Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Meg Murray is active.

Publication


Featured researches published by Meg Murray.


Journal of Information Technology Education | 2012

Student Interaction with Online Course Content: Build It and They Might Come

Meg Murray; Jorge Pérez; Debra Geist; Alison Hedrick

Online learning continues to expand at educational institutions around the globe. Educators must better understand how interaction with online course content impacts student engagement and learning. Advances in technology amplify the imperative to gain further insights into how delivery of course materials can enhance and support the learning process. This study investigates student patterns of access to instructional resources provided in an asynchronous online digital literacy course offered at a regional university in the United States. Frequency counts and access rates collected from a learning management system were used to assess patterns of student retrieval of course materials in four categories: core materials, direct support, indirect support and ancillary materials. Results were consistent with student survey responses and indicate that students selectively access course content based upon the degree to which they perceive it will positively influence performance and outcomes on assignments and assessments.


Issues in Informing Science and Information Technology | 2011

E-Textbooks Are Coming: Are We Ready?

Meg Murray; Jorge Pérez

Textbook options are expanding and the electronic text is poised to become prevalent in the college classroom. Cost pressures are driving this trend even as the academic value of e-textbooks has yet to be established. Limited research is available that examines the effectiveness of the etextbook as a learning tool. This paper presents the results of a study that compares student performance in two sections of an online course, one using an e-textbook and the other using a paper-based text. No significant difference in student performance was found. However, until etextbook format and features are standardized and business models generate sizable cost savings, e-textbook adoption is likely to evolve slowly.


hawaii international conference on system sciences | 2002

An investigation of specifications for migrating to a Web portal framework for the dissemination of health information within a public health network

Meg Murray

The utilization of modern web technologies and the incorporation of intelligence features in medical web portals facilitate remote patient learning for preventative care and disease management, remote access to evidence based medicine as well as remote access to high quality health information. This paper suggests a four-layer web architecture of a health portal, providing access to relevant, valid and understandable information, aiming at educating patients so that they are better able to seek medical information. The intelligence features of the portal are analyzed, while the architecture and preliminary interface of the eLearning platform that is incorporated within the portal is also discussed.Web-based technologies provide a framework that facilitates the dissemination of healthcare related information. A portal strategy comprised of six layers has been defined for healthcare. This layered architecture is well suited for employing an iterative approach to development, implementation and deployment of an emerging technology. Planning for Web portal implementation should be seen as a process of building an infrastructure and foundation for the future, not as the development of a single all-encompassing solution. Mapping requirements and specifications for the portal framework to a conceptual target architecture is part of this process. This research paper investigates a model for a healthcare portal framework and the mapping of user specifications of a major public health organization for organizing and structuring information to facilitate a plan of action for moving to an Internet portal strategy.


hawaii international conference on system sciences | 2003

Strategies for the successful implementation of workflow systems within healthcare: a cross case comparison

Meg Murray

The implementation of computerized workflow systems to support the collection and dissemination of patient information has been an area of focus in healthcare for many years. This multiple case study is an analysis of the implementation of a commercially available healthcare workflow system in two hospital settings. The case study protocol uses an analytical framework built upon six theoretical propositions identified as having a major impact on the implementation of workflow technologies. Findings indicated that organizational support for workflow as a strategic solution and employing a cross-functional implementation team were key factors for success and developing an understanding of the flow of data into and through the system, given the complexities of work processes, was challenging. Understanding the organizational impact of workflow, the maturity of the workflow management system, and the human interaction and participation intrinsic to workflow is also necessary. Greater insight into the applicability and benefits of the technology will emerge as workflow is successfully implemented in more organizations.


Interdisciplinary Journal of Information, Knowledge, and Management | 2010

Generativity: The New Frontier for Information and Communication Technology Literacy

Jorge Pérez; Meg Murray

Information and communication technology literacy is increasingly referred to as the fourth literacy. However, it is neither as well understood nor as readily assessed as reading, writing, and arithmetic. This paper argues that better understanding and more effective measurement of ICT literacy are needed to gauge readiness to both pursue higher education and enter the workforce. The paper builds on existing definitions of ICT literacy by introducing a model that extends the dimensionality of the construct. The model posits that skills and knowledge, along with attitudes toward IT, coalesce in the context of reflective self-awareness and purposeful intent to allow a computer user to achieve generativity – the ability to generate new skills and knowledge that form the basis for creativity. Literacy, aptitude, and creativity are overlaid on the model to give meaning to the complex, iterative processes by which users interact with and learn about information technology artifacts and concepts. In the absence of robust theoretical foundations and effective standardized assessments, ICT literacy will continue to play a fourth, barely audible fiddle to its three more established counterparts.


conference on information technology education | 2007

Using animation courseware in the teaching of database security

Mario Guimaraes; Meg Murray

Information security, and particularly, data security, are primary concerns especially as more and more data are shared over mediums such as the Internet and the Web. Traditionally database security focused on user authentication and managing user privileges to database objects. This has proven to be inadequate given the growing number of successful database hacking incidents and the increase in the number of organizations reporting loss of sensitive.


information security curriculum development | 2008

Overview of intrusion detection and intrusion prevention

Mario Guimaraes; Meg Murray

This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations. The fourth section describes the dangers of e-mail and the need of an E-mail Exploit Detection Engine that has many characteristics of an Intrusion Prevention System. The conclusion summarizes what should be taken into consideration when deciding on an Intrusion Prevention System.


information security curriculum development | 2007

Incorporating database security courseware into a database security class

Mario Guimaraes; Meg Murray; Richard Austin

Data security is a growing concern and it seems timely to develop and incorporate database security courses into programs of study in the computing disciplines. This paper describes a recently developed course in database security and introduces a set of animations that might be incorporated to bring about more effective instruction and enhance student learning. Currently animations are being developed for referential integrity, integrity matrices, row level security, SQL injections and inference problems. Animations related to encryption, multilevel security and database auditing procedures will be added in the future. The database security animations will be included as a module in an ongoing animated database courseware project designed to provide supplementary instructional materials for the teaching of database topics. Animations can be incorporated directly into classroom instruction or used independently by students to reinforce what they have learned or to deepen their understanding.


acm southeast regional conference | 2008

Recent upgrades to an animated database courseware (ADbC)

Meg Murray; Mario Guimaraes

This poster will present recent enhancements to the Animated Database Courseware (ADbC), formerly called KDC, to help students understand the fundamentals of database concepts and technologies. The software has gone through a major re-structure of the menu system with the redesign of many modules, and the addition of additional modules as well as the planning for modules based on advanced concepts. As it is difficult to communicate breadth and depth of concepts in a single database course, these animations are intended to support more in-depth student learning. The animations were developed to complement (not substitute for) introductory database textbook or DBMS products. The software is independent of any book or software and is designed to be fairly intuitive with a very low learning curve for faculty. Furthermore, the software is available at no cost at and has been made freely available at http://adbc.kennesaw.edu. The work is the result of an NSF funded project (#0717707).


Communications of The Ais | 2017

Connectivity and Continuity: New Fronts in the Platform War

Jorge Pérez; Meg Murray; Joy Fluker; Demetrius Fluker; Zach Bailes

Device interconnectedness in video conferencing, telephony, texting, file-sharing and application handoff has become a critical battleground for tech giants. In this panel, we will distinguish between approaches to device connectivity and application continuity, give an overview of current solutions and share projections for the future of connectivity. Apple, Microsoft and Google are predictably focusing on connectivity across devices and applications rather than across platforms. Given the scope of impact of these innovations, tech giants will be under increasing pressure to architect a world wherein devices and platforms are secondary to what users want to achieve via technology. Participants will examine competing approaches to connectivity and continuity, explore emergent issues for research and practice, and discuss the social and business impacts of these technologies.

Collaboration


Dive into the Meg Murray's collaboration.

Top Co-Authors

Avatar

Jorge Pérez

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Mario Guimaraes

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Joy Fluker

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Debra Geist

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zach Bailes

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Alison Hedrick

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Joy Young

Kennesaw State University

View shared research outputs
Top Co-Authors

Avatar

Martha E. Myers

Kennesaw State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge