Instructional design is a process whereby the designer uses the phases of analysis of the learner... more Instructional design is a process whereby the designer uses the phases of analysis of the learner needs and learner context, the development of strategies both for instruction and its delivery, and an assessment or evaluation of learner goals and objectives for the purposes of accomplishing instruction and to possibly revise and improve future instruction. By following the key principles and assumptions of instructional design and knowing their interrelationships, the instructional designer is assured of designing instruction that is effective and efficient as well as technologically relevant in today’s educational arena.
The research project conducted on students attending a 300-level Computer Science and Network Eng... more The research project conducted on students attending a 300-level Computer Science and Network Engineering Course at Wolf-Creek Academy was performed using a norm-referenced pre-assessment test prior to instruction to assess the overall knowledge and skill levels of the learners prior to instruction taking place, and was followed by criterion-referenced assessments consisting of a formative assessment at roughly the mid-point of instruction and a summative assessment following instruction. The results of the adult learning assessment indicate that the criterion-referenced assessments chosen for this research project represent the “best practices” in adult learning assessment and demonstrate how the process of interpreting these assessments can have a profound impact on adult teaching.
Adaptive Structuration Theory (AST) is relevant to today's organizations due to the expanding inf... more Adaptive Structuration Theory (AST) is relevant to today's organizations due to the expanding influence that advancing technologies have had with regard to the human-computer interaction aspect of AST and its implications on socio-biologically inspired structuration. This literature review presents examples of advances in information technology that are driving organizational changes in the areas of business alignment, IT planning, and development that show how AST is being used to study this driving force of advancing technologies within organizations. We also investigate how AST relates to complexity theory of organizational structure, in order to better understand how advancing information technologies influence the structure, modality, and interaction of social systems, team dynamics, and organizations. To gain a better understanding of the individual adaptation of IT and how the adaptation of IT by the business sector drives organizational change within the company in today's digital age, it was necessary for us to investigate such concepts as virtual team dynamics, the integration of Enterprise Resource Planning (ERP) into academe, the investigation of AST as a Meta-Theory for examining IS within organizations, contextual and organizational elements of AST in Group Support System (GSS) research, group decision making, the geographic dispersion in teams, the Enterprise Systems of induced organizational change, the study of IT effects on individuals and organizations, and technology-mediated learning within organizations.
This literature review looks at the research that has been published in the area of cryptography ... more This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play in the future relative to security. This review addresses cryptography around the central theme of the security that it provides or should provide individuals, corporations, and others in the modern age of computing technology, networking, and Web-based ecommerce. By reviewing both scholarly and non-scholarly works, it is our objective to make a case that continuing research into the use of cryptography is paramount in preserving the future of electronic data security and privacy as well as the continuing development of Web-based applications that will permit the growth of ecommerce business worldwide to be conducted over the Internet.
Radio frequency microchip technology is a new innovation in IT that sprang out of the invention o... more Radio frequency microchip technology is a new innovation in IT that sprang out of the invention of the microchip in the early 1950s and the advances this invention brought to (Radio-Frequency Identification) RFID technology that developed in the early 1940s. The implications that RFID technology and, specifically, smart tagging has effected on society as a whole and on individual organizations, through the direct benefits seen by both, are innumerable. The storing, interpreting, and use of relevant information is becoming the primary concern in the next decade due to the increasing merger of analog and digital media, and context. In the next decade, RFID smart tags implanted in static objects and the development of the RFID network known as The Internet of Things will allow pervasive computing, ubiquitous computing, and sentient computing, to transform our very environment—not just our computers—such that it will become smarter because computing power and connectivity will be embedded into it.
The purpose of this project is to conduct pure research into the implementation and management of... more The purpose of this project is to conduct pure research into the implementation and management of the next generation Internet Protocol (IP) version 6 addressing scheme. This project will address the debate over the various aspects of IPv6 implementation and management in a comprehensive manner. We will probe the various issues relating to the migration of IPv4 to IPv6 in light of the practical alternative of NAT IPv4. Furthermore, we will analyze the various enablers, potential hurdles, costs and penetration estimates that have been explored by leading analysts world wide.
Instructional design is a process whereby the designer uses the phases of analysis of the learner... more Instructional design is a process whereby the designer uses the phases of analysis of the learner needs and learner context, the development of strategies both for instruction and its delivery, and an assessment or evaluation of learner goals and objectives for the purposes of accomplishing instruction and to possibly revise and improve future instruction. By following the key principles and assumptions of instructional design and knowing their interrelationships, the instructional designer is assured of designing instruction that is effective and efficient as well as technologically relevant in today’s educational arena.
The research project conducted on students attending a 300-level Computer Science and Network Eng... more The research project conducted on students attending a 300-level Computer Science and Network Engineering Course at Wolf-Creek Academy was performed using a norm-referenced pre-assessment test prior to instruction to assess the overall knowledge and skill levels of the learners prior to instruction taking place, and was followed by criterion-referenced assessments consisting of a formative assessment at roughly the mid-point of instruction and a summative assessment following instruction. The results of the adult learning assessment indicate that the criterion-referenced assessments chosen for this research project represent the “best practices” in adult learning assessment and demonstrate how the process of interpreting these assessments can have a profound impact on adult teaching.
Adaptive Structuration Theory (AST) is relevant to today's organizations due to the expanding inf... more Adaptive Structuration Theory (AST) is relevant to today's organizations due to the expanding influence that advancing technologies have had with regard to the human-computer interaction aspect of AST and its implications on socio-biologically inspired structuration. This literature review presents examples of advances in information technology that are driving organizational changes in the areas of business alignment, IT planning, and development that show how AST is being used to study this driving force of advancing technologies within organizations. We also investigate how AST relates to complexity theory of organizational structure, in order to better understand how advancing information technologies influence the structure, modality, and interaction of social systems, team dynamics, and organizations. To gain a better understanding of the individual adaptation of IT and how the adaptation of IT by the business sector drives organizational change within the company in today's digital age, it was necessary for us to investigate such concepts as virtual team dynamics, the integration of Enterprise Resource Planning (ERP) into academe, the investigation of AST as a Meta-Theory for examining IS within organizations, contextual and organizational elements of AST in Group Support System (GSS) research, group decision making, the geographic dispersion in teams, the Enterprise Systems of induced organizational change, the study of IT effects on individuals and organizations, and technology-mediated learning within organizations.
This literature review looks at the research that has been published in the area of cryptography ... more This literature review looks at the research that has been published in the area of cryptography as it relates to network data and global communications security. It compares and contrasts the research pointing out overall trends in what has already been published on this subject. It analyzes the role that cryptography has played and will play in the future relative to security. This review addresses cryptography around the central theme of the security that it provides or should provide individuals, corporations, and others in the modern age of computing technology, networking, and Web-based ecommerce. By reviewing both scholarly and non-scholarly works, it is our objective to make a case that continuing research into the use of cryptography is paramount in preserving the future of electronic data security and privacy as well as the continuing development of Web-based applications that will permit the growth of ecommerce business worldwide to be conducted over the Internet.
Radio frequency microchip technology is a new innovation in IT that sprang out of the invention o... more Radio frequency microchip technology is a new innovation in IT that sprang out of the invention of the microchip in the early 1950s and the advances this invention brought to (Radio-Frequency Identification) RFID technology that developed in the early 1940s. The implications that RFID technology and, specifically, smart tagging has effected on society as a whole and on individual organizations, through the direct benefits seen by both, are innumerable. The storing, interpreting, and use of relevant information is becoming the primary concern in the next decade due to the increasing merger of analog and digital media, and context. In the next decade, RFID smart tags implanted in static objects and the development of the RFID network known as The Internet of Things will allow pervasive computing, ubiquitous computing, and sentient computing, to transform our very environment—not just our computers—such that it will become smarter because computing power and connectivity will be embedded into it.
The purpose of this project is to conduct pure research into the implementation and management of... more The purpose of this project is to conduct pure research into the implementation and management of the next generation Internet Protocol (IP) version 6 addressing scheme. This project will address the debate over the various aspects of IPv6 implementation and management in a comprehensive manner. We will probe the various issues relating to the migration of IPv4 to IPv6 in light of the practical alternative of NAT IPv4. Furthermore, we will analyze the various enablers, potential hurdles, costs and penetration estimates that have been explored by leading analysts world wide.
Uploads
Papers by Daniel L Calloway