya Ajjan, University of North Carolina at Charlotte, USA Richard Hartshorne, University of North Carolina at Charlotte, USA Richard E. Ferdig, University of Florida, USA Chapter XXXV: Social Issues and Web 2.0: A Closer Look at Culture in eLearning Bolanle A.Olaniran, Texas Tech University, Lubbock Texas, USA Hansel Burley, Texas Tech University, Lubbock Texas, USA Maiga Chang, Athabasca University (AU), Alberta, Canada Section VIII: Enterprise 2.0, Healthcare, Finance and Other Applications Chapter XXXVI: Enterprise 2.0: Leveraging Prosumerism 2.0 Using Web 2.0 and Web 3.0 Chaka Chaka, Walter Sisulu University, South Africa Chapter XXXVII: Capturing Online Collaboration in the Design Elements Model for Web 2.0 and Beyond T. Andrew Yang, University of Houston-Clear Lake, USA Dan J. Kim, University of Houston-Clear Lake, USA Tri Vu, University of Houston-Clear Lake, USA Vishal Dhalwani, University of Houston-Clear Lake, USA Chapter XXXVIII: A Comparative Analysis of Online Social Networking Sites and Their Business Models T. Andrew Yang, University of Houston-Clear Lake, USA Dan J. Kim, University of Houston-Clear Lake, USA Chapter IXL: Health Care 2.0: The Use of Web 2.0 in Health Care Shakib Manouchehri, University of Kassel, Germany Udo Winand, University of Kassel, Germany Chapter XL: Using a Web-based Collaboration Portal and Wiki for Making Health Information Technology Decisions R. Crowell, University of Connecticut Health Center, USA T. Agresta, University of Connecticut Health Center, USA M. J. Cook, University of Connecticut Health Center, USA J. Fifield, University of Connecticut Health Center, USA S. Demurjian, University of Connecticut, USA S. Carter, Community Health Centers, Inc., USA I. Becerra-Ortiz, Fair Haven Community Health Center, USA L. Tracey, StayWell Health Care, Inc., USA
  • 18. S. Vegad, Serebrum Corporation, USA K. Polineni, Serebrum Corporation, USA Chapter XLI: Assessing the Total Cost of Ownership of Virtual Communities – The Case of the Berlin Stock Exchange Jan vom Brocke, University of Liechtenstein, Principality of Liechtenstein Christian Sonnenberg, University of Liechtenstein, Principality of Liechtenstein Christoph Lattemann, University of Potsdam, Germany Stefan Stieglitz, University of Potsdam, Germany Chapter XLII: Connecting the Real World with the Virtual World: The SmartRFLib RFID-Supported Library System on Second Life Katinka Kromwijk, ETH Zurich, Department of Computer Science, Zurich, Switzerland Çaðrý Balkesen, ETH Zurich, Department of Computer Science, Zurich, Switzerland Gautier Boder, ETH Zurich, Department of Computer Science, Zurich, Switzerland Nihal Dindar, ETH Zurich, Department of Computer Science, Zurich, Switzerland Florian Keusch, ETH Zurich, Department of Computer Science, Zurich, Switzerland Ali Þengül, ETH Zurich, Department of Computer Science, Zurich, Switzerland Nesime Tatbul, ETH Zurich, Department of Computer Science, Zurich, Switzerland Chapter XLIII: Embracing the Social Web for Managing Patterns Pankaj Kamthan, Concordia University, Canada Chapter XLIV: Extending and Applying Web 2.0 and Beyond for Environmental Intelligence Bhuvan Unhelkar, Univ. of Western Sydney & MethodScience.com, Australia Bharti Trivedi, DD University - Nadiad , India Section IX: Social Web: Foundations, Analysis and Visualisation Chapter XLV: Social Software and Web 2.0: Their Sociological Foundations and Implications Christian Fuchs, University of Salzburg, Austria Chapter XLVI: Sociology of Virtual Communities and Social Software Design Daniel Memmi, University of Quebec in Montreal, Canada
  • 19. Chapter XLVII: Online Human Activity Networks (OnHANs): An Analysis Based On Activity Theory Dan J. Kim, University of Houston-Clear Lake, USA T. Andrew Yang, University of Houston-Clear Lake, USA Ninad Naik, University of Houston-Clear Lake, USA Chapter XLVIII: Visualising Social Networks in Collaborative Environments Stephen T. O’Rourke, The University of Sydney, Australia Rafael A. Calvo, The University of Sydney, Australia Chapter IL: The Discourses of Empowerment and Web 2.0: The Dilemmas of User-Generated Content Yasmin Ibrahim, University of Brighton, UK Chapter L: How Employees Can Leverage Web 2.0 in New Ways to Reflect on Employment and employers James Richards, Heriot-Watt University, UK Chapter LI: Privacy Implications and Protection in the New Ubiquitous Web Environment Charalampos Z. Patrikakis, National Technical University of Athens, Greece Ioannis G. Nikolakopoulos, National Technical University of Athens, Greece Athanasios S. Voulodimos, National Technical University of Athens, Greece