114 results on '"Alex Koohang"'
Search Results
2. MOOC 2050: A FUTURISTIC TOUR
3. ACTIVE LEARNING IN E-LEARNING: ADVANCING A SYSTEMIC MODEL
4. Active Learning in Online Courses: An Examination of Students’ Learning Experience
5. DIRECT ASSESSMENT OF STUDENT OUTCOMES: A SYSTEMATIC APPROACH
6. FORMULATING AN EFFECTIVE CYBERSECURITY CURRICULUM
7. THE HYPE OF USING SOCIAL NETWORKING AS A TOOL FOR LEARNING IN E-LEARNING
8. MANAGERS’ PERSPECTIVES ON EMPLOYEE INFORMATION TECHNOLOGY FRAUD ISSUES WITHIN COMPANIES/ORGANIZATIONS
9. DESIGN, IMPLEMENTATION, AND ASSESSMENT OF AN INFORMATION TECHNOLOGY SENIOR CAPSTONE COURSE
10. ADDING A NEW DIMENSION TO EDUCATION: STUDENTS’ PERCEPTIONS TOWARD HYBRID/BLENDED COURSE DELIVERY
11. USABILITY OF DIGITAL LIBRARIES AND THEIR REUSABLE OBJECTS IN E-LEARNING SETTINGS
12. CREATING LEARNING OBJECTS IN COLLABORATIVE E-LEARNING SETTINGS
13. EFFECT OF PRIOR EXPERIENCE WITH THE INTERNET ON GRADUATE STUDENTS’ PERCEPTION TOWARD COURSEWARE USABILITY AND WEB-BASED DISTANCE LEARNING INSTRUCTION: AN EXPLORATORY STUDY IN A HYBRID INSTRUCTION ENVIRONMENT
14. Diving into the divide: a systematic review of cognitive bias-based polarization on social media.
15. Soft computing in business: exploring current research and outlining future research directions.
16. Big data analytics: from leadership to firm performance.
17. Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation.
18. Journal of Computer Information Systems: Intellectual and Conceptual Structure.
19. Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse.
20. Predictors of Success in Information Security Policy Compliance.
21. Critical Components Affecting Organizational Performance.
22. Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance.
23. Opinion Paper: 'So what if ChatGPT wrote it?' Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy.
24. Building an awareness-centered information security policy compliance model.
25. Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness.
26. An Educational Adventure Game for Teaching Information Literacy and Student Engagement.
27. The Internet of Things: Review and theoretical framework.
28. Internet of Things (IoT): From awareness to continued use.
29. Social media privacy concerns: trusting beliefs and risk beliefs.
30. The impact of leadership on trust, knowledge management, and organizational performance: A research model.
31. Leadership Effectiveness in IT-Centered Organizations: Gender and Levels of Management.
32. Critical components of data analytics in organizations: A research model.
33. Active Learning for Knowledge Construction in E-Learning: A Replication Study.
34. E-Learning Courseware Usability: Building a Theoretical Model.
35. Scholarly interest in gamification: a citation network analysis.
36. Using Social Technologies for Competitive Advantage: Impact on Organizations and Higher Education.
37. Knowledge Construction in e-Learning: An Empirical Validation of an Active Learning Model.
38. Design of an Information Technology Undergraduate Program to Produce IT Versatilists.
39. Understanding and Prioritizing Technology Management Challenges.
40. Diffusion of selected concepts in information systems and management: 1973-2004.
41. The Academic Open Access E-Journal: Platform and Portal.
42. Open Source: A Metaphor for E-Learning.
43. Users' views about the usability of digital libraries.
44. Frequency of Publication and Topical Emphasis of Knowledge Management Books versus Doctoral Dissertations: 1983-2005.
45. Journal of Computer Information Systems: Intellectual and Conceptual Structure
46. Students' perceptions toward the use of the digital library in weekly web-based distance learning assignments portion of a hybrid programme.
47. Learners' Perceptions toward the Web-based Distance Learning Activities/Assignments Portion of an Undergraduate Hybrid Instructional Model.
48. Building an awareness-centered information security policy compliance model
49. Social media privacy concerns and risk beliefs
50. Internet of Things Development in Polish Enterprises
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.