Abstract is missing.
- Educational Telecommunications Services: A Case Study on an Integrated ApproachFerran Ruiz i Tarragó. 3-9
- Telematic Services in Catalan Schools: Working Environment and AchievementsJordi Castells, Guillem Carreras, Jaume Porta, Jordi Bertran, Xavier Jordà. 10-16
- E-mail as an Educational Tool in Learning StatisticsBenita Compostela, Henk Sligte. 17-23
- ISDN Interactive Distance Learning - A Step Closer To Near Paperless Learning Environment?Hock-Guan Tan. 24-30
- Where is the ELITE: Excellent Liberal I. T. Education?Geoff Cumming. 31-44
- Mapping a Microcomputer Strategy for Informatics EducationRobert Behling, Wallace Wood. 45-51
- Managing End-User Computing: A Systematic ViewH. C. Harrison, Gong Oizhong. 52-58
- MAGE: A Methodological Framework for the Cooperative Development of Educational SoftwareThierry Nodenot, Guy Gouardères. 59-65
- A Fuzzy Logic-Based Intelligent Tutoring System (ITS)Wes Regian, Gerald Pitts. 66-72
- Takeaway Learning Resources for Information Technology CoursesSylvia Willie. 73-79
- Computer-Related Attitudes and Self-Image as a Function of Students AgeBaruch Offir, Yaacov J. Katz. 80-84
- In Support of Children: Research on Learning with ComputersLaura R. Winer, Marion A. Barfurth. 85-92
- Reorganization of Management Information Education In Light of the Advent of EUC/UFNam Won Suh. 93-99
- A Model for Teaching the Management of Information Systems & TechnologyC. James Bacon. 100-106
- Academic Computing Centers as Strategic University ResourcesStephen D. Franklin. 107-115
- Computers in the Classroom: A National ProposalAli Mili, Noureddine Boudriga. 116-122
- University Computer Services: A Third World ExperienceAbdallah D. Abdallah, Adnan H. Yahya. 123-129
- A National Survey of the Pedagogical Uses of Informatics in French UniversitiesBernard Dumond. 130-136
- Integrating Social Impact and Ethics Issues Across the Computer Science CurriculumC. Dianne Martin, Hilary J. Holz. 137-143
- Application Oriented Informatics and Informational Disciplines: A Symbiosis Briding the GapTom J. van Weert. 144-150
- Harmonising Information Technology Curricula with the Needs of Industry: An Australian ApproachJudith H. Hammond. 151-157
- Strategies for Research - Integrating Outcomes into PracticeRobert Lewis. 158-166
- Visual Operational Thinking and Communicative Competence - A Prerequisiste for Bringing Multimedia Network Systems and Learners into ActionLone Dirckinck-Holmfeld, Janni Nielsen. 167-173
- Enhancing the Scientist in the Pupil: A Computer Environment Supporting Mathematical Discoveries in the ClassroomEvgenia Sendova. 174-180
- Should Smalltalk be Used in Educational Research?Andrew C. Jones. 181-187
- Co-Explainer: A Machine-Learning CompanionN. Hoskin, R. M. Aiken. 188-196
- Courseware to Help Readers Trace the Ties in Text as an Aid to ComprehensionJ. Anderson. 197-203
- New Intellectual Software for Statistical Informatics Education and ResearchIgor N. Sinitsyn. 204-210
- Knowledge Based Systems in Education: An Instructional Method that Places the Responsibility for Learning on the StudentsBent B. Andresen. 211-216
- Knowledge-Based Simulation in Memory Re-EducationMohand-Said Hacid, Christine Bonnet, Jacques Kouloumdjian. 217-223
- A Century after Lady Lovelace TragedyA. M. Bruin. 224-232
- Cross-Cultural Gender Differences in Student Self-Efficacy: The Impact of CultureVasilios Makrakis. 233-238
- Addressing the gender Gap in Informatics EducationC. Dianne Martin. 239-245
- Structured Hypertext Applied to Software MeasurementDirk Meyerhoff, Monika Müllerburg. 246-252
- The Irvine-Geneva Course Development SystemAlfred Bork, Bertrand Ibrahim, Bernard Levrat, Alastair Milne, Rika Yoshii. 253-261
- A Complete Computerized Instructional System and Its Authoring FacilityLuis Osin. 262-269
- Innovation as a Critical Success Factor for the Development of an Information Technology Industry in ChileRicardo A. Baeza-Yates, David A. Fuller, José A. Pino. 273-280
- Informatics and DemocracyElrique Calderón Alzati, Elvia Martinez Viveros, Daniel Cazes. 281-287
- Information Technology Usage and Industry in Developing CountriesJosé A. Pino. 288
- Informatics and DevelopmentSubhash C. Bhatnagar. 289
- Systems Development for Development - Is It Possible, How, By Whom?M. Korpela. 290
- African Development Through Information Technology?Mayuri Odedra. 291
- Participant: Panel on Informatics and DevelopmentSam Lanfranco. 292
- Computer-Based Information Systems in Their Social Context: Use of Different PerspectivesTimothy Mwololo Waema, A. J. Rodrigues. 293
- Risk and Vulnerability in an Information and Artificial SocietyJacques Berleur. 294-313
- Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security MechanismsSimone Fischer-Hübner, Louise Yngström, Jan Holvast. 314-321
- Human Factors In Computer SecurityIbibia Dabipi, Husam Yaghi, Issam Qasem. 322-328
- How Vulnerable is Information Society? A Sociological ApproachRyan Tewari. 329-335
- Responsible Scientists - A Social-Constructivist ApproachMarc van Lieshout, Mieke Massink. 336-343
- Ethics, Vulnerability and Information Technology (IT)Julie Cameron, Roger Clarke, Simon Davies, Agnes Jackson, Mark Prentice, Brian Regan. 344-350
- An IFIP Code of Ethics - Some of the Issues InvolvedRichard Sizer. 351-354
- A Perspective on Social Responsibility for the Computing CommunityK. A. Duncan. 355-362
- Ethics and Information System PracticeAndrew B. Morris. 363-369
- Towards an IFIP Frame Code of Ethics (Panel)Blagovest Sendov. 370
- Aims and Scope of the Draft IFIP Code of Ethics (Panel)Harold Sackman. 371
- Towards an IFIP Frame Code of Ethics (Panel)John A. N. Lee. 372
- Efficacy of Ethics Codes for Computer Professionals (panel)C. Dianne Martin, D. H. Martin. 373
- Legal Aspects of the Information SocietyBryan Niblett. 374-376
- Legal Apects of Data SecurityWolfgang Kilian. 377-384
- Legal Control of IT Misuse: The Limited Relevance of the Criminal LawMartin Wasik. 385-392
- Security Mearures, Standardisation and the LawHenrik Kaspersen. 393-399
- Network(er)s at Risk: The Fairy-Tale of Invulerability of Computer Supported WorkHerbert Kubicek. 400-418
- Impacts of Electronic Markets on WorkPertti Järvinen. 419-425
- Automation-Related Complacency: A Source of Vulnerability in Contemporary OrganizationsS. Parasuraman, Indramani L. Singh, Robert Molloy, Raja Parasuraman. 426-432
- Vulnerability of Computer Systems: Establishing Organizational AccountabilityIna Wagner. 433-439
- Perspectives in Information Technology SecurityHarold Joseph Highland. 440-446
- DASS: Distributed Authentication Security ServiceMorrie Gasser, Charles Kaufman, J. Linn, Y. Le Roux, Joseph Tardo. 447-456
- Security Issues in EDI EnvironmentSnehamay Banerjee, Damodar Y. Golhar. 457-463
- Security PolicyS. H. Banks. 464-471
- Attribute Based Data Model and PolyinstantiationTsau Young Lin. 472-478
- Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical TokenMike Burmester, Yvo Desmedt. 479-485
- Security in Local Area NetworksPeter Lipp. 486-493
- Perspectives on Home-Oriented Informatics and TelematicsFelix van Rijn, Kresten Bjerg, Gisela Frerk. 494-507
- Vulnerability in the Electronic Cottage - Electronic Data Interchange and the Electronic Cottage (Panel)Andy Sloane. 508
- Reducing the Vulnerability of Women in an Information Society: Enlarging Information Systems Perspectives (Panel)Andrew Clement. 509
- Vulnerability and Gender Issues in Information Systems Design seen in a Euro-business Perspective (Panel)Siv Friis. 510
- Checksumming Techniques for Anti-Viral PurposesY. Radai. 511-517
- Generation of Secure Passwords by the UserErnst Piller. 518-524
- Reducing the Proliferation of Passwords in Distributed SystemsRalf C. Hauser, E. Stewart Lee. 525-531
- An Efficient Public Key Distribution SystemNikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos. 532-539
- Group-Oriented Key Management and Authentication MethodsYasushi Mutoh, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita. 540-546
- Implementation of Security Functions into File Transfer, Access and Management ProtocolHua Chang, Ostap Monkewich, William A. McCrum. 547-553
- Reducing Society s Vulnerability as Computers and Networks ProliferateLance J. Hoffman. 554-563
- Extra-Organisational Systems: A Challenge to the Software Engineering ParadigmRoger Clarke. 564-570
- Artificial Intelligence Systems and Patents - the ChallengeYannis Skulikaris. 571-578
- Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg. 579-587
- Perspectives of the Vulnerability of IT-based SocietiesKlaus Brunnstein. 588-592
- Environmental Protection as a Challenge to Applied Informatics - A Workshop IntroductionBernd Page. 595-604
- The Evolving Technology For Environmental Decision-Making - Towards the Environmental Decision Support SystemIan K. Crain. 605-614
- Distributed Environmental Data CompendiaWerner Pillmann, D. J. Kahn. 615-624
- Global Environmental Change Data and ModellingA. M. Din. 625-634
- Artificial Intelligence and Environmental Protection: A Survey of Selected Applications in FranceL. Buisson, Roger Martin-Clouaire, Jean Luc Wybo. 635-644
- The XUMA Expert System Enviromental Hazards from Contamined Sites Andreas Jaeschke, Werner Geiger, Matthias Reißfelder, Rainer Weidemann. 645-654
- A Cooperative, Natural Language Enviromental Information SystemsR. Becker, Detlef Küpper, M. Strobel, Dietmar Rösner. 655-665
- Application of Fourth Generation Prototyping Tools and Methods: A Municipal Industrial Water Quality Monitoring SystemCatherine M. Beise, Nanette Meeks Griffith. 666-675
- Integration of GIS into Decision Support Systems for Management of Ground WaterJ. Fürst. 676-684
- Linking Environmental Studies and IT - a East-West Project in Bulgaria, Germany and the United KingdomU. Bosler, D. Squires, R. Tsankova, W. Ziebarth. 685-886