4,219,617 research outputs found

    Enriching Information Technology Course Materials by Using Youtube

    Full text link
    IT offers some benefits and collaborations in various sectors. This research focuses on exploring higher education subjects via social technology, YouTube. YouTube is the world largest video based contents application in the world. Current learning materials are not only in text and images, but included video contents. This research enriching students learning materials may involving YouTube as learning sources. The study observed 118 sophomore students in computer science faculty. The results show that, involving YouTube in enriching students course material able to create conductive learning environment. This strategy increases students understanding in their field of study.Comment: Excellent Paper Award of AICSIT2017, 8 page

    Using Information Technology Mindfully

    Get PDF
    Although there are numerous explanations of why users behave in specific ways toward information technologies, recent work in social psychology suggests that holistic traits such as awareness and openness are potentially important explanatory variables in technology behavior theories. In this paper, we examine the multi-dimensional construct of mindfulness and its applicability to the domain of IS research. Drawing from the social psychology literature, we adapt the notion of mindfulness and its dimensions – alertness to distinction, openness to novelty, orientation in the present, and awareness of multiple perspectives – to the domain of information systems. In doing so, we place mindfulness within the broader nomological net related to individual level decisions about information technology. Also, we present preliminary explanations for how mindfulness converges with and discriminates from existing constructs in the information systems literature. Finally, we present an initial domain-specific measure of mindfulness and assess the psychometric properties of the proposed measure. Using data collected from 318 subjects with Internet Applications as the target technology, analysis indicates that the operational measures have acceptable psychometric properties and confirmatory factor analysis supports the proposed multidimensional structure. Implications for practice and research are offered

    Using information technology to help business students learn about contract law

    Get PDF
    This paper describes continuing work in using information technology (IT) to help Business students learn about contract law. The approach adopted uses a model of the contracting process as being one of negotiation, where the decisions made by the parties involve the acceptance or rejection of certain risks. Normal discussion tutorials are therefore replaced by a role‐play exercise in which students learn by taking part in simulated negotiations, each interested party being represented by a team of students. IT is being introduced into the learning process, both to provide decision‐support for the student teams, and to improve the mechanics of the exercise

    Using interactive information technology for attraction of foreign students to learning

    Get PDF

    THE USE OF INFORMATION TECHNOLOGY TOWARD ONLINE TRANSACTION IN MICRO ENTERPRISE USING TECHNOLOGY ACCEPTANCE MODEL(TAM) FRAMEWORK

    Get PDF
    Technology Acceptance Model (TAM) is an adaptation of TRA introduced by Davis. The purpose of TAM is devoted to explaining the behavior of the users computer (computer usage behavior). The importance of internet and of the TAM antecedents of its website, however, change with experience. Aim of this study was to design and analysis the use of technology toward online transaction using TAM framework.In this research, the design of website of micro enterprises using TAM Framework. The sample is 15 respondents who make transaction online in Semarang.The method analysis use in this research is descriptive analysis. In this research used some technologies like: HTML, this is the basis of website. The result of this study HTML and CSS are used for the rapidly responsive website design. The results of the analysis is known that most of the respondents agreed on the use of online transaction technology using TAM framework. New findings/significance of contributionalmost all respondents agreed to answer the TAM framework applied in website design to facilitate online transactions. Keywords: information, technology, online transaction, TAM framework Technology Acceptance Model (TAM) adalah adaptasi TRA yang diperkenalkan oleh Davis. Tujuan TAM dikhususkan untuk menjelaskan perilaku pengguna komputer. Pentingnya internet dan pendahulunya TAM dari situs webnya, bagaimanapun berubah dengan pengalaman. Tujuan dari penelitian ini adalah untuk merancang dan menganalisa penggunaan teknologi terhadap transaksi online dengan menggunakan kerangka TAM.Dalam penelitian ini, perancangan situs web usaha mikro dibuat dengan menggunakan Kerangka TAM. Sampel yang digunakan adalah 15 responden yang melakukan transaksi online di Semarang. Metode analisis yang digunakan dalam penelitian ini adalah analisis deskriptif. Dalam penelitian ini digunakan beberapa teknologi seperti: HTML sebagai dasar website.Hasil penelitian ini HTML dan CSS digunakan untuk desain website yang cepat responsif. Hasil analisis diketahui bahwa sebagian besar responden sepakat mengenai penggunaan teknologi transaksi online dengan menggunakan kerangka TAM.Temuan baru / signifikansi kontribusi hampir semua responden menjawab setuju menggunakan kerangka TAM yang diterapkan dalam desain website untuk memudahkan transaksi online. Kata kunci: informasi, teknologi, transaksi online, kerangka TA

    Rural Load Management Using Information Technology

    Full text link
    The mismatch between the generation and demand for electrical power is increasing at an alarming rate. This is mainly due shortage of conventional resources, use of appropriate technology for alternate energy sources and lack of awareness about energy conservation. Power supply to domestic, commercial and industrial consumers is a difficult task to the utilities controlled by the government. In rural India, irrigation pump sets are the major loads. The technical aptitude, attitude and co operation of the consumers helps a lot in energy management. The strategic power supply is affected if the consumers are not complying with the norms. A strategy is framed to provide power to domestic appliances around the clock and agricultural consumers on time division basis. But the local technicians play a corruptive role to violate this which is leading to overloading/failure of the distribution transformers frequently. Here, an attempt is made to devise a method to overcome the problem of agricultural consumers who are getting power on time division basis. A control unit is installed at each distribution station to automatically monitor and control the power supply to domestic and agricultural consumers as per the pre defined schedule. This paper explains the use of electronics and information technology in rural areas for better management of the power supply and consumption. The unauthorized connection leading to failure of distribution transformers is also taken care

    The fusion of law and information technology

    Get PDF
    In information society, legal norm communications have been never established in certain fields for a long time. That is, a few legal norms have never obeyed in the fields. Above all, legal norms which relate to data protection, information contents and information security, would often infringed. Most violation would be conducted by using information technologies. Information technologies would often be used in these infringing incidents. It can be said that these infringing incidents would have never been conducted without information technology. These infringing incidents include hacking actions, personal data abuse, personal information disclosure, unauthorized access, infringing copyrights, infringing privacy rights, and so on. A way of preventing those infringements is to raise the level of punishment against the violators. But, it will prove to be disappointing. Furthermore, it would be an ex post facto measure to the last. It would be needed to invent an ex ante measure, if it is possible. As the ex ante measure, the author proposes a fusion of law and information technology. An information technology will lead people to a lawful deed when they conduct actions in using computers and networks. They say that information technology cures information technology. After all, the fusion will aim at realizing laws, and it will contribute to recover a social justice

    Reinventing Government Services Using Information Technology

    Get PDF

    Using Information Technology in Knowledge Work

    Get PDF
    The purpose of the present research is to develop a theoretical framework which explores how knowledge workers learn their jobs and the role that using IT plays therein. The present research, based on theoretical underpinnings derived from the theory of legitimate peripheral participation (Lave and Wenger 1991), is an interpretive case study and is founded on the assumptions that problem-solving and learning are situated in practice, context-specific, and socially constructed. To develop further the theoretical framework, the author has gained access to a global strategic management consulting firm with offices in New York City where she is using ethnographic methods of interviewing and participant observation. The research is expected to have implications for training, mentoring and incentive policies for organizations operating in the IT-based, knowledge economy
    corecore