NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nicoletti, Maria do Carmo; de Oliveira, Osvaldo Luiz – Higher Education Studies, 2020
In the literature related to higher education, the concept of dropout has been approached from several perspectives and, over the years, its definition has been influenced by the use of diversified semantic interpretations. In a general higher education environment dropout can be broadly characterized as the act of a student engaged in a course…
Descriptors: Artificial Intelligence, Man Machine Systems, Computation, Prediction
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Heather, James – Assessment & Evaluation in Higher Education, 2010
In recent times, "plagiarism detection software" has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, Computer System Design
Doyle, Gerald S. – ProQuest LLC, 2010
Complex and expensive systems' development suffers from a lack of method for making good system-architecture-selection decisions early in the development process. Failure to make a good system-architecture-selection decision increases the risk that a development effort will not meet cost, performance and schedule goals. This research provides a…
Descriptors: Computer System Design, Architecture, Probability, Research Opportunities
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Peer reviewed Peer reviewed
Direct linkDirect link
Shuqun, Yang; Shuliang, Ding; Zhiqiang, Yao – International Journal of Distance Education Technologies, 2009
Cognitive diagnosis (CD) plays an important role in intelligent tutoring system. Computerized adaptive testing (CAT) is adaptive, fair, and efficient, which is suitable to large-scale examination. Traditional cognitive diagnostic test needs quite large number of items, the efficient and tailored CAT could be a remedy for it, so the CAT with…
Descriptors: Monte Carlo Methods, Distance Education, Adaptive Testing, Intelligent Tutoring Systems
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Chang, Wen-Chih; Yang, Hsuan-Che; Shih, Timothy K.; Chao, Louis R. – International Journal of Distance Education Technologies, 2009
E-learning provides a convenient and efficient way for learning. Formative assessment not only guides student in instruction and learning, diagnose skill or knowledge gaps, but also measures progress and evaluation. An efficient and convenient e-learning formative assessment system is the key character for e-learning. However, most e-learning…
Descriptors: Electronic Learning, Student Evaluation, Formative Evaluation, Educational Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Ruecker, Stan; Given, Lisa M.; Sadler, Elizabeth; Ruskin, Andrea; Simpson, Heather – Visible Language, 2007
This paper examines inclusive design delivery through interface design, with a particular focus on access to healthcare resources for seniors. The goal of the project was to examine how seniors are able to access drug information using two different online systems. In the existing retrieval system, pills are identified using a standard search…
Descriptors: Older Adults, Patients, Drug Use, Identification