emerging trends and challenges in information technology management.pdf

1092
Emerging Trends and Challenges in Information Technology Management 2006 Information Resources Management Association International Conference Washington, DC, USA May 21-24, 2006 Mehdi Khosrow-Pour Information Resources Management Association, USA Hershey • London • Melbourne • Singapore IDEA GROUP PUBLISHING

Upload: deepak-saxena

Post on 17-Sep-2015

156 views

Category:

Documents


1 download

TRANSCRIPT

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Emerging Trends and Challenges inInformation Technology Management

    2006 Information Resources Management AssociationInternational Conference

    Washington, DC, USA

    May 21-24, 2006

    Mehdi Khosrow-PourInformation Resources Management Association, USA

    Hershey London Melbourne SingaporeIDEA GROUP PUBLISHING

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Acquisitions Editor: Michelle PotterSenior Managing Editor: Amanda AppicelloManaging Editor: Jennifer NeidigDevelopment Editor: Kristin RothPrinted at: Yurchak Printing Inc.Typesetter: Sharon Berger, Diane Huskinson, Jennifer Neidig, Marko Primorac, Sara Reed

    Published in the United States of America byIdea Group Publishing (an imprint of Idea Group Inc.)701 E. Chocolate AvenueHershey PA 17033Tel: 717-533-8845Fax: 717-533-8661E-mail: [email protected] site: http://www.idea-group.com

    and in the United Kingdom byIdea Group Publishing (an imprint of Idea Group Inc.)3 Henrietta StreetCovent GardenLondon WC2E 8LUTel: 44 20 7240 0856Fax: 44 20 7379 0609Web site: http://www.eurospanonline.com

    Copyright 2006 by Idea Group Inc. All rights reserved. No part of this book may be reproduced in any form or by anymeans, electronic ro mechanical, including photocopying, without written permission from the publisher.

    ISBN 1-59904-019-0 (print version)ISBN 1-59904-020-4 (CD-ROM version)

    British Cataloguing in Publication DataA Cataloguing in Publication record for this book is available from the British Library.

    The manuscripts published in these proceedings were subject to a blind, peer review by at least three reviewers. Manuscripts are assigned to reviewerswith specific expertise in the area of the paper. IRMA 2006 International Conference utilized 500+ expert reviewers, external to the conferenceorganizing committee to complete the blind peer/expert review. Each manuscript is assigned to at least three expert reviewers adn is subject to a blind,peer review by these reviewers. A final decision is made based upon the recommendations of the reviewers.

    Emerging Trends and Challenges in Information Technology Management (ISBN 1-59904-019-0) is printed in two volumes.Volume 1 covers pages 1-503. Volume 2 covers pages 504-1077.

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Table of ContentsAccounting Information SystemsA Risk-Based Approach to Auditing Relational Databases

    Wendy S. Walker and Jeffrey W. Merhout ................................ 9 3 2Integrating Information Security and Assurance into MIS Curriculums

    Jeffrey W. Merhout and Douglas J. Havelka ............................. 8 8 3Knowledge Dissemination Using a Hybrid of Teaching Techniques:

    Lessons Learned from the Case of The American University in CairoKhaled Dahawy and Sherif Kamel .............................................. 1045

    The Design and Validation of a Knowledge-Based System for theAuditors ReportMohamed A. Wahdan, Pieter Spronck, Hamdi F. Ali, Eddy Vaassen,and H. Jaap van den Herik ............................................................. 3 6 2

    The Effects of Contexts and Cognitive Characteristics on AccountingInformation Processing: A Review of Behavioral Accounting andCognitive Psychology ResearchMohamed A. Elbannan ................................................................... 4 8 2

    Agile Approaches to Systems DevelopmentAgile Practices, Promises of Rigor, and Information Systems Quality

    Sue Kong, Kenneth E. Kendall, and Julie E. Kendall ............... 9 9 4

    Business Data Communications and NetworkingExpert Workshop: Mobile Business Outlook 2008-2010

    Martin Steinert, Patrick Merten, and Stephanie Tuefel ......... 8 8 5Modeling and Simulation of IEEE 802.11 WLANs: A Case Study of a

    Network SimulatorNurul I. Sarkar and Roger McHaney ............................................ 7 1 5

    Performance Study of IEEE 802.11b Wireless LAN under High TrafficConditionsNurul I. Sarkar .................................................................................. 1 0 1

    Potential Weaknesses in Risk Assessment for Business DataCommunicationsPhilip Irving, Sonia Tindle, and John Tindle .......................... 1049

    Business Process ManagementA Framework for Situating Business Process Engineering Approaches:

    An Illustration with ARIS and EKD-CMMSelmin Nurcan and Zhichao Song ................................................ 2 8 5

    Facilitating Successful Business Process Management Projects: Pitfallsand Success FactorsYvonne Lederer-Antonucci and Vijay Khatnani ...................... 8 2 5

    Identify the Effective Factors to Select the Appropriate Form ofCollaboration between One Company and Other Companies inInformation Technology Industry in IranPayam Hanafizadeh, Mina Rohani Tabatabai, and Seyed Ali AkbarHosseini .............................................................................................. 8 8 8

    Lean Order ManagementHans-Henrik Hvolby ....................................................................... 5 8 6

    OUML: A Language to Map Observed Usages to BPMLJean-Mathias Heraud, Laure France, and Joseph Heili ............ 6 8 3

    Process Performance Measurement: Identifying KPIs that Link ProcessPerformance to Company StrategyP. Willaert, J. Willems, D. Deschoolmeester, and S. Viaene 7 4 0

    QoS Driven Dynamic Task Assignment for BPM Systems Using FuzzyLogicCagil Tasdemir and Candemir Toklu ........................................... 7 6 7

    Recent Trends in Innovation and Business Models in the New DigitalEconomySoumaya Ben Letaifa and Yves Rabeau ...................................... 4 5 7

    Relating Business Processes to the Elements of Underlying IT ApplicationJoseph Barjis, Derek B. Weaver, and Isaac Barjis .................... 5 5 9

    Resource Optimization on Flow Shop Scheduling for Industrial CaseUsing SimulationIbrahim Al Kattan and Ahmed Al Nunu ..................................... 5 5 1

    Service Oriented InvestmentMarc Rabaey, Eddy Vandijck, Koenraad Vandenborre, and MartinTimmerman ...................................................................................... 5 1 4

    Supporting Interactions Between Organizations with Language-ActionModelsPeter Rittgen .................................................................................... 1 7 2

    The Convergence Strategy in Small and Medium Sized CompaniesExemplified by E-Business and T-Business OrganisationsJerzy A. Kisielnicki ........................................................................... 78

    Total Value Consideration for OutsourcingVijay Vanarase, Marina Onken, Donna Maria Blancero, and WilliamAnderson ............................................................................................ 6 4 4

    Using Petri Nets to Represent Cross-Departmental Business ProcessesJoseph Barjis, Han Reichgelt, Paul Fort, and Chris Small .... 1 9 2

    Customer Relationship Management SystemsA Conceptual Framework for Electronic Customer Relationship

    Management (e-CRM): A Strategic ApproachForough Karimi and Reza Sarkhosh ............................................. 7 0 6

    A Design Science Approach to Investigating the Piloting of CustomerRelationship ManagementCarl Erik Wikstrm ........................................................................ 2 1 2

    Measuring the Returns of Information Driven Customer RelationshipManagement ToolsAhern Brown, Timothy Shea, and D. Steven White ............... 5 8 4

    Data Warehousing and MiningClassification and Rule Generation for Colon Tumor Gene Expression

    DataShawkat Ali and Pramila Gupta .................................................... 2 8 1

    Evidential Characterization of Uncertainty in Location-Based PredictionIftikhar Sikder .................................................................................. 6 5 4

    Hybrid Rough/Fuzzy Modeling of Advertising Effects on ConsumerPreferencesAshwani Kumar ................................................................................ 1 6 4

    Implementing Real Time OLAP with MDDC (Multi-DimensionalDynamic Clustering)Michael W. Martin and Rada Chirkova ...................................... 6 6 6

    Weakness of Association Rules: A Mechanism for ClusteringRajesh Natarajan and B. Shekar ................................................... 4 3 5

    Database Management TechnologiesArchitecting Personalized Information Retrieval and Access Services in

    Data Intensive DomainsNong Chen and Ajantha Dahanayake ......................................... 8 9 2

    Research Information Management System: BioRioYavuz Tor, Chaitanya Jasti, Zhixiang Chen, and Charles Harlow............................................................................................................. 9 4 9

    Decision Support TechnologiesAccess Control for Auditors in Corporate Collaboration

    Timon C. Du, Vincent Lai, Charles Chou, and Richard Hwang3 8 6Building HR Decision Support: Insights from Empirical Research

    Jochen Malinowski and Tobias Keim .......................................... 6 5 1

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Building HR Decision Support: Insights from TheoryJochen Malinowski and Tobias Keim .......................................... 8 2 9

    Cognitive Reconstructive Remote Sensing for Decision Support inEnvironmental Resource ManagementIvan E. Villalon-Turrubiates and Yuriy V. Shkvarko .............. 9 7 8

    Exotic Options with Stochastic VolatilitiesSanju Vaidya ...................................................................................... 9 9 7

    Intelligent Processing for SAR Imagery for Environmental ManagementIvan E. Villalon-Turrubiates ......................................................... 9 8 1

    The Challenge of Global Supply Chain: Cross-Cultural Issues in Using anExpert System Model(QuickView) to Evaluate International SmallManufacturersNorita Ahmad and Gene R. Simons ............................................. 4 9 4

    The Wireless Impact on the Legal System: A Case Study of a Law FirmStan Lewis, Ernest W. King, and Eddy J. Burks ....................... 9 0 6

    Distance Learning TechnologiesDesign of an Assistance Tool to Support the Tutor in the Setting-Up of

    Learning SituationsElise Garrot, Sbastien George, and Patrick Prvt ................ 4 2 4

    Process Driven Knowledgebase for Managing Student SupportH. Dexter and J. Petch ..................................................................... 86

    Quality Issues in E-Learning: Differences in Eastern and WesternApproachesAlan Murphy ..................................................................................... 8 1 1

    Service-Oriented Architecture: Technology Selection and Strategic ITManagementBrian R. Payne and A. James Baroody ....................................... 7 9 0

    The Impact of Distance Learning on Graduation Rates for InformationSystems StudentsMichael Mick and Susan E. Conners ........................................... 9 9 2

    Using Educator Portals and Vignettes with Adult Online LearnersMaria H.Z. Kish and Josephine Cocian Crame ......................... 5 6 7

    Visual Representation of Computer Mediated Communication Patternsin Distance LearningGeorgios A. Dafoulas ....................................................................... 6 2 7

    E-Business ResearchA Descriptive Study of Online Privacy in the GCC Countries

    Zeinab Karake Shalhoub ................................................................. 5 8 9Attitudes of Students Toward Electronic Cash

    Rosarito Snchez-Morcilio ............................................................ 3 9 4Business to Business E-Commerce and Inter-Firm Governance

    Qi Fei and Jim Q. Chen .................................................................... 38Coping with Business Relationships: Use of Mobile Solutions to Improve

    Inter-Organizational Business ProcessesJari Salo ................................................................................................ 97

    Creating and Maintaining Privacy and Trust in an Online TradingEnvironment: A Case StudySeamus Hill and Denise Melia ....................................................... 3 0 4

    E-Business in SMEs of Thailand: A Descriptive SurveyKatherine Blashki and Suttisak Jantavongso ............................. 4 4 8

    E-Marketplace: A Generic Electronic Catalogue Framework for SMEsYin Leng Tan and Linda A. Macaulay ........................................ 9 5 4

    E-Recruiting System DevelopmentIn Lee ................................................................................................. 3 9 7

    Evaluation of E-Commerce in Continental Native American NationsYun-ke Chang, Miguel A. Morales Arroyo, Suliman Hawamdeh, andJaime Jimnez ................................................................................. 1021

    Facilitators and Inhibitors of E-Commerce Adoption in an Irish SME:An Action Research Case StudyOrla Kirwan and Kieran Conboy .................................................. 3 7 4

    Hermeneutic Phenomenology: A Useful Tool for IS Educators?Steve Benson .................................................................................... 3 9 2

    Money Laundering Using Electronic Payment SystemsJuergen Seitz and Krzysztof Woda ............................................... 4 0 2

    Predicting Online Customer Shopping BehaviorFan Zhao and Sagar S. Kulkarni ................................................... 8 4 6

    The Benefits of an E-Business Performance Measurement SystemMatthew Hinton and David Barnes .............................................. 9 1 8

    The Effect of Propensity to Trust on Customers Initial Trust in Web-Based Online StoresEuijin Kim and Suresh Tadisina .................................................... 2 2 0

    The Virtual User Shopping Experience: A Multi-Faceted ClassificationAhmeyd Mahfouz ............................................................................. 4 6 8

    Unattended Delivery for Online Shopping: An Exploratory Study FromConsumers PerspectivesBrett Ferrand, Mark Xu, and Martyn Roberts ............................ 30

    Web Ontology as E-Business Information Exchange and DecisionSupport ToolYefim Kats, James Geller, and Kuo-chuan Huang .................... 9 6 8

    E-CollaborationBuying Stuff on the Web: Can Users Correctly Identify Deception in

    Purchasing Contracts?Ned Kock, Jacques Verville, Hafizul Islam, and Jesus Camona ................................................................................................................. 3 9 9

    e-HR: A Custom Electronic Human Resources Management SystemM. Almanhali, M. Radaidah, and T. Shehabuddin .................... 6 7 2

    Leadership and Organizational Citizenship Behavior in E-CollaborativeTeamsRichard R. Reilly, Karen Sobel Lojeski, and Michael R. Ryan .................................................................................................................. 7 0 4

    Leveraging Collaborative Technologies for Sharing Tacit Knowledge:An Integrative ModelVikas Sahasrabudhe and Subhasish Dasgupta .............................. 9 3 4

    Reasoning about Functional and Non-Functional Concerns during ModelRefinement: A Goal-Oriented and Knowledge-Based ApproachLawrence Chung and Sam Supakkul ............................................. 6 6 8

    Stimulating Creativity and Innovation through People-ConceptsConnectivity within On-Line Collaborative WorkspacesMarc Pallot, Wolfgang Prinz, and Kulwant Pawar ................ 1018

    The Role of E-Collaboration Participative BudgetingKevin E. Dow, Penelope Sue Greenberg, and Ralph H. Greenberg............................................................................................................. 9 7 6

    Towards Collaborative Worker-Centric Innovation Networks: AConceptual Outline and Research ChallengesFalk Graser, Jens Eschenbaecher, and Klaus-Dieter Thoben . 6 3 9

    Unintended Consequences of Instant Messaging in the Workplace: AnEmpirical StudyJesus Carmona ................................................................................... 8 3 9

    Electronic Commerce Technologies ManagementCognitive Antecedents of Trust in Electronic Commerce Among Chinese

    Internet UsersYuan Gao and Dean Xu ................................................................... 8 3 6

    Redundancy Reduction Utilizing XML, Web-Services and 2-D Bar CodesGreg Koniecek and Paul Darbyshire ............................................ 5 7 8

    The Retaliatory Feedback Problem: Evidence from eBay and a ProposedSolutionRoss A. Malaga ................................................................................. 8 2 2

    Understanding the Impact of Innovation Characteristics and IndividualFactors on Adoption of Online ChannelsAnnette M. Mills, Lila Rao Graham, and Gunjan Mansingh .. 9 4 2

    Electronic Government ResearchA Market-Based Information Resource Management Approach in

    Information GridYanli Hu, Liang Bai, Weiming Zhang, Weidong Xiao, Zhong Liu, andYingchao Zhang ............................................................................... 2 3 9

    A Study on the Information Quality Satisfaction of CommunicationPortals in the Hong Kong GovernmentShuk Ying Ho and Kevin K. W. Ho ............................................... 91

    Developing Successful Strategies for ICT Initiatives in the Public Sector:The Case of Electronic Government Strategies in a U.S. CityBob Stea and G. Harindranath ....................................................... 8 7 6

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Performance Measurement for E-Government Scenarios: A ReferenceProcess Model Based ApproachThomas Matheis, Christine Daun, and Peter Loos .................. 9 2 0

    The Case of eReadiness on eGovernment in Developing Nations Caseof EgyptHany Abdelghaffar and Sherif Kamel .......................................... 7 2 8

    The Use of Paralingual Web Pages to Improve Trust in E-GovernmentWeb Sites in Regions of Highly Bilingual PopulationsRoy Segovia and Murray E. Jennex ............................................. 9 8 4

    Enterprise Information SystemsA Systematic View of ERP Implementation

    Carin Chuang and Kuan-Chou Chen ............................................ 9 0 4Frameworks for Building Enterprise Information Architectures

    Mahmood H. Shah and Zaigham Mahmood ............................... 5 4 1Methodology Issues in Enterprise Systems Implementations

    Lambertus Verhage .......................................................................... 9 2 2Toward a Quality Model for Enterprise Information Systems in

    Developing Countries: A Jamaican Case StudyEvan W. Duggan and Charlette Donalds .................................... 8 5 0

    Trends in the Delivery and Utilization of Enterprise ICTJiri Vorisek and George Feuerlicht ............................................... 1 1 8

    Users Expectations and Reality of ERP System: ImplementationExperience in Higher EducationAdekunle Okunoye and Mark Frolick ......................................... 5 2 5

    Geographic Information SystemsA Conceptual Geospatial Data Warehouse Model for Forest Information

    ManagementRobert Magai and Wookey Lee .................................................... 7 5 3

    A Proposed Software Architecture for Graphical Data Manipulation inthe Context of a Mobile GIS for the Tourism Industry in MauritiusGeerish Suddul and Nawaz Mohamudally .................................... 9 2 5

    Key Aspects in Community-Based Coastal Emergency Response GISX. Mara Chen, Colleen Parrott, and Karin E. Johnson .......... 1 1 4

    Global IT ManagementTransformational Leadership and Information Technology Management

    Integration Framework: A Normative Framework to AchieveOrganizational Performance EffectivenessWilliam S. Boddie ............................................................................. 5 4 5

    Human Computer InteractionAchieving Implementation Success in Ubiquitous Computing

    Environments: Understanding the Role of Psychological OwnershipEdward J. Garrity, Jonghoon Moon, and G. Lawrence Sanders ................................................................................................................... 34

    Advanced Multi-Modal User Interfaces for Mobile Devices: Integrationof Visualization, Speech Interaction and Task ModelingNorman Biehl, Antje Dsterhft, Peter Forbrig, Georg Fuchs, DanielReichart, and Heidrun Schumann ................................................. 8 6 2

    Feature Requirements in Educational Web Sites: A Q-Sort AnalysisSunil Hazari ....................................................................................... 6 9 4

    Measuring Credibility Assessment Targets in Web-Based InformationJim D. Collins ..................................................................................... 11

    Visualization in Multimodal User Interfaces of Mobile ApplicationsGeorg Fuchs and Heidrun Schumann ............................................ 3 4 5

    Human Side of ITResearch in Progress: A Field Study of Career Anchors and Women in

    the IT ForceJeria L. Quesenberry ........................................................................ 9 7 4

    Being and Appearing: Human Interfaces in the Digital AgeLars-Erik Janlert .............................................................................. 2 3 2

    Problematic Assimilation of ICTs in Radiology Practices: An ExploratoryInvestigation of the Four Dimensions of the Social Actor FrameworkJeanette Lew ..................................................................................... 3 8 1

    Small Business Experience and Governance of Employee Owned PersonalDigital DevicesW. Brett McKenzie ....................................................................... 1004

    Users as Subjects in and of Co-DesignPeter Rittgen ..................................................................................... 4 5 9

    Information Ethics IssuesA Cross-Country Comparison of Software Piracy Determinants Among

    University Students: Demographics, Ethical Attitudes and Socio-Economic FactorsArsalan Butt ...................................................................................... 9 2 7

    Avatars, Student Friend, Lecturer Foe? The Use of Avatars to SupportTeaching and LearningElaine Ferneley and A. Kamil Mahmood ................................... 4 1 5

    Can Identity Theft Defense be Practically Effective? A TAM-DerivedSurvey of Software-Based Deterrence to Phishing and PharmingCharles McClain ............................................................................... 4 5 2

    Crossing Privacy, Information, and EthicsSabah S. Al-Fedaghi ........................................................................... 26

    Cyberloafing: Vice or Virtue?Constant D. Beugr and Daeryong Kim ...................................... 8 3 4

    Information Technology and the Ethics of GlobalizationRobert A. Schultz ............................................................................. 8 4 2

    The Internet and Digital Imaging: A Recipe for Visual DeceptionLucie Joshko and Jerome Moscicki ............................................. 5 9 1

    Information Quality ManagementA Comparison of Quality Issues for Data, Information, and Knowledge

    Elizabeth Pierce, Beverly Kahn, and Helin Melkas ................. 60A Value-Driven Model for Data Manufacturing: An Application for

    Optimal Error-Correction PolicyAdir Even and G. Shankaranarayanan ......................................... 7 4 9

    Achieving Data Quality in Engineering Asset ManagementJing Gao, Shien Lin, and Andy Koronios ................................... 6 0 7

    Amount and Utility of Information Values: Two Cases of the Two MostMisunderstood Quality AttributesZbigniew Gackowski .......................................................................... 63

    Designing a Balanced Data Quality ScorecardJohn R. Talburt and Traci Campbell ........................................... 5 0 6

    Information Mapping: A Case of Operating Theatre List ManagementProcessLatif Al-Hakim ................................................................................. 7 9 9

    Intrinsic and Internal vs External View of DQ/IQ (A Case of Relativity)Zbigniew Gackowski ........................................................................ 3 8 8

    Theoretical Framework for Mapping Information of Social-TechnicalProcesses: A Case of Operating Theatre Waiting List ManagementProcessGerhardine Foo and Latif Al-Hakim ........................................... 7 1 9

    Information Security ManagementService-Oriented Approach to Developing Security Policies for

    Trustworthy SystemsKassem Saleh, Abdulaziz Alkhaili, and Ibrahim Alkattan ...... 9 0 1

    An Investigation of Information Security Policies, Procedures, andPerceptions within University CampusesRamesh Subramanian, Robert Tordella, and Minnie Yen ....... 7 3 2

    Building Career in Information Security ManagementKuan-Chou Chen and Carin Chuang ............................................ 6 9 6

    Consideration of Privacy Protection for Ubiquitous Applications throughan Interdisciplinary ApproachKunihiko Kido and Satoshi Yasiro ............................................... 1 4 3

    Development of a Weighted Network Security Measure Based on aSoftware Reliability ModelBong Gun Cho, Il-Yeol Song, Sung Y. Chin, and Charlie Y. Shim............................................................................................................. 4 7 5

    Increasing Governmental Regulations and Their Impact on IT: SOX andHIPAAAmita Goyal Chin and Sushma Mishra ....................................... 4 1 8

    Information Security: Impacts of Leadership and Organizational CultureGary Tarbet and Theodore Schlie ................................................ 4 6 2

    Monitoring-Based Coordinated Defense through the Lens of theCoordination TheoryShuyuan Mary Ho and U. Yeliz Ereryel ...................................... 1 8 8

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Revealing Prospect Theory Bias in Information Security DecisionMakingNeil J. Schroeder and Michael R. Grimaila ................................. 1 7 6

    Security by Integration, Correlation and Collaboration: IntegratingVerification Reusable Agents into SOAP MessagesKhalil A. Abuosba ............................................................................ 9 6 6

    Security Status and Security Model for Mid-Size Accounting Firms inNew ZealandLech J. Janczewski and Vincent Tai ............................................ 2 6 9

    Target, Shield and Weapon: A Taxonomy of IT Security InitiativesLaura Lally .......................................................................................... 23

    The Architecture of Presence Investigation for Remote ControlHsieh-Hong Huang and Cheng-Yuan Ku ..................................... 9 5 1

    Information Technology EducationEverything We Wanted to Know About Our Course, but were Afraid to

    Ask: Views from the Student PerspectiveAnne Venables, Sarojini Devi Nagappan, and Asim Ghous .... 5 9 5

    Application of a Collaborative Virtual Environment for LearningMolecular BiologyMiguel A. Garcia-Ruiz, Ricardo Acosta Diaz, Maria Andrade-Arechiga,and Juan Contreras-Castillo ......................................................... 1027

    Computer-Based Edutainment for Children Aged 3 to 5 Years OldMan-Ying Cheung, Koon-Ying Raymond Li, and Tim Zapart............................................................................................................. 2 9 3

    Design Tools for Facilitating Qualitative Research Design in theInformation Systems EnvironmentJakovljevic Maria ............................................................................. 2 7 3

    E-Assessment in Information Technology EducationGeorgios A. Dafoulas ....................................................................... 5 1 6

    Enabling Multidisciplinary Learning: A Descriptive StudyJuha Kontio ....................................................................................... 5 0 9

    Facilitating Group Learning in IT Higher EducationLibby Hobson and Carmen Joham ................................................ 5 6 5

    Implementing Educational Technology in K-12 Public Education: TheImportance of Factors to Senior School Administrators inPennsylvaniaLawrence A. Tomei and David Carbonara ................................. 7 4 5

    Implementing Educational Technology in K-12 Public Education: TheImportance of Factors to Senior School Administrators inPennsylvaniaDavid D. Carbonara and Lawrence A. Tomei ......................... 1038

    Pathways to Producing Digital PortfoliosEleanor J. Flanigan and Susan Amirian ....................................... 6 9 8

    Role of Organizational Context on Digital Librarys Success FactorNoornina Dahlan, Noorliza Karia, Muhammad Hasmi Abu HassanAsaari, T. Ramayah, and Goon Tuck Lee .................................. 7 1 2

    Student Preferences for Reflective Learning Journals in a StudioEnvironment: A SurveyAleksander Sasha Talevski and Mark Szota .............................. 1 0 5

    Teaching Information and Communication Technology in the ArabWorld: An Examination of CurriculumAnil Sharma, Khalifa Ali Alsuwaidi, and Stephen Boylan ...... 3 1 6

    Teaching Java: Applications of Programmed Instruction and CollaborativePeer TutoringHenry H. Emurian ........................................................................... 4 3 8

    The Current State of the MIS Course: A Study of Business Program ISCurriculum ImplementationFred K. Augustine, Jr. and Theodore J. Surynt ......................... 9 7 2

    The Dispositions of Professional Educators Contemplating The Use ofThe Readingpen as a Motivational Factor to Increase ReadingFluencyHeather Naleppa .............................................................................. 9 5 7

    Towards a General Framework for the Study of ICT Skill Supply andDemandKrassie Petrova and B. Dawn Medlin .......................................... 2 5 5

    Using Reflective Learning in an Introductory Programming CourseJoo Eng Lee-Partridge ...................................................................... 94

    Information Technology in EuropeFactors that Influence the SMEs Adoption of Application Service

    ProvidersGeorge Meletiou, Alemayehu Molla, and Adekunle Okunoye............................................................................................................. 6 3 5

    The Next Wave in IT Infrastructure Risk Management: A CausalModeling Approach with Bayesian Belief NetworksDaniel J. Hinz and Heiko Gewald ................................................. 1 4 8

    Intellectual Property IssuesRole-Based Approach to Intellectual Asset Management in Service

    OrganizationsS. Ramesh Babu, V.P. Kochikar, and M.P. Ravindra ............... 4 6 5

    Intelligent Information TechnologiesA Framework for Context-Aware Question Answering System of the

    Math Forum Digital LibraryShanshan Ma and Il-Yeol Song ..................................................... 2 0 0

    Cooperative and Dialog-Based Multi-Agents in Global Software DeliveryManagementRavi Gorthi, Andie Kurniawan, and Nandan Parameswaran .. 3 7 7

    The Safety Effect of the Red Light Running Cameras: Applying DataMining Techniques Using ......................................................................Fatality Analysis Reporting System (FARS) DataScott Solomon, Jay Liebowitz, William Agresti, and Hang Nguyen........................................................................................................... 1051

    Interactive and Educational TechnologyAdaptive IT Education through IT Industry Participation

    MSD Fernando, ANW Dahanayake, and HG Sol ...................... 7 9 7Introducing Computer-Supported Team-Based Learning: Preliminary

    Outcomes and Learning ImpactsElizabeth Avery Gomez, Deziu Wu, Katia Passerini, and MichaelBieber .................................................................................................. 6 0 3

    Modeling of CHO Metabolism and Krebs Cycle Using Petri-Nets (PN)Isaac Barjis, Sidi Berri, Nwayigwe Okpa, Jennifer Tan, and IdlineAgustin ............................................................................................... 8 5 4

    Survey on IT Industry and University Collaboration for Adaptive CourseDevelopmentMSD Fernando, ANW Dahanayake, and HG Sol ...................... 4 8 6

    IRM in GovernmentThe Determinants of Information Resource Management: Substantiating

    a ConstructPaul M. Chalekian ........................................................................... 8 3 2

    IT and Supply Chain ManagementAnalysis of Information Security in Supply Chain Management Systems

    Ibrahim Al Kattan, Ahmed Al Nunu, and Kassem Saleh ......... 6 8 0Herd Behavior and the BullWhip Effect: Information Access, or Risks

    and Rewards?Patrick I. Jeffers, Rhoda Joseph, and Francis A. Mendez ...... 6 8 8

    IT Support for Managing Aircraft Spares in a Closed-Loop Supply ChainTrackMichael MacDonnell and Benjamin T. Clegg ........................... 6 3 1

    RFID: Risks to the Supply ChainSanjay Goel and Jakov Crnkovic ................................................ 1033

    Strategic and Operational Benefits of B2B Data Exchange Technologiesin Supply Chain ManagementMaria Madlberger ............................................................................. 9 1 3

    Strategic IS Usage to Support Supply Chain Activities: A BP-ISPIntegration PerspectiveChe-Chan Liao and Pu-Yuan Kuo ................................................ 5 3 8

    IT Business ValueE-Business Innovation and Firm Performance

    Namchul Shin .................................................................................. 1013Measuring the Business Value of IT: A Resource-Based View of Leading

    Indicators

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Penelope Sue Greenberg, Ralph H. Greenberg, Kevin E. Dow, andJeffrey Wong .................................................................................... 7 0 2

    The Impact of CEO/CIO Convergence on IT Strategic AlignmentAlice Johnson and Albert L. Lederer ............................................ 50

    The Impact of Information Technology on Productive Efficiency: AnInternational ComparisonWinston T. Lin and Page P. Tsai .............................................. 1011

    IT Evaluation Methods and ManagementA Formal Approach to Information Lifecycle Management

    Lars Arne Turczyk, Oliver Heckmann, Rainer Berbner, and RalfSteinmetz ........................................................................................... 5 3 1

    A Methodology for Educational Software Evaluation (ESE)Norelkys Espinoza, Bexi Perdomo, and Marco Flores ........... 9 3 9

    Adoption of Pharmaceutical Sales Force Automation Systems: AnExploratory StudySung J. Shim ...................................................................................... 9 9 9

    An Analytical Model of Information Lifecycle ManagementLars Arne Turczyk, Oliver Heckmann, Rainer Berbner, and RalfSteinmetz ........................................................................................... 5 2 7

    Developing Best Practice in Intranet Evaluation: A Comparison ofEvaluation Models for Usability and AcceptanceJames Hill, Murray Scott, Thomas Acton, and Peter OBoyle ................................................................................................................. 4 3 0

    Examining the Value of Management Control in IT OrganizationsSerta Son, Tim Weitzel, and Wolfgang Knig ........................ 2 3 5

    Leveraging the Balanced Scorecard to Measure and Manage InformationTechnology GovernanceWim Van Grembergen and Steven De Haes ............................... 3 5 3

    Selecting RFID Technology in the Manufacturing Industry Sector: ADecision Criteria ProposalPuja Sahni and Gerry Grant ........................................................... 3 6 7

    The Evaluation of IT Investments through Real OptionsMaria Alice Frontini and Fernando Jos Barbin Laurindo ...... 4 7 9

    IT Global SourcingContracts for Successful Outsourcing: Analyzing the Impact of Pricing

    Structures, Penalty & Reward Systems, and Liability Clauses onGood Sourcing RelationshipsCornelia Gellings .............................................................................. 7 0 9

    Decision Making Process of Information Systems OutsourcingEdward T. Chen, Jeffrey Hsu, and Kuoching Feng ................... 1 3 0

    Managing Outsourced Support for ERP SystemsN. Dayasindhu ................................................................................... 8 7 7

    Outsourcing, Insourcing IT-Related Business: The Impact on theOrganizationJames A. Sena ..................................................................................... 19

    IT in Small BusinessA TPM Toolset for Small and Medium-Sized Businesses

    Axel C. Schwickert and Bernhard Ostheimer ............................ 2 5 1Communities of Practice and Performance: Perceptions of IT Personnel

    in Small Organizations in the USALoreen Marie Butcher-Powell and Brian Cameron .................. 3 1 3

    Impact of Technology on the Legal System: A Study of a Law FirmsDisaster Recovery PlanningStan Lewis, Ernest W. King, and Eddy J. Burks ....................... 1 2 7

    The Use of Hard and Soft Technologies for Knowledge Management inSmall BusinessesSathasivam Mathiyalakan .............................................................. 9 1 6

    Variations in Adoption Factors and Use of E-Commerce Among SmallBusinesses: Are all SMEs the Same?Elizabeth Regan and Scott Wymer .............................................. 9 4 4

    IT Management in Asia Pacific CountriesFacilitators of IT-Business Alignment Between End-Users and IT Staff:

    A FrameworkDeb Sledgianowski ............................................................................ 4 7 0

    The Challenge of E-Business in China: Exploring Competitive Advantagewithin the Electrical Appliance IndustryYan Tao, Matthew Hinton, and Stephen Little ........................ 6 9 1

    IT Management in Developing CountriesA Global Culture for E-Learning

    Alan Murphy ..................................................................................... 8 9 8A Prototype Decision Support System for ERP Evaluation in Small and

    Medium EnterprisesLeopoldo E. Colmenares G. ......................................................... 1015

    Information Systems in Developing Countries: Reasons for Failure Jordan, Case StudyMaha T. Al-Mahid and Evon M. Abu-Taieh ............................. 8 6 8

    IT Management in HealthcareA Complex Data Warehouse for Personalized, Anticipative Medicine

    Jerme Darmont and Emerson Olivier ....................................... 6 8 5A Content-Based Approach to Image Retrieval in Medical Applications

    Thomas Lehmann, Thomas Deselaers, Henning Schubert, MarkOliver Gld, Christian Thies, and Klaus Spitzer ....................... 9 1 1

    Data Management Challenges for U.S. Healthcare ProvidersSteven B. Dolins and Robert E. Kero .......................................... 7 2 4

    Health Community Portals: A Wish ListDaniel Carbone and Stephen Burgess .......................................... 3 4 1

    Improving Hospital Performance: A Framework for Designing MedicalIT SystemsRobert J. Mockler and Dorothy G. Dologite ............................. 4 4 1

    Networkcentric Healthcare: Strategies, Structures and Technologies forManaging KnowledgeDag von Lubitz and Nilmini Wickramasinghe ............................... 5

    Query Reformulation with Information-Based Query Expansion forHandling Medical Scenario QueriesYong Jun Choi .................................................................................. 3 2 5

    IT Teaching CasesAn Online Counseling Platform for a Mexican UniversityRicardo Acosta-Daz, Arthur Edwards, Ral Aquino Santos, Miguel A.

    Garcia-Ruiz, Jorge Rafael Gutirrez-Pulido, and Juan Contreras-Castillo ............................................................................................... 3 3 7

    Postgraduate Student Attendance: Face-to-Face vs. OnlineStephen Burgess and Paul Darbyshire .......................................... 3 4 9

    Knowledge ManagementA Knowledge Contribution Model to a Knowledge Management System

    George W. Stewart and Evan W. Duggan ................................... 2 1 6Beyond Skill Management: Innovative Ways of Competency Catalogue

    ApplicationKai Reinhart and Ernst Biesalski .................................................. 4 2 7

    Common Ground? Explaining the Willingness to Share Knowledge inOrganizational TeamsPernill G.A. van der Rijt ................................................................ 4 0 6

    Information and Knowledge Sharing by Undergraduate Students inSingaporeShaheen Majid and Ting Jer Yuen .............................................. 1057

    IS to Support Innovation: Weapons of Mass Discussion?Brian Donnellan, Kieran Conboy, and Seamus Hill ................. 6 2 3

    Just-In-Context Clinical Knowledge Dissemination with ClinicalInformation AssistantYong Jun Choi and Juman Byun ................................................... 3 2 9

    Knowledge Leadership vs. Knowledge Management: The MalaysianBankers ViewMuhamed Ali Haiazi and Zawiyah Mohammad Yusof ............ 3 5 7

    Meta-Matrix Modeling for Knowledge Management: An IntroductionRonald Dattero and Jing Jim Quan ............................................... 1 9 6

    Multi-Functional Stakeholder Information System for StrategicKnowledge Management: Theoretical Concept and Case StudiesKerstin Fink, Christian Ploder, and Friedrich Roithmayr ...... 1 5 2

    Organisational Strategy, Structure and Culture: Influences onOrganisational Knowledge SharingSharman Lichtenstein and Michael Edward Brain .................... 5 7 1

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Organizational Administrative Information Management: IssuesConcerning Distribution, Retention, and Availability of Work-Related InformationDavid W. Miller, Paul J. Lazarony, and Donna A. Driscoll .. 9 7 0

    Quantitative versus Qualitative Approaches to Tacit Knowledge TestingPeter Busch, Lee Flax, and Debbie Richards ............................. 4 9 0

    Social Capital and Knowledge Sharing in Virtual CommunitiesTeresa L. Ju, Hui-ching Chen, and Patricia H. Ju .................... 4 0 9

    The Role of Social Networks in Tacit Knowledge DiffusionPeter Busch and Debbie Richards ................................................. 5 0 4

    Transforming Universities from Teaching Organizations to LearningOrganizations by Implementing eKM: A Pakistani Public SectorUniversity ScenarioEram Abbasi, Nadeem A. Syed, Arshad Siddiqui ........................ 8 7 1

    Validating the Indicators for the Knowledge-Based Economy: A CaseStudy of Economic Development Board of SingaporeAbdus Sattar Chaudhry and Fong Pin Fen .................................. 8 0 4

    Wanted: A Framework for IT-Supported KMLena Aggestam ................................................................................... 46

    Managing Electronic CommunicationBuilding a Tool for Expertise Discovery

    Sara Tedmori, Thomas Jackson, Dino Bouchlaghem, HolgerAdelmann, and Rama Nagaraju ................................................... 1053

    Developing an Email Interception and Interpretation InformationSystem to Reduce Employee InterruptionsThomas W. Jackson and Stephen Smith .................................... 6 1 1

    Spim, Spam and Advertisement: Proposing a Model for ChargingPrivacy Intrusion and HarassmentDionysios Politis, Georgios John Fakas, and Konstantinos P.Theodoridis ....................................................................................... 6 7 7

    Mobile Computing and CommerceA Practical X10 Protocol Implementation over a Cellular Network

    Using SMSJoffre Pesantez and Hernn Crdova .......................................... 8 5 7

    A Scheme of Technology Acceptance for Mobile ComputingPatricia H. Lapczynski and Linda Jo Calloway ........................ 2 0 8

    Acceptance of the Mobile Internet as Distribution Channel for PaidContentChristian Kaspar, Lutz Seidenfaden, Bjrn Ortelbach, and SvenjaHagenhoff ............................................................................................ 68

    Adaptive Web Browsing Using Web Mining Technologies for Internet-Enabled Mobile Handheld DevicesWen-Chen Hu, Jyh-haw Hu, Hung-ju Chu, and Sheng-Chien Lee............................................................................................................. 2 7 7

    Determinants of 3G Mobile Video Adoption by the South African MobileConsumerFaizel Richards and Jean-Paul Van Belle .................................... 7 7 2

    Mobile Auctions: Will They Come? Will They Pay?Paul W. Forster and Ya Tang ....................................................... 7 7 9

    Mobile Gaming: A Reference Model and Critical Success FactorsKrassie Petrova and Haixia Qu ..................................................... 2 2 8

    Multicultural Issues in IT ManagementCross-Cultural Issues in Global Information Systems Development

    Haiyan Huang ................................................................................... 9 3 0Cultural Issues in Information Systems Research: A Review of Current

    Literature and Directions for Future ResearchSubhasish Dasgupta and Li Xiao ................................................... 7 0 0

    Gender Discrimination in IT Salary: A Preliminary InvestigationJing Jim Quan, Ronald Dattero, and Stuart D. Galup ............ 82

    Multimedia Information ManagementMethodologies for Developing Multimedia Systems: A Survey

    Mark Szota and Kirsten Ellis ............................................................. 1Modeling of DNA Transcription and Gene Regulation Using Petri Nets

    Isaac Barjis, Wallied Samarrai, Idline Augustine, and Joseph Barjis............................................................................................................. 5 4 8

    Speed Analysis of Camera Motion in Video SequenceThitiporn Lertrusdachakul, Terumasa Aoki, and Hiroshi Yasuda........................................................................................................... 1001

    Object Oriented TechnologiesSpecifying Refactorings as Metamodel-Based Transformations

    Claudia Pereira and Lilianna Favre .............................................. 2 6 4

    Open Source SoftwareA Framework for Teaching Information Security Laboratory Projects

    with Open Source SoftwareMariana Hentea ................................................................................ 2 9 0

    A Proposed Framework for Assessing the Factors Influencing theAdoption of Free and Open Source Application Software inOrganizationsGerald G. Grant, Lila Rao Graham, and Gunjan Mansingh ..... 3 3 3

    Philosophical Viewpoints in Information ManagementA Framework for Design Science Research Activities

    John Venable ..................................................................................... 1 8 4Making Choices: Research Paradigms and Information Management:

    Practical Applications of Philosophy in Information ManagementResearchM. E. Burke ......................................................................................... 15

    Philosophical Foundations of Information ModelingJohn M. Artz .................................................................................... 4 4 3

    Web Ontologies and Philosophical Aspects of Knowledge ManagementYefin Kats ......................................................................................... 8 4 4

    Project Management and ITCombat the Menace of Scope Creep of Development Projects through

    the Use of EUReqa Methodology: A Collaborative and IterativeRequirement Engineering ProcessRavi Sankar, Rambabu Yeleti, and Addul Hakeem ................... 9 6 0

    From Functional Structure to Project Structure: A Brazilian ClinicalResearch Company CaseMarcos Antonio de Oliveira and Marly Monteiro de Cavalho ................................................................................................................. 5 1 2

    Integrated Approach to Risk Management for Custom SoftwareDevelopment and Maintenance InitiativesN Dayasindhu, Sriram Padmanabhan, and Jamuna Ravi ......... 7 9 3

    Modeling of Project Dynamics in IT Sector: A System DynamicsApproach for Resource Optimization from a Risk PerspectiveN. Dharmaraj, Lewlyn L.R. Rodrigues, and Shrinivasa Rao B. R.............................................................................................................. 8 9 5

    One Size Does Not Fit All: Modeling the Relationship between SystemDevelopment Methodology and the Web-Based System EnvironmentTheresa A. Steinbach and Linda V. Knight ................................ 9 3 7

    Project Portfolio ManagementDaniel Brandon ................................................................................. 1 0 9

    The Impact of Project Management Practices and Project Sponsorshipon Project PerformanceDavid Bryde and David Petie ........................................................ 1 2 2

    Virtual Project RiskApril Reed and Linda Knight ...................................................... 1009

    Semantic WebApplications Utilising the PHOAF Prototype for Integrated ENUM and

    FOAF QueriesKurt Reichinger, Gerd Reichinger, and Robert Baumgartner . 1 3 3

    Human-Centric Challenges in Ontology Engineering for the SemanticWeb: A Perspective from Patterns OntologyPankaj Kamthan and Hsueh-Ieng Pai ......................................... 8 7 9

    Knowledge Extraction to Improve Information Retrieval in ScientificDocumentsRocio Abascal and Batrice Rumpler .......................................... 3 7 1

    Research on Constructing Ontology for the Semantic WebSong Jun-feng, Zhang Wei-Ming, Tang Da-quan, and Tang Jin-yang............................................................................................................... 55

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Social Responsibility in the Information AgeA User Requirement Study on the Needs of Visual Artists with Upper

    Limb DisabilitiesKatherine Blashki, Dharani Priyahansika Perera, and Gang Li............................................................................................................. 1 6 0

    Making Good on Municipal Promises: Can Municipal Wireless BroadbandNetworks Reduce Information Inequality?Andrea Tapia, Julio Angel Ortiz, and Edgar Maldonado Rangel............................................................................................................. 5 9 9

    The Challenge of Telecommuting Implementation in MalaysianGovernment OfficesRafidah Abd Razak, Huda Ibrahim, Zahurin Mat Aji, Wan RozainiSheik Osman, Nafishah Othman, and Juliana Wahid ............... 8 1 3

    The Influence of Educational, Social, and Economical Factors on theInternational Digital Divide, as Measured by IT Usage and ExpenditureJames Pick and Rasool Azari ...................................................... 1006

    Software Engineering TechnologiesA Method of Translating Business Use Cases into System Use Cases

    George Abraham and Il-Yeol Song ............................................... 6 5 7Representing, Organizing and Reusing Knowledge About Functional and

    Non-Functional Concerns During Software DevelopmentSam Supakkul and Lawrence Chung ............................................. 5 3 4

    Systems Design for Requirements Expressed as a MapNaveen Prakash and Colette Rolland .......................................... 5 0 1

    Software Process ImprovementA Model for Measuring Team Size as a Surrogate for Software Development

    Effor tJames A. Rodger ............................................................................... 7 8 7

    Building a Methodology for the Design of Reference Architectures thatIntegrates Legacy SystemsJuan Muoz Lpez, Jaime Muoz Arteaga, and Carlos Argelio............................................................................................................. 6 4 8

    CMMi for Small Business: Initial Tailoring of a Mexican organizationFrancisco Alvarez R, Jaime Muoz, and Alfredo Weitzenfeld............................................................................................................. 7 7 6

    Cultural and Political Issues in Implementing Software ProcessImprovementDana Edberg and Lisa A. Anderson ............................................. 1 6 8

    Design Interactive Applications Using Object-Oriented Petri Nets inSoftware ComponentsJaime Muoz Arteaga, Francisco Alvarez Rodrguez, GustavoRodrguez Gmez, and Hctor Perez Gonzlez ......................... 2 2 4

    Improving the Software Development Process by Improving the Processof Relationship DiscoveryJoseph T. Catanio and Michael Bieber ....................................... 4 2 1

    Strategic IT ManagementE-Learning Acceptance Model (ELAM)

    Hassan M. Selim ................................................................................. 73IT Strategies in Digital Economy: Selected Problems, Polish Experiences

    Tadeusz Krupa and Lech Gasiorkiewicz ...................................... 2 4 2Organizational Slack in the Global Information Technology Industry

    Perry Sadorsky ................................................................................... 42

    Telecommunications and Networking TechnologiesEstimating Signal Strengths in Indoor Wireless Systems in Order to

    Deliver a Cost-Effective Solution Optimizing the Performance ofthe NetworkGabriel Astudillo, Lenny Garfalo, and Hernn Crdova ..... 1024

    Improving TCP/IP Performance Over Geosynchronous Satellite Links:A Comparative AnalysisJoseph M. Lawson and Michael R. Grimaila .............................. 1 8 0

    Interactive Television: A Study into the Diffusion of a New Technologyin Britain and IrelandJames Hill, Thomas Action, and Neil Farren ............................ 6 1 5

    Text Database and Document ManagementA Digital Preservation Ingest Parsing Service for Complex Data Objects

    Don F. Flynn ..................................................................................... 9 4 7Experiments in Information Extraction

    Soraya Abad-Mota and Eduardo Ruiz I. ...................................... 2 0 4Managing Concurrent XML Structures: The Multi-Structured Document

    Building ProcessNoureddine Chatti, Sylvie Calabretto, and Jean-Marie Pinon ................................................................................................................... 9 8 6

    Unified Modeling Language and Unified ProcessAction Research and the Unified Process: Can They match?

    Christian Malus ................................................................................ 5 7 5CSpec: Constraint Specification for Data Modeling

    Gillian S. Miller ................................................................................ 5 1 9HERMES: A XML-Based Environment for Flexible Requirements

    ManagementAlberto Colombo, Ernesto Damiani, Mauro Madravio, RenatoMacconi, and Karl Reed ................................................................. 4 1 2

    MDA-Based Design Pattern ComponentsLiliana Martinez and Liliana Favre ............................................. 2 5 9

    Reasoning About Functional and Non-Functional Concerns DuringModel Refinement: A Goal-Oriented and Knowledge-Based ApproachLawrence Chung and Sam Supakkul ............................................. 8 1 6

    Universities and Online EducationA Taxonomy of Learning Technologies: Simplifying Online Learning

    for Learners, Professors, and DesignersRichard Caladine .............................................................................. 2 4 7

    Course Embedded Assessment of IT Competency: A Case StudyAnil Aggarwal and Susan A. Lynn ................................................ 3 2 2

    How to Integrate Public University Web Sites and Embed LearningManagement SystemsAxel C. Schwickert and Bernhard Ostheimer ............................ 7 5 8

    Online Eduction as a Technology Innovation in Higher EducationSteven F. Tello ................................................................................. 9 6 3

    The Open Sources Education: A Real Time EducationTadeusz Krupa and Teresa Ostrowska ......................................... 6 6 1

    The Seen Playfulness as Aspect of the Distance EducationMauricio Rosa and Marcus Vinicius Maltempi .......................... 5 5 4

    Very Large Business ApplicationsDistribution of ERP System Components and Security Considerations

    Nico Brehm and Jorge Marx Gmez ............................................ 4 9 4SAP/R3 as Part of a Federated ERP System Environment

    Nico Brehm, Jorge Marx Gmez, and Claus Rautenstrauch ... 8 6 5

    Virtual Organizations and SocietyTelework Implementation toward Virtual Organization in Malaysia

    Muhammad Hasmi Abu Hassan Asaari and Noorliza Karia .... 7 8 4

    Virtual UniversitiesA Virtual University Providing an Online Master Program in a Public-

    Private Partnership: Challenges and SolutionsKarl Kurbel ........................................................................................ 1 5 6

    Designing and Explaining the Trust Model of Students Applying toVirtual UniversitiesMohammad Ali Sarlak and Hassan Abedi Jafari ........................ 2 9 7

    Web Engineering TechnologiesE-Learning Systems in the Bergen Region, Norway: An Overview

    Terje Kristensen, Yngve Lamo, and Khalid Mughal ............... 5 6 2Hybrid Agent Web Service Engineering: A Case Study in Financial

    Application DomainSujan Pradhan and Hongen Lu ...................................................... 7 6 2

    Semantic Web-Enabled Web Engineering: The Case of PatternsPankaj Kamthan and Hsueh-Ieng Pai ......................................... 8 8 1

  • Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Web ServicesAn Architectural Framework for Web Services Based SOA Realization

    in a BankJakakumar Venkataraman and Sriram Anand ............................. 1 3 7

    ETMS-WEB: A Low-Cost Innovative Solution to Manage the Sale StaffAnna Bruno, Andrea Pandurino, and Nicola Fiore ................ 1042

    Ontology-Based Security Specification Tools for SOAMyong Kang, Anya Kim, Jim Lo, Bruce Montrose, and AmitKhashnobish ...................................................................................... 6 1 9

    Software Risk Mitigation through Web ServicesDaniel J. Hinz ................................................................................... 8 2 0

    Trends of Web Services Adoption: A SynthesisVincent C. Yen ............................................................................... 1030

    Web Services Based Tools for Personal Financial PlanningOliver Braun and Gnter Schmidt ................................................ 9 8 9

    Web-Based Learning and Teaching TechnologiesA Rationale for Conceiving Adaptation in Educational Adaptive

    Hypermedia SystemsJos M. Parente de Oliveira and Clovis Torres Fernandes ..... 3 0 9

    A User Needs Assessment of a Cultural Heritage Portal: The SingaporeInfopediaChu Keong Lee and Bonny Tan ................................................... 9 0 8

    Course Management Systems: A Tool for International StudentCollaborationDiane Boehm and Lilianna Aniola-Jedrzejek .......................... 1036

    Integrated Access to Learning Objects Repositories and Digital LibrariesGergia R. R. Gomes, Sean W.M. Siqueira, Maria Helena L. B. Braz,and Rubens N. Melo ........................................................................ 7 3 6

    Multimedia Influence on LearningEsperanza Huerta ............................................................................. 4 7 2

    PMK: An Intelligent Environment for Project Management EducationPaula Torreao, Patricia Tedesco, and Hermano Perrelli ........ 5 8 1

    Roles in Learning Management Systems DevelopmentAri Wahstedt .................................................................................... 5 2 2

    AbstractsA Cross-Sectional Study on Internet Searching Skills by Health Facilities

    of a Latin-American UniversityBelkys Chacn, Norelkys Espinoza, and Angel Rincn ......... 1062

    A Database-Oriented Approach to the Introductory MIS CourseEffrem G. Mallach ......................................................................... 1061

    A Model for Educating the Transitional Technical ProfessionalGary Schmidt .................................................................................. 1062

    Cybercrime, Cyberwarfare, and Cyberterrorism in the New MillenniumShin-Ping Tucker ........................................................................... 1063

    Determinants of Information Systems Project Failures in Sub-SaharanAfrica: A Review of the Critical FactorsMary Otieno .................................................................................... 1062

    E-Business Implementation Process in ChinaJing Zhao, Wilfred V. Huang, and Zhen Zhu ........................... 1061

    Enhancing the Accessibility of Information Assets Available on an E-Commerce Platform through Data Mining AnalyticsStephan Kudyba and Kenneth Lawrence .................................. 1062

    Evaluation of Multicarrier Modulation Technique Using Linear DevicesHernn Crdova ............................................................................. 1064

    IT Global Sourcing: What is its State of Maturity?Mehdi Ghods .................................................................................... 1063

    Outsourcing: An Innovative Delivery ModelVijayanand Vadervu ....................................................................... 1064

    Role of Information Exchange in Damping Supply Chain OscillationsKen Dozier and David Chang ...................................................... 1061

    The Impact of Organizational Culture and Knowledge Management onOrganizational PerformanceZhang Li, Tian Yezhuang, and Qi Zhongying ......................... 1064

    The Value of Search Engine Optimization: A Case Study of a New E-Commerce Web SiteRoss A. Malaga ............................................................................... 1061

    Panels, Workshops and TutorialsAgile and/or Plan Driven Software Development

    Jacob Norbjerg and Wolfgang Zuser ........................................... 1066Assessing the Value of e-Learning Systems

    Yair Levy ........................................................................................ 1065International Tracking and Reporting Systems for Combating the HIV/

    AIDS PandemicSue J. Griffey ................................................................................... 1066

    Listening to Learn: Educating Information Age LeadersKathleen M. Schulin and Mary S. McCally .............................. 1068

    The Potential and Perils of Information Technology PortfolioManagementJohn T. Christian ........................................................................... 1065

    Transforming Technologies: Organizational and Leadership DimensionsGerry Gingrich ................................................................................ 1067

    Web-Based Systems for Distance Education and e-Learning: Towards e-Learning Online CommunitiesGeorgios A. Dafoulas ..................................................................... 1067

    Doctoral Symposium SubmissionA Framework of Enterprise Resource Planning (ERP) Systems

    Implementation in Kenya: An Empirical StudyJim Otieno and Geetha Abeysinghe ........................................... 1069

    Attracting Female High School Students to the IT IndustryDonna M. Grant ............................................................................. 1072

    B2B E-Commerce Adoption in the Financial Services Sector: A StrategicPerspectiveMoses Niwe .................................................................................... 1075

    The Information Cycle in the European Commissions Policy-MakingProcessEvangelia Koundouraki ................................................................ 1073

  • Emerging Trends and Challenges in IT Management 1

    Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Methodologies for DevelopingMultimedia Systems: A Survey

    Mark Szota & Kirsten EllisMonash University, Berwick Campus, Clyde Road, Berwick, Victoria 3806, Australia

    {Telephone: +61 3 9904 7097, Fax: +61 3 9904 7169, Fax: +61 3 9904 7169, [email protected]}{Telephone: +61 3 9904 7132, Fax: +61 3 9904 7169, [email protected]}

    ABSTRACTMany theoretical development practices exist for creating multimediasystems. Most of these development models are orientated towardsbuilding traditional information systems, where the requirements areusually well understood. Multimedia systems, like the industry itself, areevolving rapidly, therefore new tools and techniques are constantlybeing published. Such rapid change results in clients of such systemslacking full awareness of the capabilities of multimedia systems, thusmaking it difficult to define their requirements. Some of the currentmodels are able to respond to scenarios such as this, but others cannot.This research surveyed multimedia developers within Australia in orderto find the most widely used development model(s) within the industry,and the rationale for their use. The results indicate that there is nospecific approach to creating multimedia systems. Developers tend touse a range of different methodologies. The motives for using a varietyof approaches are also examined.

    INTRODUCTIONThe development of any computer software system has a commoncharacteristic: a software development life cycle. This life cycle is aperiod of time that commences at the proposal to develop a system, andusually terminates when the system is complete and handed over to theclient. It involves analysing the requirements of the system; designingand implementing a solution; testing and installation. In many cases, anongoing support stage occurs, where the system may be modified orupdated should the need arise. These stages may be performed repeat-edly, or overlap with each other.

    Developers of traditional Information Systems (IS) use a range ofsoftware engineering methodologies. With the progressive escalation ofmultimedia applications, it remains unclear if developers are applyingthese same methodologies. This paper investigates the most widely usedmethodologies to develop multimedia systems, and the reasons for theiradoption.

    DEVELOPMENT MODELS IN VOGUECurrent methodologies used for traditional system development can becategorised into three different forms: structured, iterative and evolu-tionary. Structured models (also known as traditional models) are in alinear form. Phases are completed sequentially until the cycle hasfinished. Iterative models are based upon a cycle that is repeated untilit is complete. Some of these models combine iterative and sequentialstages. Evolutionary models are new hybrids that generally do not fitinto either category. They may be structured, iterative, or a combina-tion of both.

    Structured methodologies are one of the most commonly used softwaredevelopment techniques. A primary example of this is the Waterfallmodel. Several variants of this approach were uncovered, which suggeststhat there may be no fixed approach. Dennis and Wixom (2000), along

    with Satzinger et al. (2004) suggest a linear, four-phased approach thatinvolves pre-project planning, analysing, designing and then imple-menting a system. Pressman (2000) offers a similar interpretation withminor variations. The planning stage is removed, and a dedicated testingphase is inserted after the system has been built. Hoffer, George andValcich (1999) propose a version that has extended planning and designphases. However, their model suggests a project can go back to a previousstage if required, which tends to violate the linear nature of the Waterfallapproach. Vaughan (1998) promotes his own structured approach,which is oriented towards multimedia development. Each stage consistsof several defined tasks, and the project can be aborted at any stage.Vaughan also supports the use of prototypes and Computer AidedSoftware Engineering (CASE) tools. Siegel (1997) presents a structuredmodel that is focused upon web site development. Like traditionalmethodologies, it does not allow any backtracking, and has a similarfour-phase approach.

    Iterative methods use a highly repetitive cycle of development. Themost common forms of iterative development are Rapid ApplicationDevelopment (RAD) and Prototyping. Dennis and Wixom (2000)present several versions of RAD. The key feature of RAD is the use ofCASE tools, which are used to hasten the analysis, design and implemen-tation phases. Joint Application Design (JAD) sessions can also be usedto assist in the analysis of system requirements. Plfeeger (1998)describes a Phased Development model that breaks the overall systeminto a series of versions that are developed sequentially. This processis repeated until the system is complete or becomes redundant.Prototyping uses a similar repetitive formula, but the same example iscontinually enhanced until it is complete (Dennis and Wixom, 2000).Throwaway prototyping uses prototypes that are designed to exploreand understand a particular aspect of the proposed system. Once theseissues have been resolved, the prototype is thrown away, and a linearprogression of system development continues.

    Several Evolutionary models of development exist. MacCormack (2001)presents an Evolutionary-Delivery model of software development thatinvolves breaking down a project into several micro-projects. Theobjective of each micro-project is to deliver a portion of the function-ality into the overall system. This method provides early feedback onhow the development is progressing, and is highly flexible. Pressman(2000) presents an Incremental model that combines structured devel-opment with the iterative processes of prototyping. Sommerville(2001) discusses the Spiral model, which combines the iterative pro-cesses of Prototyping with the clinical and systematic approaches ofstructured methodologies. It has the potential to rapidly produceincremental versions of a given system. Boehm et al. (1998) proposesa WINWIN Spiral model that improves on the previous approach byallowing for negotiations between the client and the developer. Theoverall objective for these negotiations is to have a win-win scenariofor both parties. Hoffer et al. (1999) present an Object Orientated Designmodel that is heavily based on Object-Oriented (OO) theorems to developa system that is based upon objects rather than information or processes.

  • 2 2006 IRMA International Conference

    Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    The research has shown that there are several methodologies in use forsystem development. Some of these are oriented towards multimediasystem development, however most of them are focused on the con-struction of traditional IS. With so many alternatives available, devel-opers of such systems must use a variety of approaches. This paperinvestigates if this phenomenon applies to multimedia system develop-ment.

    INVESTIGATING THE ISSUEIn order to discover the most widely used methodologies for creatingmultimedia systems, a survey was conducted that investigated theapproaches used by multimedia developers within Australia. The ques-tionnaire was distributed via electronic mail, and comprised of elevenquestions that were designed to elicit both qualitative and quantitativedata from organisations. These questions covered topics such as the sizeof each organisation, and the various platforms they develop multimediaapplications for, such as the World Wide Web (WWW), CD-ROM, DVD,standalone multimedia systems (e.g. interactive kiosks), and standaloneaudio/video productions (e.g. DVD-Video). Other topics discussed on thequestionnaire included current and previous methodologies used bydevelopers for a given platform, and their justification for using ordiscontinuing a chosen model. From the information ascertained,various trends relating to the use of traditional methodologies formultimedia products were uncovered. From the 254 surveys sent out tomultimedia developers, 50 were confirmed to have read the survey, and18 responded, which translates to a 36 percent response rate.

    METHODOLOGIES USED TO CREATE MULTIMEDIASYSTEMSNinety-four percent of respondents indicated which development mod-els they used to create multimedia systems. A summary of the range ofmethodologies used by developers is shown in Table 1. A majority ofdevelopers used more than one methodology to create multimediaproducts. Eighteen percent use five different development models,which may indicate that some developers feel a multiplicity of ap-proaches is required. Thirty-five percent use only one, and six percentused no methodology at all.

    METHODOLOGIES USED FOR VARIOUS PLATFORMSSpecific methodologies are defined as development processes that arealways applied for a given platform. For example, a developer may onlyuse the Waterfall model for developing web sites: therefore, that isdeemed as a specific approach. Alternatively, developers may haveseveral suitable models that could be deployed for a given platform. Eachone of these is defined as an in-specific approach. Tables 2 and 3 showthe utilisation rate (on a specific and in-specific basis) of a developmentmodel for a given platform.

    The clear majority of developers (66 percent) tend not to use a specificmodel when developing web-based multimedia. Twenty-one percentspecifically use their own customised development process. PhasedDevelopment is seldom used, and there are some organisations that donot employ any methodology. The results indicate that almost all of themethodologies detailed in previous discussion are used on a sporadic

    basis. Developers used their own customised processes thirty-threepercent of the time. Other methodologies are used less frequently. Therewere no developers found that employed the Spiral or WINWIN Spiralmodels.

    Methodologies used for creating CD-ROM applications show that a clearmajority of developers do not use any specific approach. Only a quarterof developers specifically use their own customised approach. Like Webdevelopment, a range of approaches was used on an in-specific basis.Customised development models are again the most likely to be used,with theoretical methodologies less favoured.

    The majority of developers do not use a set approach for creating DVDapplications. This reinforces the same trend that was prevalent for bothWWW and CD-ROM based multimedia. Twenty-nine percent specifi-cally use their own customised approach. For organisations that do notapply a specific model, several methodologies may be applied, althoughthe majority still choose to apply their own proprietary model.

    Again, developers tend to use no specific approach when developingstandalone multimedia systems, with fifty-seven percent preferring touse a range of different methodologies. However, twenty-nine percentof organisations still prefer to use their own custom developmentmethods. If they do not use a specific model, alternative methodologiesare used less frequently.

    The current trend for specific approaches remains when creatingstandalone audio / video productions. The majority of developers tendto use a variety of approaches. A more diverse range of approaches areemployed by developers who choose not to implement a specificmethodology, with ten alternative models identified. Customised meth-odologies remain most favourable approach.

    For multimedia that is developed for mobile computing platforms, allthe respondents indicated that they did not use any specific approach.Instead, a range of approaches are used. Developers used their owncustomised approach forty percent of the time. Waterfall, RAD orPrototyping models were used less often.

    MOTIVES FOR UTILISING CHOSENMETHODOLOGIESSeventy-two percent of organisations provided some insight into themotives behind using a given development model. Interestingly, costseemed to be an irrelevant issue, with only four organisations citing thisas a reason for using their chosen models. One developer mentionedbudget constraints as a reason for using either RAD or the Waterfallmodel for developing multimedia systems. Conversely, anotherorganisation (who did not indicate the processes that they used) noted

    Table 1. Range of methodologies used by developers

    Number of Methodologies Total (%) Zero 6 One 35 Two 24 Three 6 Four 6 Five 18 Six 6

    WWW CD-ROM DVD Model Specific

    (%) In-specific

    (%) Specific

    (%) In-specific

    (%) Specific

    (%) In-specific

    (%) Waterfall / Structured 0 3 0 5 0 0 RAD 0 10 0 14 0 11 Phased Development 7 13 6 11 14 11 Prototyping 0 10 6 11 0 11 Throwaway Prototyping 0 3 0 3 0 0 Incremental 0 6 0 5 0 0 Evolutionary-Delivery 0 6 0 8 0 11 Spiral 0 0 0 0 0 0 WINWIN Spiral 0 0 0 0 0 0 Object-Oriented 0 13 0 14 0 0 Custom 21 33 25 26 29 56 None 7 3 6 3 0 0 Other 0 0 0 0 0 0 Don't Use A Specific Model 65 N/A 57 N/A 57 N/A

    Table. Utilisation rate of methodologies (specific and in-specific) forcreating WWW, CD-ROM and DVD multimedia

  • Emerging Trends and Challenges in IT Management 3

    Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    that the Waterfall model became incredibly expensive if modificationsto a system were required. This same developer also concluded that $$$[sic] almost always make the final decision when deciding upon a givendevelopment model.

    Deadlines also received little attention amongst developers, with onlyfour indicating this influenced their decision. One developer noted thatthe Waterfall model was a good choice if they knew precisely what wasrequired. Another organisation customised their development processto fit within the clients preferred timeline of development. A developerwho used a range of methodologies also indicated that deadlines preju-diced their decision to implement either a traditional model, or their owncustomised approach.

    A lack of experience in using other development models was cited byonly one developer as a reason for adhering to their chosen methodolo-gies, which were the Waterfall Model and RAD.

    Project requirements were the main reason for using a diverse range ofapproaches, which was cited by forty-six percent of organisations. Onedeveloper used a customised approach, based upon many traditionalmodels, in order to meet the clients needs. They felt that this processhas been beneficial because their clients had generally been satisfied withthe outcome of their project. An alternative approach, used by the samedeveloper, was to have a list of pre-defined prototypes from which aclient can pick and choose. Another developer noted that they usedPrototyping for all platforms, particularly when user requirements wereimprecise. In addition, one organisation felt that no two projects areever the same, so they need to use a range of approaches for the variousplatforms for which they develop.

    A solitary organisation also mentioned their reasons behind use theirown proprietary method. They believe that their process covers allaspects of software development, and can be used for creating any formof multimedia, as well as other varieties of software. This company alsobelieved that this process was highly flexible and was able to meet avarious range of project requirements.

    A developer who did not use any methodology claims they do not seea purpose for deploying any kind of model. Instead, their employees areencouraged to work using whatever process they deem applicable, andby any guidelines that are specific to a given project.

    Few developers (16 percent) acknowledged that they had previously usedother development methodologies. One developer, who did not specifywhich approach they used, suggested that none of the developmentmodels could apply to all types of development. Another had tried toutilise Object-Oriented methodologies, but found the design aspect toodifficult and awkward.

    CONCLUSIONThe findings show that there are many and varied methodologies usedto create multimedia systems, but there is no solitary approach that ismore suitable than others. Developers tend to use a wide range ofapproaches when developing multimedia systems. From this range ofapproaches, it appears most likely that they will use their own propri-etary methods. Developers also use established development methods,but not as frequently as they will use a customised approach.

    Most developers do not rely upon one specific approach when creatingmultimedia, instead utilising a range of methodologies. This wouldindicate that one specific model cannot cater for the various platformsthat do exist. Obviously, there are many physical differences betweeneach platform, so this may indicate that their approaches must alsochange.

    Project requirements are the main influence behind a developersdecision to select a given methodology. Other factors, such as cost andtimelines also play some part in the choice of development model, butare not as important as the requirements of a project. It also appears thatdevelopers will stick to the models they know, as few indicated they haddiscontinued the use of other development methodologies.

    Customised approaches are the most likely to be used by developers forcreating any kind of multimedia system. This may indicate thatestablished methodologies are inappropriate for creating multimedia. Asthe origins of many established methodologies come from traditional ISdevelopment, this provides some foundation to such an argument.However, considering that there are several developers who do utilisesuch theoretical approaches, such a statement tends to be unfounded.Perhaps not all multimedia developers have the same education ortraining as more traditional computing employees. This could reflect thelack of formal models used in multimedia systems development. A moretroubling statistic is that there are developers who do not employ anymethodology for creating multimedia. Any kind of methodology willbring structure and control to the development process, so there areobvious benefits available.

    Another angle that could be adopted is that there is a need for moremethodologies to be created specifically for multimedia. Developerscould have difficulty trying to adopt traditional IS methodologies formultimedia, therefore there is a trend to use their own methods whichare easier to understand. It is clear there are models that have beensuccessfully applied for multimedia development, but their originsappear to lie in the IS arena.

    Whilst the trend for proprietary approaches remains apparent, furtherresearch into such models could reveal more details about how thosemodels are put to work. It is possible that there are certain qualitieswithin these customised models that reflect those found in traditionalmethods. This would then indicate that there is an underlying theoreticalinfluence within these approaches. A wider international study with alarger response rate may ratify the current indicators of methodologyusage, or perhaps provide new answers. A study that measured the levelsof overall project success and client satisfaction with a given method-ology may offer a more credible insight into what are the most suitablemethodologies for creating multimedia systems.

    Overall, the majority of developers use some form of methodology.However, it appears that traditional methods are not well acceptedamongst multimedia developers, so there is a tendency to use customisedapproaches. Many possibilities have been discussed as to the cause of thisfinding. Until more multimedia-specific development methodologiesare conceived and promoted, it would appear that this current trend islikely to continue.

    REFERENCESBoehm, B., Egyed, A., Kwan, J., Port, D., Shah, A. and Madachy, R. (ed)

    (1998) Using the WinWin Spiral Model: A Case Study,Computer, IEEE Computer Society, New York, Vol 31, Issue 7,pp. 33-44

    Standalone MM Standalone AV Mobile Computing Model Specific

    (%) In-specific

    (%) Specific

    (%) In-specific

    (%) Specific

    (%) In-specific

    (%) Waterfall / Structured 0 8 0 9 0 20 RAD 0 15 0 9 0 20 Phased Development 14 15 9 9 0 0 Prototyping 0 15 0 9 0 20 Throwaway Prototyping 0 0 0 5 0 0 Incremental 0 0 0 9 0 0 Evolutionary-Delivery 0 0 0 9 0 0 Spiral 0 0 0 0 0 0 WINWIN Spiral 0 0 0 0 0 0 Object-Oriented 0 8 0 9 0 0 Custom 29 39 18 27 0 40 None 0 0 9 5 0 0 Other 0 0 0 0 0 0 Don't Use A Specific Model 57 N/A 64 N/A 100 N/A

    Table 3. Utilisation rate of methodologies (specific and in-specific) forcreating standalone multimedia, audio / visual and mobile computingsystems

  • 4 2006 IRMA International Conference

    Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Dennis, A. and Wixom, B.H. (2000) Systems Analysis and Design: AnApplied Approach, John Wiley & Sons, New York, pp 9-16, 72-74, 120-124.

    Hoffer, J.A., George, J.F. And Valacich, J.S. (1999) Modern SystemsAnalysis and Design (2nd Ed.), Addison-Wesley, Reading, pp 24-34, 486-498.

    MacCormack, A. (ed.) (2001) Product-development Practices ThatWork: How Internet Companies Build Software, MIT SloanManagement Review, MIT Sloan School of Management, Cam-bridge, Vol 42, Issue 2, pp. 75-84

    Pfleeger, S.L. (1998) Software Engineering: Theory and Practice,Prentice Hall, New Jersey, p. 126

    Pressman, R. (2000) Software Engineering: A Practitioners Approach,McGraw-Hill, New York, pp 29-47

    Satzinger, J.W., Jackson, R.B., Burd, S.D. (2004) Systems Analysis andDesign in a Changing World (3rd Edition), Course Technology,Boston, p. 42

    Siegel, D. (1997) Secrets of Successful Web Sites: Project Management forthe World Wide Web, Hayden Books, Indianapolis, pp 160-168, 206-282.

    Sommerville, I. (2001) Software Engineering (6th Edition), AddisonWesley, Essex, pp. 53-55

    Vaughan, T. (1998) Multimedia: Making it Work (4th Edition), Osborne/McGraw-Hill, Berkeley, pp 428-434

  • Emerging Trends and Challenges in IT Management 5

    Copyright 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.

    Networkcentric Healthcare: Strategies,Structures and Technologies for

    Managing KnowledgeDag von Lubitz, MedSMART, Inc., Ann Arbor, MI 48904 & HH & GA Dow Coll. of Health Professions,

    Central Michigan University, Mt. Pleasant, MI 48804, T 734-527-7120, [email protected]

    Nilmini Wickramasinghe, Ce