NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Necdet Gurkan – ProQuest LLC, 2024
This dissertation studies the advancement of consensus-aware technologies in the context of collective decision-making, focusing on the integration of these technologies into information systems to effectively represent, detect, and characterize consensus among people and other agents. Despite the proven value of collective intelligence in…
Descriptors: Decision Making, Technology Integration, Information Systems, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Andrea Trubanova Wieckowski; Georgina Perez Liz; Ashley de Marchena; Deborah A. Fein; Marianne L. Barton; Giacomo Vivanti; Diana L. Robins – Autism: The International Journal of Research and Practice, 2024
Universal autism screening is recommended by the American Academy of Pediatrics at 18 and 24 months. However, many children are not identified until after the age of 4 years, and some not until adulthood, either due to mild or no indication of symptoms early in development, or to co-occurring conditions which may overshadow autism symptoms. This…
Descriptors: Check Lists, Toddlers, Autism Spectrum Disorders, Parent Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jiang, Yong – Higher Education Studies, 2017
Traditional mathematical methods built around exactitude have limitations when applied to the processing of educational information, due to their uncertainty and imperfection. Alternative mathematical methods, such as grey system theory, have been widely applied in processing incomplete information systems and have proven effective in a number of…
Descriptors: Accreditation (Institutions), Business Administration Education, Information Systems, Evaluation Methods
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Harris, Mark A. – ProQuest LLC, 2010
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Descriptors: Computer Security, Job Training, Video Technology, Technical Support
Mason, Robert T. – ProQuest LLC, 2011
An interoperability gap exists between Learning Management Systems (LMSs) and Learning Object Repositories (LORs). Learning Objects (LOs) and the associated Learning Object Metadata (LOM) that is stored within LORs adhere to a variety of LOM standards. A common LOM standard found in LORs is the Sharable Content Object Reference Model (SCORM)…
Descriptors: Expertise, Information Systems, Course Content, Metadata
Peer reviewed Peer reviewed
Direct linkDirect link
Skulmoski, Gregory J.; Hartman, Francis T.; Krahn, Jennifer – Journal of Information Technology Education, 2007
The Delphi method is an attractive method for graduate students completing masters and PhD level research. It is a flexible research technique that has been successfully used in our program at the University of Calgary to explore new concepts within and outside of the information systems body of knowledge. The Delphi method is an iterative process…
Descriptors: Feedback (Response), Delphi Technique, Graduate Students, Research Projects