About
3,103
Publications
130,553
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,960
Citations
Introduction
Information Resources Management Association (IRMA) is a research-based professional organization dedicated to advancing the concepts and practices of information resources management in modern organizations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals.
Publications
Publications (3,103)
This research presents the development of a critical success factor matrix for increasing positive user experience of hotel websites based upon user ratings. Firstly, a number of critical success factors for web usability have been identified through the initial literature review. Secondly, hotel websites were surveyed in terms of critical success...
In recent years, all information about customers can be shared with employees by customer relations management in tourism establishments, and accordingly, all customer expectations can be met. As a result, producing customer loyalty can be possible. Customer relations management applications in tourism establishments is crucial with regards to comp...
Information technology plays a significant role in tourism, but mainly as an informational tool. Ideally, the information search process on the Internet should try to encourage consumers to book and purchase travel services and products prior to leaving for their vacation, but cultural differences in booking on-line are found. The present study res...
This paper presents the initial outcomes of a key scoping study undertaken to explore the role of augmented reality and motion detecting technologies in the context of Intangible Cultural Heritage (ICH) for museums related environments. Initial prototypes are in the form of an interactive infrared camera based application for children to engage wit...
The cultural sector is made of a variety of firms (both public and private) whose primary economic value derives from their cultural value (Flin, Mearns, O'Connor, & Bryden, 2000). The focus in this chapter is on the organizations that manage cultural sites, with a specific attention to the interactions between cultural sector and tourism industry....
This study builds a model to evaluate and select vendors of customer relationship management (CRM) system for the medical tourism industry from the viewpoint of medical tourism industry. Literature in related fields was reviewed, and the modified Delphi method was applied to find proper evaluation and selection criteria for the model. Then the anal...
In a virtual space conveniently chosen, citizens of the Web can interact and develop social capital and empowerment, intended as the consciousness of possibilities to influence the social context and to improve it, by increasing capacity of taking reasoned decisions on problems and of adopting adequate behaviour to face them. The Web can be seen in...
Developing their e-marketing strategy, Destination Marketing Organizations (DMOs) invest in the establishment of their Websites to provide extended accessibility, real-time information/services, and personalization capabilities. This chapter aims to review prior tourism studies that refer to Website evaluation by taking DMOs’ Websites as the focus...
Travel and tourism is a booming sector of the 21st century world economy. Despite numerous positive trends, numerous critics deplore some developments in this industry. In an era of increasing leisure tourism or “part-time leisure tourism” tacked on to business trips, coming into contact with other cultures risks fading into the background. Therefo...
Drawing on associated literature and empirical research, this paper examines the engagement and expertise of hotels in handling customer complaints. This is of considerable interest to practitioners and academics within the field of hospitality management. The study explores hotel management’s attitudes and practices toward handling customer compla...
Society is experiencing unprecedented changes, largely attributable to the evolution of communication technologies, which are steadily reframing our way of life, and the methods we use to establish and maintain social relations. Museums are therefore facing numerous challenges, in general as a result of these developments: apps, open content, and t...
It is widely accepted today that food is symbolically and culturally bounded, which make it also emblematic for cultural and creative industries, as well as entertainment and leisure. This is observed in the increasing use of food in media entertainment such as cooking shows and competitions but also in other variant forms such as culinary schools,...
This paper establishes if using a comment card provides a reliable form of feedback regarding customer satisfaction in hotels. This exploratory study was conducted at the Jumeirah Beach Hotel-Dubai, UAE. They are a convenient way for guests to complain, make suggestions and praise. Managers use this input to make quick fixes and comfort distraught...
The performance of commercial websites is a critical issue that has a significant effect on consumers’ online decision-making. This study develops and applies a fuzzy model to assess the performance of hotel websites. It presents a fuzzy decision-making approach to the evaluation of tourism website performance that integrates consumer perceptions w...
This chapter extends the concept of place branding and applies it to the digital world of the Internet (place @-branding). Among the various environments of the complex digital universe of the Internet, the chapter deals in particular with (1) Websites as vehicles of images, representations, evaluations of places, and (2) social networks as spaces...
This chapter provides a descriptive report on factors influencing the behaviour of European consumers, highlighting their similarities and differences, based on secondary data. The analysis focuses on the presentation of comparable data that could provide clusters of characteristics of consumption among the COBEREN partners. The authors concentrate...
This chapter studies the application of information technology in tourism promotion, particularly through Internet. In the context of tourism management, this chapter penetrates different usage of Web technology to disseminate maximum level of information for tourism promotion. This chapter is designed to determine the conditions of Websites as wel...
CSR has been a widely-researched concept during the last three decades. However, there is no agreement on its definition or its dimensions; antecedents and consequences and there is no comprehensive model for its analysis. The origins of CSR lie in philanthropy and the highest level of CSR is considered to involve philanthropic actions. CSR is a pe...
In this chapter, the authors introduce the e-learning material that they developed using Three-Dimensional Virtual Reality (3D-VR) technology in cyber ethics education. They propose a new instructional method that teaches students to use three types of knowledge in their analyses of moral judgment problems: knowledge of ethical codes, ICT, and rati...
This chapter explores theories and concepts of ethical decision making in SMEs and how individuality of entrepreneurs affects their organisations. In order to investigate the entrepreneurial ethical decision-making process, the chapter crossbreeds the concepts of greed and power, cognitive moral development, ethical ideologies, and individual psych...
The purpose of this research is to develop a direct and concise perceived leader integrity instrument that is posed from a positive perspective. The integrity construct in this study is developed from the tradition of moral philosophy and virtue ethics. The integrity construct in this study incorporates two aspects of integrity found in the literat...
The chapter discusses the specificities of organizational culture in healthcare environments, taking into account general managerial theories and their suitability to particular professional settings. The challenges of teamwork and the things to be particularly considered by decision-makers in the healthcare system are discussed and critically anal...
This chapter studies the requirements for a wide range of healthcare information systems, including, but not limited to, clinical pathways management, patient record management, home care management, and medical personnel and resource management. The analysis concentrates on the description and management of medical activities, leaving aside the st...
This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flo...
Modern telemedicine offers to hospitals a whole range of opportunities to improve the appropriateness of their care provision, to offer new services to primary care and to contribute to patient engagement. In this chapter, the authors briefly discuss their approach to facilitate the collaborative production of region-wide telemedicine roadmaps invo...
Cloud computing is one of the emerging technologies that has an increasing impact on both private and public sectors. It represents an on-demand service model for delivering computing resources ranging from storage and data access, via computation and software provisioning. This chapter describes an application of Cloud Computing in home healthcare...
In this chapter, the authors discuss a Knowledge Economy-based approach to the inclusion of Persons with Disabilities (PwD). The approach, different from the traditional assistance model, considers PwD as active and valuable members of the present Knowledge Society, to be included in the active workforce. This is discussed with reference to a speci...
The unprecedented impact of Information and Communication Technologies (ICTs) on nearly every facet of human endeavour has continued to attract individual and organizational interest to explore these technologies for specific cause. ICTs are increasingly being used in promoting democracy and human rights issues: to mobilize and strengthen solidarit...
This chapter proposes that key features of New Public Management (NPM) in complex public service organisations, such as teaching hospitals, are less new than a reversal to Weberian hierarchy, Fordist concern with throughput rather than quality, Taylorist standardised performance criteria, and Foucauldian surveillance. While this judgement is severe...
Semantic interoperability facilitates Health Care and Life Sciences (HCLS) systems in connecting stakeholders at various levels as well as ensuring seamless use of healthcare resources. Their scope ranges from local to regional, national and cross-border. The use of semantics in delivering interoperable solution for HCLS systems is weakened by fact...
In modern day’s institutions, risk management plays a crucial role as it aims to minimize the likelihood of adverse events and contributes to improve the quality of services delivery. In health care, an effective risk management is only possible if supported by information systems that can produce high quality measures and meaningful risk indicator...
The chapter discusses, on research-based findings, the particularities of culture in hospitals, in a cross-cultural perspective with a particular focus on the Polish case. The findings of the study point to the fact that exterior factors and perceptions have a decisive impact on the patient evaluation of the hospital experience, so hospitals should...
The preponderant dilemma organisations confront currently is which way to homologate and superintend access for a broad mass of services and products and in parallel to preserve security and privacy. Information technology is rapidly changing, is inherently complex, and complexity kills security. There is an ongoing technical race to maintain secur...
While it is common to use storage in a cloud-based manner, the question of true interoperability is rarely fully addressed. This question becomes even more relevant since the steadily growing amount of data that needs to be stored will supersede the capacity of a single system in terms of resources, availability, and network throughput quite soon....
The adoption of Telematics medicine or Telemedicine marks an important structural change in the mode in which deployment of medical care is being routinely provided. It is not a matter of using more or less developed technologies but mainly a deep change to the way in which countries and governments decide to provide and manage their national healt...
Vehicular ad hoc networks have been envisioned to be useful in road safety and commercial applications. In addition, in-vehicle capabilities could be used as a service to provide a variety of applications, for example, to provide real-time junction view of road intersections or to address traffic status for advanced traffic light control. In this w...
Healthcare organizations are increasingly willing to develop more efficient and higher quality processes to combat the competition and enhance financial viability by adopting contemporary solutions such as Health Information Technology (HIT). However, technological failures occur and represent a contemporary organizational development priority resu...
Cloud computing has recently received considerable attention, as a promising approach for delivering Information and Communication Technologies (ICT) services as a utility. In the process of providing these services it is necessary to improve the utilization of data centre resources which are operating in most dynamic workload environments. Datacen...
This chapter presents a case study on rural e-municipalities in Kyrgyzstan as an enabling tool for facilitating and supporting democratic local governance. The authors examine the case based on their action research and discuss key findings in terms of challenges of implementing and sustaining ICT-enabled local governance observed throughout the li...
The emergence of Software as a Service (SaaS) has made it possible to develop dynamic and complex business processes as eServices. The development of business processes as eServices (SaaS) can be assisted by the means of adaptive or agile development processes. The development of business processes in terms of SaaS require to perform SaaS requireme...
Cloud Computing is one of the fast spreading technologies for providing utility-based IT services to its users. Large-scale virtualized datacenters are established in order to provide these services. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, datacenters hos...
Change is endemic in modern business competition. In an age of globalization, with the rapid development of Internet technologies, changes occur at a much faster pace, and are also more unpredictable. Being agile in a turbulent environment has been ranked highly by executives in surveys of business issues conducted in past five years. Today nearly...
The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for h...
On-demand computing power at modest cost, tied with faster Internet accessibility in the Cloud has offered the future of Cloud libraries. This chapter presents a snapshot of what is happening in the arena of Cloud libraries. It presents the features, its promises, components that drive a Cloud library, users and the services, infrastructure, inform...
When data mining aims to disclose information about the moral competences and values of individuals or groups – an undertaking we call ‘morality mining’ –, novel ethical problems emerge. These are only partially covered by the current debate on ethical data mining focusing on privacy with respect to discrimination, threats to autonomy, misuse of da...
While computer ethics and information security courses try to teach computer misuse and unauthorized access as clear black and white examples, when examining the use and potentially misuse of URLs the discussion becomes less clear. This paper examines a number of computer use ethical scenarios focusing on the modification of URLs within Web browser...
This chapter proposes a new Supply Chain Business Model in the Education domain and demonstrates how Education as a Service (EaaS) can be delivered. The implementation at the University of Greenwich (UoG) is used as a case study. Cloud computing business models are classified into eight Business Models; this classification is essential to the devel...
This chapter analyses the role of cyber ethics and other related issues such as electronic commerce (e-commerce) and customers’ protection, privacy, anonymity, psychological and mental wealth-being. It focuses on consumerism cybercrimes such as consumer fraud, online deceptive advertisements, financial fraud and also on social cybercrimes such as p...
With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today’s mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to est...
This chapter elaborates on the impact and benefits Cloud Computing may have on Earth Observation. Earth Observation satellites generate in fact Tera- to Peta-bytes of data, and Cloud Computing provides many capabilities that allow an efficient storage and exploitation of such data. Several scenarios related to Earth Observation activities are analy...
For the emerging field of cloud forensics, the development of validated and repeatable scientific processes for conducting cloud forensic investigations should include requirements that establish evidence collected as legally admissible. There is currently an uncertainty in the legal requirements for cloud forensics. Forensic investigations in the...
This chapter discusses and surveys the concepts, demands, requirements, solutions, opportunities, challenges, and future perspectives and potential of Carrier Grade Cloud Computing (CGCC). This chapter also introduces a carrier grade distributed cloud computing architecture and discusses the benefits and advantages of carrier grade distributed clou...
A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users’ trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active onlin...
This paper concentrate on a proactive engagement with emerging information and communication technologies (ICTs) with the goal of an early identification of the ethical issues these technologies are likely to raise. After an overview of the emerging ICTs for the next future (leveraging the results of the EU funded project ETICA), the paper identify...
Cloud computing introduces a new paradigm for software deployment, hosting, and service renting. Based on the XaaS architecture, a large number of users may share computing resources, platform services, and application software in a multi-tenancy approach. To ensure service availability, the system needs to support an advanced level of massive scal...
Software testing in the cloud can reduce the need for hardware and software resources and offer a flexible and efficient alternative to the traditional software testing process. A major obstacle to the wider use of testing in the cloud is related to security issues. This chapter focuses on test generation techniques that combine concrete and symbol...
Many organizations are adopting cloud services to reduce their computing cost and increase the flexibility of their IT infrastructure. As cloud services are moving to the mainstream to meet major computing needs, the issues of ownership and chain of custody of customer data are becoming primary responsibilities of providers. Therefore, security req...
Data acquisition and data recovery are essential to any e-discovery or digital forensic process. However, these two aspects seem to be considerably difficult in a cloud-computing environment. The very nature of the Cloud raises a number of technical and organizational challenges, which renders traditional approaches and tools inapplicable. Resource...
This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions, specifically how past security challenges are inherited o...
This chapter investigates companies' disclosure alignment and transparency signaling within the 2011 CSR annual reports of 36 U.S. firms in the Global Forbes 2000. DICTION 6.0 was used for the text analysis. The study found that CSR reports are fairly similar to corporate financial annual reports but can be classified more accurately as a hybrid di...
Today, there is a huge variety of script-centric approaches, APIs, and tools available to implement automated provisioning, deployment, and management of applications in the Cloud. The automation of all these aspects is key for reducing costs. However, most of these approaches are script-centric and provide proprietary solutions employing different...
Big data is a topic of active research in the cloud community. With increasing demand for data storage in the cloud, study of data-intensive applications is becoming a primary focus. Data-intensive applications involve high CPU usage for processing large volumes of data on the scale of terabytes or petabytes. While some research exists for the perf...
Hospital network is evolving towards a more integrated approach by interconnecting wireless technologies into backbone networks. Although various integrated network scenarios have been published in the networking literature, a generic hospital model has not yet been fully explored and it remains a challenging topic in practice. One of the problems...
Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption o...
This chapter examines the economic impact of the diffusion of a new technology as cloud computing. This will allow firms to rent computing power and storage from service providers, and to pay on demand, with a profound impact on the cost structure of all the industries, turning some of the fixed costs in marginal costs of production. Such a change...
The chapter presents a specific niche dilemma regarding the ethical aspects of utilization of data gathered for one specific research for another research, which was not specified to the data suppliers (sample) at the time of gathering, or that the data suppliers were not even informed of the possibility of such occurrence. That dilemma of the reus...
Research Medical Center is a regional medical center that meets the needs of residents of a rural area in the Midwest. It is part of a large healthcare system. The primary care hospital implemented the Electronic Health Record (EHR). The endeavor to implement Health IT applications including Computerized Physician Order Entry (CPOE), EHRs, nursing...
With the global diffusion of cybercrime, the ever-growing market penetration of high-performance and low-cost personal digital devices, and the commercial success of cloud computing, the area of digital forensics is faced with various new challenges that must be taken seriously. In this chapter, the authors describe a novel approach to digital inve...
Cloud Computing is the most promising computing paradigm that provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible, computing on a pay-as-you-go basis. With the growth and expansion of the Cloud services and participation of various services providers, the description of quality parameters and m...
The debate about the moral status of corporations has been wide-ranging and complex. In this paper a way of structuring the debate is proposed. At the same time, arguments within the “corporate moral agency” debate are considered in relation to the notion of Artificial Moral Agency. The entire exercise points to the importance of philosophical prag...
Globalization has placed modern organizations in tremendous competition locally and regionally across borders; thus, the ultimate goal of every organization is the same which is profitable survival. In order to make sure that this profitable survival goal does not come at the cost of harming others, guiding principles are needed to bring goodness a...
Despite a growing adoption of cloud computing, law enforcement and the judicial system are unprepared to prosecute cloud-based crimes. This chapter illuminates legal problems in the United States for electronic discovery and digital forensics arising from cloud computing and argues that cloud computing challenges the process and product of electron...
Administrative leadership of Wayburn Health System decided to move forward with a training program to address communication between healthcare professionals within their emergency center. After a few sentinel events where errors had occurred that compromised patient safety due to miscommunication amongst healthcare team members, hospital administra...
The ethical crisis in business and information technology is very real. Countering this crisis by creating organizational cultures grounded in moral character is the challenge people face as leaders if they are to regain the respect and confidence of the public. As educators of future business and information technology leaders, how can educators p...
This chapter seeks to identify useful game-theoretic insights concerning key issues of business ethics in emerging economies. The study considers four elements in this sequence: game theory, emerging economies, business ethics, and key issues. The chapter does not undertake formal modeling but rather emphasizes useful insights. Game theory provides...
Testing is a critical phase in the software life-cycle. While small-scale component-wise testing is done routinely as part of development and maintenance of large-scale software, the system level testing of the whole software is much more problematic due to low level of coverage of potential usage scenarios by test cases and high costs associated w...
This chapter explains how case studies can be used successfully in distance education to provide an authentic, interactive way to teach ethical behavior through critical analysis and decision-making while addressing ethical standards and theories. The creation and choice of case studies are key for optimum learning, and can reflect both the instruc...
The aim of this chapter is to showcase the potential of new, Cloud-based, Information and Communication Technology (ICT) platforms for transport logistics chain management. The related literature is analysed from five perspectives. First, by examining supply chain issues relating to integration of core processes across organizational boundaries, th...
As the use of online social networking (OSN) sites is increasing, data extraction from OSN profiles is providing researchers with a rich source of data. Data extraction is divided into non-automated and automated approaches. However, researchers face a variety of ethical challenges especially using automated data extraction approaches. In social ne...
Emergency events are always very critical to manage as in most cases there is a human life risk. Such events could become even more serious when occurring in remote areas not equipped with adequate healthcare facilities, able to manage life risk. This is the case in many rural geographical areas. In such scenarios telemedicine can play a very impor...
Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSP...
Today, exposure to new and unfamiliar environments is a necessary part of daily life. Effective communication of location-based information through location-based services has become a key concern for cartographers, geographers, human-computer interaction and professional designers alike. Recently, much attention was directed towards Augmented Real...
Research dealing with the motives of sports tourists from a marketer’s perspective remains underdeveloped. This chapter describes the phenomenon of sports tourism and aspires to examine with an empirical study the motives of winter and summer sports tourists. The first sample (n=339) was comprised of active as well as passive summer sports tourists...
There is increasing uptake of telehealth for long-term conditions (LTCs). However, evidence of their effectiveness remains largely inconclusive. Similarly, success factors for implementation of telehealth into routine healthcare practice are not fully understood. The objectives of this chapter are to determine the effectiveness of telehealth; and t...
This chapter summarizes the theoretical and empirical literature on attitudes toward bribery and then proceeds to examine the opinions of 1,483 Brazilians on the issue, using the data from the most recent World Values Survey. The study finds that although Brazilians are strongly opposed to bribe-taking in general their opposition is less than absol...
Telehealth and telecare have been heralded as major mechanisms by which frail elderly people can continue to live at home but numerous pilot studies have not led to the adoption of these technologies as mainstream contributors to the health and social care of people in the community. This paper reviews why dissemination has proved difficult and con...
Another new paradigm shift is in the offing and slowly becoming distinct from the amorphous shape of public administration. It is the ICT-blessed governance, or e-Governance. The adoption of ICTs and the new approach to management in symbiosis are e-Governance. E-governance speaks of a new way and style in every beat and pulse of the system of publ...
In recent years, the use of the Blended Learning (BL) methods has experienced worldwide uptake and is responsible for enormous changes, not only in developed country education, but in developing country education, particularly sub-Saharan Africa. Given the role that blended learning can play in educational development, educational institutions, stu...
The use of online methodologies to deliver coursework has become institutionalized in higher education. There is an urgent need to move beyond the question of which delivery model is most effective: face-to-face, fully online, or blended, and switch the focus to teaching pedagogy and strategies that effectively engage students in the learning proce...
Blended learning is a well-known and successful instructional model used in higher education and K-12 schools (International Association for K-12 Online Learning, 2012; Watson, 2012). It is estimated that about 37 percent of school districts in the United States had students enrolled in technology-supported distance education courses during the 200...
Mobile cloud computing has grown out of two hot technology trends, mobility and cloud. The emergence of cloud computing and its extension into the mobile domain creates the potential for a global, interconnected mobile cloud computing environment that will allow the entire mobile ecosystem to enrich their services across multiple networks. We can u...
The Internet has been playing a key role to prolifically reach the target market. Simultaneously, the implications of Relationship Marketing (RM) to establish, maintain and enhance competitive advantage in the traditional marketplace are widely recognized. However, because of the online, ongoing, and on time communication approach of the Internet (...
Amlan Bhusan raises important questions in this chapter. To him, there is a growing academic consciousness, regarding the use of e-governance, to deliver social goods in a better way. This voice advocates that more needs to be done by public institutions, governments, and more importantly, the academia, to develop e-governance as an enabler for soc...
The current educational structure was created in response to the demands of an industrial society, which, alongside workers, needed an elite of highly educated professionals. The knowledge revolution accelerated this trend: professionals are now not only the people who “have” the knowledge, but they should be also able to find it quickly and effici...
The purpose of this chapter is to detail the impact of the Arab Spring Revolutions in Tunisia, Egypt, and Libya in regards to entrepreneurship. This study tests the validity of three hypotheses, which were whether the Arab Spring revolutions had a positive relationship with entrepreneurial inhibitors, a negative relationship with entrepreneurial en...
Selecting appropriate Open Source Software (OSS) for a given problem or a set of requirements can be very challenging. Some of the difficulties are due to the fact that there is not a generally accepted set of criteria to use in evaluation and that there are usually many OSS projects available to solve a particular problem. In this study, the autho...
Patients and health maintenance organizations are spending approximately $47 billion annually on innovative alternative medical techniques such as aromatherapy, biofeedback, chiropractic manipulation, homeopathy and others. Health insurance companies, drug regulation agencies, medical practitioners and educated patients are demanding more reliable...
There are many different benefits that a government can obtain from encouraging the use of Information and Communication Technologies (ICTs) in its public sector delivery frameworks. Utilization of ICTs as a socio-economic stimulant has long been recognized by governments the world over. Electronic government utilizes ICTs to provide all the access...
The implementation of the blended learning model is one of the most flexible and effective ways to organize teacher training courses since it combines contact learning and distance learning. Furthermore, differentiated instruction is the solution of Modern Didactics to the teachers’ needs concerning their response to the challenges of the multicult...
Many educators and technology developers advocate the use of gamification in educational environments. However, it is important to evaluate the applicability and value of gaming elements to the environments in which they are being implemented. Early Childhood Education (ECE) presents a unique educational context framed by national curricula and phi...