Saturday, 19 July 2008

Notes on Knowledge Management.

The business of universities is all about knowledge. The following refernces are some links for notes I am working on on a paper.

1. Accetta, R. (2001) “E-Learning Crossfire” (Saved: 22 Oct 2002) (
2. Adler, A., (1959). “Understanding Human Nature”. New York: Premier Books.
3. Alexander, S (1995)”Teaching and Learning on the World Wide Web” Proceedings of AusWeb ’95
4. Ansoff, I. (1965), “Corporate Strategy”, McGraw-Hill, New York.
5. Azadegan, S. Lavine, M. O'Leary, M. Wijesinha, A. Zimand, M. “An Undergraduate Track in Computer Security”. ACM SIGCSE Bulletin, Proceedings of the annual conference on Innovation and technology in computer science education, Volume 35 Issue 3. June 2003. Available on March 14, 2006 -
6. Beirne, T. Brecht, H.D. & Sauls, E. (2002) “Using the web to serve students as information clients” Proceedings of Informing Sciences and IT Education Conference, University College Cork, Cork IRE (June 19-21, 2002)
7. Beldore, T & Brecht, H.D. & Sauls, E. (2002) “Online Education: The future is now” Socrates Distance Learning Technologies Group, Academic Research and Technologies
8. Berge, Z (1993) “Computer Conferencing and Online Education” The Point Electronic Journal on Virtual Culture, (1) 3.
9. Beyer, H. and Holtzblatt, K. (1998) “Contextual Design Defining Customer-Centered Systems”, Morgan Kaufman Publishers Inc
10. Bogolea, Bradley & Wijekumar, Kay (2004) “Information Security Curriculum Creation: A Case Study” ACM InfoSecCD Conference’04, October 8, 2004, Kennesaw, GA, USA.
11. Bolman, Lee & Deal, Terrance, (2003) “Reframing Organizations : Artistry, Choice, and Leadership”, Jossey-Bass; 3 edition, USA
12. Border, Charles. Holden, Ed. “Security Education within the IT Curriculum”. Proceeding of the 4th conference on information technology curriculum on Information technology education. Oct 2003. Available on March 14, 2006 -
13. Boud, D., Dunn, J. and Hegarty-Hazel, E. (1986) “Teaching in Laboratories”. SRHE & NFER-Nelson, Surrey, UK
14. Boyd, C. and Mathuria, A. (2003) “Protocols for Authentication and Key Establishment”. Springer-Verlag, Berlin, Germany
15. Burgess, S. & Darbyshire, P. (2003) “A Comparison between the use of IT in Business and Education: Applications of the Internet to Tertiary Education” Victoria University, Au
16. Cox, R. and Light, G. (2001) “Learning & Teaching in Higher Education: The reflective professional”. Sage Publications, London, UK
17. Crowley, Ed. “Information System Security Curricula Development.” Proceeding of the 4th conference on information technology curriculum on Information technology education. Oct 2003. Available on March 11, 2006 at
18. Darbyshire, P. (1999) “Distributed Web Based assignment submission and access” Proceedings – International Resource Management Assoc. IRMA 1999. Hershey PA: Idea Publishing Group
19. Dark, Melissa J. (2004.a) “Assessing Student Performance Outcomes in an Information Security Risk Assessment, Service Learning Course” Purdue University
20. Dark, Melissa. J. (2004.b). “Civic Responsibility and Information Security: An Information Security Management, Service Learning Course”. Proceedings of the Information Security Curriculum Development Conference, 2004.
21. Davies, I.K. 1994, “Process re-design for enhanced human performance”. Performance Improvement Quarterly, 7 (3): 103-113
22. Earl, M.J. (1989) “Management Strategies for Information Technology” Prentice Hall NY
23. Ford, W. and Baum, M. S. (1997) “Secure Electronic Commerce”. Prentice Hall
24. Garfinkel, S. and Spafford, G. (2001) “Web Security, Privacy & Commerce”. 2nd Edition. Cambridge, Mass: O'Reilly
25. Ghosh, A. K. (1998) “E-Commerce Security”. Wiley
26. Ghoshal, S. & Bartlett, C.A. 1995”Changing the role of top management: beyond structure to processes”. Harvard Business Review, January-February: 86-96
27. Habermas, J. (1984) “The Theory of Communicative Action: reasons and Rationalisation of Society” Beacon Press, Boston MA
28. Hay/McBer (2000). “Research into teacher effectiveness: A model of teacher effectiveness report by Hay McBer to the Department for Education and Employment”. Report prepared by Hay/McBer for the government of the United Kingdom,
29. Infosec Graduate Program. Purdue University. First viewed on March 12, 2006 at
30. Issacs, Henri (2003) “On-Line Case Discussion: A Methodology” Paris Dauphine University, France
31. Jackson, Nancy. (1992); Chapter 7 “Training Needs: An Objective Science?” In Training for What? Labour Perspectives on Job Training, ed. Nancy Jackson. Toronto: Our Schools/Our Selves Education Foundation.
32. Jacques, D., Gibbs, G. and Rust, C. (1991) “Designing and Evaluating Courses”. Oxford Brookes University, Oxford, UK
33. Kalakota, R. and Whinston, A. B. (1996) “Frontiers of Electronic Commerce”. Addison-Wesley
34. Kollock, P. (1997) “The design prnciples for Online Communities” The Internet and Society: Harvard Conference Proceedings, Cambridge, MA: O’Reilly & Assoc.
35. Kotter, John P. & Cohen, Dan S. (1992). “The heart of change”. Harvard Business School Press, Boston, Massachusetts
36. Kumar, A., Kumar, P., & Basu, S. C. (2002) “Student Perceptions of virtual Education; An exploratory study” In M. Khosrow-Pour (Ed.) Web Based Instructional Learning (pp 132-141) Hershey, PA IRM Press.
37. Lane, David, 2004, “Foundations of HRM, Performance and Compensation Management”, Course Notes, University of SA
38. Longworth, N (1999) “Making Lifelong Learning Work” Kogan Page, London UK
39. Master of Science degree program in Information Security and Assurance. George Mason University. Available on March 12, 2006 at
40. Master of Science in Security Informatics. Johns Hopkins University. Available on March 12, 2006 at
41. McGill, Tanya, Ed. (2002) “Current issues in IT education”, Murdock University, IRM Press, Melbourne, Australia.
42. McLelland, Ross (2004), “Emotional intelligence in the Australian context”, Pacific Consulting,
43. Mintzberg, H. (1994) “The rise and fall of strategic planning”. New York: Free Press
44. Peltz, P (2000) “Do virtual classrooms make the grade” (Saved article from Apr 2001, no current link)
45. Porter, M.E. & Millar, V.E. (1985) “How Information gives you competitive advantage” Harvard Business Review, 63, 4 July/August pp 149-160.
46. Rice, R (1993) “Media appropriateness using social presence theory to compare traditional and new organisational media” Human Communications Research, 19, (pp 451 - 484)
47. Robey, D. (1994). “Designing Organizations”. (4th Ed.). Irwin. Homewood, Illinois
48. Romm, C & Taylor W. (2000) “Online Education – Can we combine efficiency with quality?” Proceedings ACIS, Brisbane 6-8, 2000
49. Romm, C & Taylor W. (2001) “Teaching Online is about Psychology – not technology” In M.Khosrow-Pour (Ed.) Proceedings of IRMA Conference, Hersey PA, Idea Group Publishing
50. Rummler, G.A. and Brache, A.P. 1995 “Improving performance”. 2nd edition, San Francisco: Jossey Bass
51. Salmon, G (2000) “E-Moderating: The Key to Teaching and Learning Online” Kogan Page, London UK
52. Schooley, C (2001) “Online universities introduce alternatives for higher education” Planning Assumption. GIGA Group.
53. Senge, P. M. (1994). “The Fifth Discipline: The Art & Practice of the Learning Organization”. New York: Currency-Doubleday. Stace, D. and Dunphy, D. (2001), “Beyond the Boundaries”, 2nd ed. McGraw-Hill Australia: Roseville.
54. Shaikh, Siraj A. (2004) “Information Security Education in the UK: a proposed course in Secure E-Commerce Systems” ACM InfoSecCD Conference’04, October 8, 2004, Kennesaw, GA, USA.
55. Sherif, M. H. (2000) “Protocols for Secure Electronic Commerce”. CRC Press
56. Simon, Judith C., Brooks, Llyod D., & Wilkes, Ronald B. (2003) “Empirical Study of Student’s Perceptions of Online Classes” The University of Memphis, USA
57. Slusky, Ludwig & Partow-Navid Parviz (2003) “Training in Remote Database Server Administration” California State University US
58. Stiller, A.D. (2003) “Designing e-Business and e-Commerce Courses to Meet Industry Needs”, University of the Sunshine Coast, Au
59. Taylor, Wal; Dekkers, John; & Marshall, Stewart (2003) “Community Informatics – Enabling Emancipatory Learning” Central Qld University Au
60. Tsang, P. & Fong, T. L. (1998) “Learning support via the web: How do know I make a difference?” Proceedings of the 12th Annual Conference of the Asian Association of Open Universities, New Delhi, 4-6 Nov 1998
61. Vaughn Jr. Rayford B., Dampier, David A. & Warkentin, Merrill B (2004) “Building an Information Security Education Program” ACM InfoSecCD Conference’04, October 8, 2004, Kennesaw, US
62. Vroom, V.H. 1964, “Work and Motivation”. New York: John Wiley & Sons.
63. Weade, R., & Gritzmacher, J. 1987. “Personality characteristics and curriculum design preferences of vocational home economics educators”. Journal of Vocational Education Research, 12(2), 1-18.
64. Weil, N (2001) “University net courses help make pros make the grade” (Viewed and saved; 16 May 2003) (
65. Wellman, B, Salaff, J., Dimitrova, D., Garton, L., Gulia, M., and Haythornthwaite, C. (1996) “Computer networks as social networks: Collaborative work, telework, and virtual community” Annual review of Sociology, 22 (p 213 – 238)
66. Wellman, B., Boase, J. & Chen, W. (2002) “The Networked Nature of Community: Online and Offline”. IT & Society, 1(1), 151--165.
67. Winfield Treese, G. and Stewart, L. C. (2002) “Designing Systems for Internet Commerce”. 2nd Edition, Addison-Wesley
68. Yang, Andrew. “Computer Security and Impact on Computer Science Education”. The Journal of Computing Small Colleges, Proceedings of the sixth annual CCSC north-eastern conference on the journal of computing in small colleges, Volume 16 Issue 4. April 2001. Available on March 21, 2006 -

No comments: