[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2380790acmconferencesBook PagePublication PagesiteConference Proceedingsconference-collections
RIIT '12: Proceedings of the 1st Annual conference on Research in information technology
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
RIIT '12: Research in Information Technology 2012 Calgary Alberta Canada October 11 - 13, 2012
ISBN:
978-1-4503-1643-9
Published:
11 October 2012
Sponsors:

Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to Calgary and Mount Royal University!

It is our great pleasure to host the 13th Annual Conference on Information Technology Education and the 1st Annual Research in IT Conference. This year is especially exciting since it introduces the brand new IT Research conference; our aim in this and in future joint SIGITE/RIIT conferences is to provide a venue for showcasing research in information technology along with our traditional focus on teaching IT. Inspired by the new research conference, our joint conference has the theme of Working Together: Research & Education for IT.

Over the years, we have found the SIGITE conference to be both a wellspring of ideas to address issues such as the above and a much-needed opportunity to network and bond with fellow IT educators. We hope you find this year's conference as beneficial and rewarding as the many we have attended in the past.

We are truly fortunate this year to have Randy Thompson of Venture Alberta as our keynote speaker. Randy provides a keynote that combines our interest in both IT education and IT research. Integrating his many years of experience at the head of an IT angel investors group, Randy shows us how IT departments in universities can play a key role in commercializing IT research and thereby improve local economies as well as IT education.

Skip Table Of Content Section
SESSION: IT research (1)
research-article
Evaluations of AODV and DSR for QOS requirements

A set of wireless mobile nodes communicate with each other without using any fixed infrastructure in mobile ad hoc network (MANET). MANET devices usually communicate in a seamless manner. There are multiple routing protocols that have been developed for ...

research-article
Mapping the cyber security terrain in a research context

In this paper we present a mapping of cyber-security research to information technology as a technical research discipline. We first discuss the evolution of IT as an academic discipline and use this to establish technical research objectives in an IT ...

SESSION: IT research (2)
research-article
Discovering workplace motivators for the millennial generation of IT employees

This paper provides an overview on motivational research and describes the research methodology and approach that was used to identify the workplace rewards and motivators that the youngest generation of employees, the millennial generation or ...

research-article
Resource utilization prediction: a proposal for information technology research

Research into predicting long-term resource needs has been faced with a very difficult problem of extending the accuracy period beyond the immediate future. Business forecasting has overcome this limitation by successfully incorporating the concept of ...

SESSION: IT research (3)
research-article
Testing & quantifying ERP usability

An Enterprise Resource Planning (ERP) system benefits the business, although the typically complex interface can challenge end users whose errors can undermine the benefits of real-time automation. Many prior studies of ERP users measured attitudes ...

research-article
A simulation-based fuzzy multi-attribute decision making for prioritizing software requirements

It is well known that most of the approaches proposed in recent research to prioritize software requirements have not been widely adopted. These approaches are too complex and time consuming, or inconsistent and difficult to implement. This paper ...

research-article
Comparison of VM deployment methods for HPC education

Operating System virtualization has seen major adoption across many industry fields, this growth has driven penetration into more traditional settings such as high performance computing and cluster systems. Developing an effective and efficient teaching ...

PANEL SESSION: Panel session
panel
Defining IT research

Information Technology emerged as a separate computing discipline primarily because the computing disciplines that were taught in universities at the time, in particular computer science and information systems, did not meet the needs of employers. In ...

SESSION: IT research (4)
research-article
A survey SCADA of and critical infrastructure incidents

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can ...

research-article
Improving accuracy in face tracking user interfaces using consumer devices

Using face and head movements to control a computer can be especially helpful for users who, for various reasons, cannot effectively use common input devices with their hands. Using vision-based consumer devices makes such a user interface readily ...

Contributors
  • Mount Royal University
  • Purdue University
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 51 of 116 submissions, 44%
YearSubmittedAcceptedRate
RIIT '1711655%
RIIT '1620945%
RIIT '15221045%
RIIT '14391436%
RIIT '13241250%
Overall1165144%