-
2
-
-
84859399967
-
Applying Cases to Solve Ethical Problems: The Significance of Positive and Process-Oriented Reflection
-
Antes, A., Thiel,C., Martin,L., Stenmark,C., Connelly,S., Devenport, L. & Mumford, M. (2012). Applying Cases to Solve Ethical Problems: The Significance of Positive and Process-Oriented Reflection. Ethics and Behavior, 22 (2), 113 - 130
-
(2012)
Ethics and Behavior
, vol.22
, Issue.2
, pp. 113-130
-
-
Antes, A.1
Thiel, C.2
Martin, L.3
Stenmark, C.4
Connelly, S.5
Devenport, L.6
Mumford, M.7
-
3
-
-
85001002559
-
Case Study in Information Security: Securing The Enterprise
-
GSEC Certification, Version 1.4c, Option 2, Retrieved October 27, 2012, from
-
Benton, R. (2005). Case Study in Information Security: Securing The Enterprise, GSEC Certification, Version 1.4c, Option 2, Retrieved October 27, 2012, from http://www.sans.org/reading_room/whitepapers/casestudies/case-study-information-security-securing-enterprise_1628
-
(2005)
-
-
Benton, R.1
-
4
-
-
0003921938
-
Taxonomy of Educational Objectives. The classification of educational goals
-
Cognitive domain. New York: David McKay
-
Bloom, B. S. (1956). Taxonomy of Educational Objectives. The classification of educational goals. handbook I: Cognitive domain. New York: David McKay
-
(1956)
handbook I
-
-
Bloom, B.S.1
-
5
-
-
77953768744
-
Usable security and privacy: a case study of developing privacy management tools
-
Proceedings of the symposium on Usable privacy and security (SOUPS)
-
Brodie, C., Karat, C., Karat, J. & Feng, J. (2005). Usable security and privacy: a case study of developing privacy management tools. Proceedings of the symposium on Usable privacy and security (SOUPS), pp. 35 - 43
-
(2005)
, pp. 35-43
-
-
Brodie, C.1
Karat, C.2
Karat, J.3
Feng, J.4
-
6
-
-
79451471190
-
Effectiveness of Case-Based Learning Instruction on Epistemological Beliefs and Attitudes Toward Chemistry
-
Çam,A. & Geban, O. (2011). Effectiveness of Case-Based Learning Instruction on Epistemological Beliefs and Attitudes Toward Chemistry. Journal of Science Education and Technology, 20(1), pp. 26-32
-
(2011)
Journal of Science Education and Technology
, vol.20
, Issue.1
, pp. 26-32
-
-
Çam, A.1
Geban, O.2
-
7
-
-
27944432048
-
A case library for teaching usability engineering: design rationale, development, and classroom experience
-
Article 3
-
Carroll, J.M. & Rosson, M.B. (2005). A case library for teaching usability engineering: design rationale, development, and classroom experience. ACM Journal on Educational Resources in Computing, 5(1), Article #3
-
(2005)
ACM Journal on Educational Resources in Computing
, vol.5
, Issue.1
-
-
Carroll, J.M.1
Rosson, M.B.2
-
8
-
-
48749128329
-
Creating a Case-Based Reasoning Digital Library to Improve Learning in an Introductory Programming Course
-
San Diego, USA, October 28-31
-
Chen, W.F., & Yeh, K.C. (2006). Creating a Case-Based Reasoning Digital Library to Improve Learning in an Introductory Programming Course. Proceedings of IEEE Frontiers in Education 36th Annual Conference, San Diego, USA, October 28-31, pp. 21-22
-
(2006)
Proceedings of IEEE Frontiers in Education 36th Annual Conference
, pp. 21-22
-
-
Chen, W.F.1
Yeh, K.C.2
-
9
-
-
84899894396
-
-
Computing Curricula. The Overview Report. Retrieved October 27, 2012, from
-
Computing Curricula (2005). The Overview Report. Retrieved October 27, 2012, from http://www.acm.org/education/education/curric_vols/CC2005-March06Final.pdf
-
(2005)
-
-
-
10
-
-
79956289227
-
Towards Information Assurance Curricular Guidelines
-
Proceedings of the 15th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE)
-
Cooper, S., Nickell, C., Pérez, L., Oldfield, B., Brynielsson, J., Gencer Gökce, Asi{dotless}m, Hawthorne, E., Klee, K., Lawrence, A., & Wetzel, S. (2010). Towards Information Assurance Curricular Guidelines. Proceedings of the 15th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), pp.49-64
-
(2010)
, pp. 49-64
-
-
Cooper, S.1
Nickell, C.2
Pérez, L.3
Oldfield, B.4
Brynielsson, J.5
Gökce, G.6
Asim, H.E.7
Klee, K.8
Lawrence, A.9
Wetzel, S.10
-
11
-
-
84864538813
-
Business Intelligence for Enterprise Systems: a Survey
-
Duan, L., & Xu, L. (2012). Business Intelligence for Enterprise Systems: a Survey. IEEE Transactions on Industrial Informatics, Vol.8, No.3, pp.679-687
-
(2012)
IEEE Transactions on Industrial Informatics
, vol.8
, pp. 679-687
-
-
Duan, L.1
Xu, L.2
-
12
-
-
34948841662
-
The Use of Blogs, Wikis and RSS in Education
-
A Conversation of Possibilities. Proceedings of Online Learning and Teaching Conference 2006, Brisbane
-
Duffy, P.D. & Bruns, A. (2006). The Use of Blogs, Wikis and RSS in Education: A Conversation of Possibilities. Proceedings of Online Learning and Teaching Conference 2006, pp. 31-38, Brisbane
-
(2006)
, pp. 31-38
-
-
Duffy, P.D.1
Bruns, A.2
-
13
-
-
0141953488
-
Implementing the case method of instruction in special education teacher preparation programs
-
Elksnin, L. (2001). Implementing the case method of instruction in special education teacher preparation programs. Teacher Education and Special Education, 24 (2), 95-107
-
(2001)
Teacher Education and Special Education
, vol.24
, Issue.2
, pp. 95-107
-
-
Elksnin, L.1
-
14
-
-
84890935327
-
An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management
-
in press Digital Object Identifier: 10.1109/TII.2013.2257807
-
Fang, S., Xu, L., Pei, H., Liu, Y., Liu, Z., Zhu, Y., Yan, J., & Zhang, H. (2013). An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management. IEEE Transactions on Industrial Informatics, in press Digital Object Identifier: 10.1109/TII.2013.2257807
-
(2013)
IEEE Transactions on Industrial Informatics
-
-
Fang, S.1
Xu, L.2
Pei, H.3
Liu, Y.4
Liu, Z.5
Zhu, Y.6
Yan, J.7
Zhang, H.8
-
15
-
-
0033313897
-
Hybrid Artificial Intelligence Approach to Urban Planning
-
Feng, S., & Xu, L. (1999). Hybrid Artificial Intelligence Approach to Urban Planning. Expert Systems, Vol.16, No.4, pp.248-261
-
(1999)
Expert Systems
, vol.16
, pp. 248-261
-
-
Feng, S.1
Xu, L.2
-
16
-
-
74049147592
-
Formalizing information security knowledge. In ASIACCS '09
-
Computer, and Communications Security, New York, NY, USA, ACM
-
Fenz, S. & Ekelhart, A.(2009). Formalizing information security knowledge. In ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 183-194, New York, NY, USA, ACM
-
(2009)
Proceedings of the 4th International Symposium on Information
, pp. 183-194
-
-
Fenz, S.1
Ekelhart, A.2
-
17
-
-
0242307415
-
Creating significant learning experiences: An integrated approach to designing college courses
-
San Francisco: Jossey-Bass
-
Fink, L. D. (2003). Creating significant learning experiences: An integrated approach to designing college courses. San Francisco: Jossey-Bass
-
(2003)
-
-
Fink, L.D.1
-
18
-
-
84899893382
-
Multimedia Cases and Situated Learning: What Works?
-
In C. Montgomerie & J. Seale (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007. Chesapeake, VA: AACE
-
Fitzgerald, G., Mitchem, K., Hollingsead, C., Miller, K., Koury, K. & Tsai, H.H. (2007). Multimedia Cases and Situated Learning: What Works?. In C. Montgomerie & J. Seale (Eds.), Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2007 (pp. 3884-3892). Chesapeake, VA: AACE
-
(2007)
, pp. 3884-3892
-
-
Fitzgerald, G.1
Mitchem, K.2
Hollingsead, C.3
Miller, K.4
Koury, K.5
Tsai, H.H.6
-
19
-
-
53149139024
-
-
Retrieved May 18th, 2013, from
-
Forehand, M. (2013). Bloom's Taxonomy. Retrieved May 18th, 2013, from http://projects.coe.uga.edu/epltt/index.php?title=Bloom%27s_Taxonomy
-
(2013)
Bloom's Taxonomy
-
-
Forehand, M.1
-
20
-
-
33646390965
-
Emerging technologies: tag clouds in the blogosphere: electronic literacy and social networking
-
Godwin-Jones, R. (2006). Emerging technologies: tag clouds in the blogosphere: electronic literacy and social networking. Language, Learning & Technology, Vol. 10 No. 2, pp. 8-15
-
(2006)
Language, Learning & Technology
, vol.10
, Issue.2
, pp. 8-15
-
-
Godwin-Jones, R.1
-
21
-
-
84868666857
-
Using Wikis to Facilitate Collaborative Website Peer Evaluation in an Online Web Development Course: An Exploratory Study
-
He, W. (2011). Using Wikis to Facilitate Collaborative Website Peer Evaluation in an Online Web Development Course: An Exploratory Study. Journal of Information Technology Education, volume 10, pp. 235-247
-
(2011)
Journal of Information Technology Education
, vol.10
, pp. 235-247
-
-
He, W.1
-
22
-
-
79952455870
-
A Supporting Framework of Online Technology Resources for Lesson Planning
-
He, W., & Hartley, K. (2010). A Supporting Framework of Online Technology Resources for Lesson Planning. Journal of Educational Multimedia and Hypermedia, 19(1), 23-37
-
(2010)
Journal of Educational Multimedia and Hypermedia
, vol.19
, Issue.1
, pp. 23-37
-
-
He, W.1
Hartley, K.2
-
23
-
-
70350134774
-
Integrating Web 2
-
He, W., Xu, L., Means, T. & Wang, P. (2009). Integrating Web 2.0 and the CBR Cycle: A System Approach. System Research & Behavior Science, 26(6), 717-728
-
(2009)
0 and the CBR Cycle: A System Approach. System Research & Behavior Science
, vol.26
, Issue.6
, pp. 717-728
-
-
He, W.1
Xu, L.2
Means, T.3
Wang, P.4
-
24
-
-
58349108259
-
Insight into Interface Design of Web-based Case-based Reasoning Retrieval Systems
-
He, W., Wang, F., Means, T., & Xu, L. (2009). Insight into Interface Design of Web-based Case-based Reasoning Retrieval Systems. Expert Systems With Applications, Vol.36, No. 3, pp.7280-7287
-
(2009)
Expert Systems With Applications
, vol.36
, Issue.3
, pp. 7280-7287
-
-
He, W.1
Wang, F.2
Means, T.3
Xu, L.4
-
25
-
-
79952446585
-
Integrating both Wikis and XML with Case Bases to Facilitate Case Base Development and Maintenance
-
He, W., & Xu, L. (2011). Integrating both Wikis and XML with Case Bases to Facilitate Case Base Development and Maintenance. Expert Systems With Applications, Vol.38, No.7, pp.8632-8638
-
(2011)
Expert Systems With Applications
, vol.38
, pp. 8632-8638
-
-
He, W.1
Xu, L.2
-
26
-
-
84867690865
-
Improving User Experience with Case-based Reasoning Systems Using Text Mining and Web 2 0
-
He, W. (2013). Improving User Experience with Case-based Reasoning Systems Using Text Mining and Web 2.0. Expert Systems with Applications, 40(2), pp. 500-507
-
(2013)
Expert Systems with Applications
, vol.40
, Issue.2
, pp. 500-507
-
-
He, W.1
-
27
-
-
85001799494
-
An ontology of information security
-
Herzog,A., Shahmehri, N. & Duma, C.(2007). An ontology of information security. International Journal of Information Security and Privacy, 1(4):1-23
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.4
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
28
-
-
0036018575
-
Case-based reasoning and instructional design: using stories to support problem solving
-
Jonassen, D., & Hernandez-Serrano, J. (2002). Case-based reasoning and instructional design: using stories to support problem solving, Educational Technology Research & Development, 50(2), 65-77
-
(2002)
Educational Technology Research & Development
, vol.50
, Issue.2
, pp. 65-77
-
-
Jonassen, D.1
Hernandez-Serrano, J.2
-
29
-
-
1242265180
-
Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors
-
February 2004
-
Khalfan A. M. (2004). Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors. International Journal of Information Management, Volume 24, Issue 1, February 2004, pp. 29-42
-
(2004)
International Journal of Information Management
, vol.24
, Issue.1
, pp. 29-42
-
-
Khalfan, A.M.1
-
31
-
-
33747632112
-
A conceptual framework for developing teaching cases: A review and synthesis of the literature across disciplines
-
Kim, S., Phillips, W., Pinsky, L., Brock, D., Phillips, K., & Keary, J. (2006). A conceptual framework for developing teaching cases: A review and synthesis of the literature across disciplines. Medical Education, 40(9), 867-876
-
(2006)
Medical Education
, vol.40
, Issue.9
, pp. 867-876
-
-
Kim, S.1
Phillips, W.2
Pinsky, L.3
Brock, D.4
Phillips, K.5
Keary, J.6
-
33
-
-
69749096710
-
WEB 2.0 implications on knowledge management
-
Levy,M. (2009). WEB 2.0 implications on knowledge management. Journal of Knowledge Management, Vol. 13 Iss: 1, pp.120 - 134
-
(2009)
Journal of Knowledge Management
, vol.13
, Issue.1
, pp. 120-134
-
-
Levy, M.1
-
34
-
-
84884497347
-
An Efficient Recommendation Method for Improving Business Process Modeling
-
in press Digital Object Identifier: 10.1109/TII.2013.2258677
-
Li, Y., Cao, B., Xu, L., Yin, J., Deng, S., Yin, Y., & Wu, Z. (2013). An Efficient Recommendation Method for Improving Business Process Modeling. IEEE Transactions on Industrial Informatics, in press Digital Object Identifier: 10.1109/TII.2013.2258677
-
(2013)
IEEE Transactions on Industrial Informatics
-
-
Li, Y.1
Cao, B.2
Xu, L.3
Yin, J.4
Deng, S.5
Yin, Y.6
Wu, Z.7
-
35
-
-
84869191161
-
-
the health first case study Proceedings of SIGITE Conference 2012
-
Lincke, S. J. (2012). Planning organizational security: the health first case study Proceedings of SIGITE Conference 2012, pp. 3-8
-
(2012)
Planning organizational security
, pp. 3-8
-
-
Lincke, S.J.1
-
36
-
-
84883414902
-
Faculty perceptions of a case-based online teaching resource
-
Ma, Y., & Harmon, S. (2006). Faculty perceptions of a case-based online teaching resource. International Journal of Technology in Teaching and Learning, 2(2), 117-133
-
(2006)
International Journal of Technology in Teaching and Learning
, vol.2
, Issue.2
, pp. 117-133
-
-
Ma, Y.1
Harmon, S.2
-
37
-
-
58349114125
-
Retrieval from a Case-Based Reasoning Database
-
Moore, J., Erdelez, S., & He, W. (2006). Retrieval from a Case-Based Reasoning Database. Academic Exchange Quarterly, 10(4), 65-68
-
(2006)
Academic Exchange Quarterly
, vol.10
, Issue.4
, pp. 65-68
-
-
Moore, J.1
Erdelez, S.2
He, W.3
-
38
-
-
84899828378
-
Teaching Security Management
-
A Case Study Approach. North Carolina Agricultural and Technical State University, Greensboro, NC
-
Murthy, S. (2010). Teaching Security Management: A Case Study Approach. North Carolina Agricultural and Technical State University, Greensboro, NC
-
(2010)
-
-
Murthy, S.1
-
39
-
-
84899794011
-
Computer Security Incident Handling Guide
-
National Institute of Standards and Technology (NIST), The NIST Handbook SP 800-61, Retrieved May 18, 2013, from
-
National Institute of Standards and Technology (NIST). (2013). Computer Security Incident Handling Guide, The NIST Handbook SP 800-61, Retrieved May 18, 2013, from: http://www.nist.org/nist_plugins/content/content.php?content.42
-
(2013)
-
-
-
40
-
-
84899863176
-
Case Studies for Teaching Information Security
-
NCAT. Retrieved January 18, 2013 from
-
NCAT. (2013). Case Studies for Teaching Information Security: Incident Response Planning Case Study. Retrieved January 18, 2013,from: http://williams.comp.ncat.edu/IA_visualization_labs/Case%20Studies/security_management/incident_response.html
-
(2013)
Incident Response Planning Case Study
-
-
-
41
-
-
84907599601
-
Analysis of Architecturally Significant Requirements for Enterprise Systems
-
Identifier: 10.1109/JSYST.2013.2249892
-
Niu, N., Xu, L., Cheng, J., & Niu, Z. (2013). Analysis of Architecturally Significant Requirements for Enterprise Systems. IEEE Systems Journal, in press Digital Object Identifier: 10.1109/JSYST.2013.2249892
-
(2013)
IEEE Systems Journal, in press Digital Object
-
-
Niu, N.1
Xu, L.2
Cheng, J.3
Niu, Z.4
-
42
-
-
77954317608
-
National Training Standard for Information Systems Security (INFOSEC) Professionals
-
NSTISS. Retrieved January 18, 2013, from
-
NSTISS (1994). National Training Standard for Information Systems Security (INFOSEC) Professionals. Retrieved January 18, 2013, from www.cnss.gov/Assets/pdf/nstissi_4011.pdf
-
(1994)
-
-
-
43
-
-
84870752364
-
Supporting beginning teachers' case-based learning in a technology-mediated learning environment
-
In C. H. Steel, M. J. Keppell, P. Gerbic & S. Housego (Eds. ), Curriculum, technology & transformation for an unknown future. Proceedings ascilite Sydney 2010
-
Quek, C.L.G., & Wang, Q. (2010). Supporting beginning teachers' case-based learning in a technology-mediated learning environment. In C.H. Steel, M.J. Keppell, P. Gerbic & S. Housego (Eds.), Curriculum, technology & transformation for an unknown future. Proceedings ascilite Sydney 2010, pp.783-786
-
(2010)
, pp. 783-786
-
-
Quek, C.L.G.1
Wang, Q.2
-
44
-
-
19944378842
-
Imparting knowledge through storytelling
-
Part 1& 2, KM World. Retrieved January 18, 2011, from
-
Reamy, T. (2002). Imparting knowledge through storytelling. Part 1& 2, KM World, Vol. 11 No. 6. Retrieved January 18, 2011, from www.kmworld.com
-
(2002)
, vol.11
, Issue.6
-
-
Reamy, T.1
-
45
-
-
84863961214
-
-
Retrieved January 18, 2013, from
-
Sahami, M., Danyluk, A., Fincher, S., Fisher, K., Grossman, D., Hawthorne, B., Katz, R., LeBlanc, R., Reed, D., Roach, S., Cuadros-Vargas, E., Dodge, R., France, R., Kumar, A., Robinson, B., Seker, R. & Thompson, A. (2012). Computer Science Curricula 2013, Retrieved January 18, 2013, from: http://ai.stanford.edu/users/sahami/CS2013/strawman-draft/cs2013-strawman.pdf
-
(2012)
Computer Science Curricula 2013
-
-
Sahami, M.1
Danyluk, A.2
Fincher, S.3
Fisher, K.4
Grossman, D.5
Hawthorne, B.6
Katz, R.7
LeBlanc, R.8
Reed, D.9
Roach, S.10
Cuadros-Vargas, E.11
Dodge, R.12
France, R.13
Kumar, A.14
Robinson, B.15
Seker, R.16
Thompson, A.17
-
46
-
-
84899841322
-
Special Considerations in Using the Case-study Method in Teaching Information Security
-
2011 Conference for Young Professionals in the Field of Information Security. Retrieved January 18, 2013, from
-
Savelyeva, A. (2011). Special Considerations in Using the Case-study Method in Teaching Information Security. 2011 Conference for Young Professionals in the Field of Information Security. Retrieved January 18, 2013, from: http://www.kaspersky.com/images/papers_international_2011-10-95005.pdf
-
(2011)
-
-
Savelyeva, A.1
-
47
-
-
33845697992
-
MSMiner-a Developing Platform for OLAP
-
Shi, Z., Huang, Y., He, Q., Xu, L., Liu, S., Qin, L., Jia, Z., Li, J., Huang, H., & Zhao, L. (2007). MSMiner-a Developing Platform for OLAP. Decision Support Systems, Vol.42, No. 4, pp. 2016-2028
-
(2007)
Decision Support Systems
, vol.42
, Issue.4
, pp. 2016-2028
-
-
Shi, Z.1
Huang, Y.2
He, Q.3
Xu, L.4
Liu, S.5
Qin, L.6
Jia, Z.7
Li, J.8
Huang, H.9
Zhao, L.10
-
48
-
-
0001809567
-
Toward a pedagogy of cases
-
Using Case Methods in Teacher Education (1-30). New York: Teacher college press
-
Shulman, L. S. (1992). Toward a pedagogy of cases, Using Case Methods in Teacher Education (pp. 1-30). New York: Teacher college press
-
(1992)
-
-
Shulman, L.S.1
-
49
-
-
0037929389
-
Scenario-based Knowledge Representation in Case-based Reasoning Systems
-
Sun, B., Xu, L., Pei, X., & Li, H. (2003). Scenario-based Knowledge Representation in Case-based Reasoning Systems. Expert Systems, Vol.20, No.2, pp.92-99
-
(2003)
Expert Systems
, vol.20
, Issue.2
, pp. 92-99
-
-
Sun, B.1
Xu, L.2
Pei, X.3
Li, H.4
-
50
-
-
84861038728
-
The effectiveness of case-based learning in health professional education
-
Thistlethwaite, J.E., Davies, D., Ekeocha, S., Kidd, J.M., MacDougall, C., Matthews, P., Purkis, J., & Clay, D. (2012). The effectiveness of case-based learning in health professional education. A BEME systematic review: BEME Guide No. 23. Medical Teacher, 34:6, 421-444
-
(2012)
A BEME systematic review: BEME Guide 23. Medical Teacher
, vol.34
, Issue.6
, pp. 421-444
-
-
Thistlethwaite, J.E.1
Davies, D.2
Ekeocha, S.3
Kidd, J.M.4
MacDougall, C.5
Matthews, P.6
Purkis, J.7
Clay, D.8
-
51
-
-
84878125540
-
A system framework of security management in enterprise systems
-
in pressDOI:10.1002/sres.2184
-
Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y., & Li, X. (2013). A system framework of security management in enterprise systems. Systems Research and Behavioral Science, in press, DOI: 10.1002/sres.2184
-
(2013)
Systems Research and Behavioral Science
-
-
Wang, F.1
Ge, B.2
Zhang, L.3
Chen, Y.4
Xin, Y.5
Li, X.6
-
52
-
-
84986099496
-
Designing a case-based e-learning system: what, how, and why
-
Wang, F. K. (2002). Designing a case-based e-learning system: what, how, and why. Journal of Workplace Learning, 14(1), 30-43
-
(2002)
Journal of Workplace Learning
, vol.14
, Issue.1
, pp. 30-43
-
-
Wang, F.K.1
-
53
-
-
0344197643
-
Developing a case-based reasoning knowledge repository to support a learning community - An example from the technology integration community
-
Wang, F., Moore, J. L., Wedman, J., & Shyu, C. (2003). Developing a case-based reasoning knowledge repository to support a learning community - An example from the technology integration community. Educational Technology Research and Development, 51(3), 45-62
-
(2003)
Educational Technology Research and Development
, vol.51
, Issue.3
, pp. 45-62
-
-
Wang, F.1
Moore, J.L.2
Wedman, J.3
Shyu, C.4
-
54
-
-
84868027022
-
Using storytelling to elicit tacit knowledge from SMEs
-
Whyte,G. & Classen, S. (2012). Using storytelling to elicit tacit knowledge from SMEs. Journal of Knowledge Management, Vol. 16 Iss: 6, pp. 950-962
-
(2012)
Journal of Knowledge Management
, vol.16
, Issue.6
, pp. 950-962
-
-
Whyte, G.1
Classen, S.2
-
55
-
-
22544460636
-
Exploring the use of blogs as learning spaces in the higher education sector
-
Williams, J. B., & Jacobs, J.S. (2004). Exploring the use of blogs as learning spaces in the higher education sector. Australasian Journal of Educational Technology, 20(2), pp. 232-247
-
(2004)
Australasian Journal of Educational Technology
, vol.20
, Issue.2
, pp. 232-247
-
-
Williams, J.B.1
Jacobs, J.S.2
-
56
-
-
0028547161
-
Developing a Case-based Knowledge System for AIDS Prevention
-
Xu, L. (1994). Developing a Case-based Knowledge System for AIDS Prevention. Expert Systems, Vol.11,No.4, pp.237-244
-
(1994)
Expert Systems
, vol.11
, Issue.4
, pp. 237-244
-
-
Xu, L.1
-
57
-
-
0028752697
-
Case-based Reasoning--A Major Paradigm of Artificial Intelligence
-
Xu, L. (1995a). Case-based Reasoning--A Major Paradigm of Artificial Intelligence. IEEE Potentials, Vol.13, No.5, pp.10-13
-
(1995)
IEEE Potentials
, vol.13
, Issue.5
, pp. 10-13
-
-
Xu, L.1
-
58
-
-
0029256187
-
Case-based Reasoning for AIDS Initial Assessment
-
Xu, L. (1995b). Case-based Reasoning for AIDS Initial Assessment. Knowledge-Based Systems, Vol.8, No.1, pp.32-38
-
(1995)
Knowledge-Based Systems
, vol.8
, Issue.1
, pp. 32-38
-
-
Xu, L.1
-
59
-
-
0029932553
-
An Integrated Rule- and Case-based Approach to AIDS Initial Assessment
-
Xu, L. (1996). An Integrated Rule- and Case-based Approach to AIDS Initial Assessment. International Journal of Bio-Medical Computing, Vol.40, No.3, pp.197-207
-
(1996)
International Journal of Bio-Medical Computing
, vol.40
, Issue.3
, pp. 197-207
-
-
Xu, L.1
-
60
-
-
0034187538
-
A Hybrid System Applied to Epidemic Screening
-
Xu, L., & Li, L. (2000). A Hybrid System Applied to Epidemic Screening. Expert Systems, Vol.17, pp.81-89
-
(2000)
Expert Systems
, vol.17
, pp. 81-89
-
-
Xu, L.1
Li, L.2
-
61
-
-
0035422468
-
An Integrated Knowledge-based System for Grasslands Ecosystems
-
Xu, L., Liang, N., & Gao, Q. (2001). An Integrated Knowledge-based System for Grasslands Ecosystems. Knowledge-Based Systems, Vol.14, pp.271-280
-
(2001)
Knowledge-Based Systems
, vol.14
, pp. 271-280
-
-
Xu, L.1
Liang, N.2
Gao, Q.3
-
62
-
-
33646508788
-
Integrating Knowledge Management and ERP in Enterprise Information Systems
-
Xu, L., Wang, C., Luo, X., & Shi, Z. (2006). Integrating Knowledge Management and ERP in Enterprise Information Systems. Systems Research and Behavioral Science, Vol.23, No. 2, pp.147-156
-
(2006)
Systems Research and Behavioral Science
, vol.23
, Issue.2
, pp. 147-156
-
-
Xu, L.1
Wang, C.2
Luo, X.3
Shi, Z.4
-
63
-
-
70350124630
-
Towards A Comprehensive Learning Object Metadata: Incorporation of Context to Stipulate Meaningful Learning and Enhance Learning Object Reusability
-
Yahya, Y. & Yusoff, M. (2008). Towards A Comprehensive Learning Object Metadata: Incorporation of Context to Stipulate Meaningful Learning and Enhance Learning Object Reusability. Interdisciplinary Journal of E-Learning and Learning Objects, Volume 4, pp. 13-48
-
(2008)
Interdisciplinary Journal of E-Learning and Learning Objects
, vol.4
, pp. 13-48
-
-
Yahya, Y.1
Yusoff, M.2
-
64
-
-
84899810457
-
Teaching security management with case studies: experiences and evaluation, Journal on Education
-
Yuan, X., Jiang, K., Murthy, S., Jones, J., & Yu, H. (2010a). Teaching security management with case studies: experiences and evaluation, Journal on Education, Informatics and Cybernetics (JEIC), Vol. 2, No. 2, pp. 25-30
-
(2010)
Informatics and Cybernetics (JEIC)
, vol.2
, Issue.2
, pp. 25-30
-
-
Yuan, X.1
Jiang, K.2
Murthy, S.3
Jones, J.4
Yu, H.5
-
65
-
-
79952834907
-
Visualization Tools for Teaching Computer Security
-
January, 2010, Article 20
-
Yuan, X., Vega, P., Qadah, Y., Archer, R., Yu, H., & Xu, J. (2010b). Visualization Tools for Teaching Computer Security. ACM Trans. Computing Education (TOCE), Volume 9, Issue 4, January, 2010, Article No. 20
-
(2010)
ACM Trans. Computing Education (TOCE)
, vol.9
, Issue.4
-
-
Yuan, X.1
Vega, P.2
Qadah, Y.3
Archer, R.4
Yu, H.5
Xu, J.6
-
66
-
-
79952497230
-
Case studies for teaching physical security and security policy
-
Proceedings of the 2010 Information Security Curriculum Development Conference (InfoSecCD2010), October, 2010, 21-26
-
Yuan, X., Murthy, S., Xu, J. & Yu, H. (2010). Case studies for teaching physical security and security policy. Proceedings of the 2010 Information Security Curriculum Development Conference (InfoSecCD2010), October, 2010, pp. 21-26
-
(2010)
-
-
Yuan, X.1
Murthy, S.2
Xu, J.3
Yu, H.4
-
67
-
-
76649102421
-
The impact of Social Networking 2
-
Zyl, A.S. (2009). The impact of Social Networking 2.0 on organizations. The Electronic Library, Vol. 27 Iss: 6, pp.906 - 918
-
(2009)
0 on organizations. The Electronic Library
, vol.27
, Issue.6
, pp. 906-918
-
-
Zyl, A.S.1
|