NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Fanning, Elizabeth; Bunch, John; Brighton, Catherine – International Journal on E-Learning, 2011
The purpose of this study was to compare the production processes and approaches for user engagement of virtual environments created for learning or commercial and entertainment purposes, specifically through online games and 3-D online spaces. This study used a qualitative, multiple case study approach based on interviews with developers of…
Descriptors: Advertising, Observation, Virtual Classrooms, Innovation
Freifeld, Lorri – Training, 2010
With technology changing every second of every day, it is no surprise a learning management system (LMS) quickly can become outdated. But it is no easy task to re-engineer a current LMS or find exactly the right new one to purchase. In this article, three 2010 Top Young Trainers share their experiences with implementing or re-engineering an…
Descriptors: Barriers, Database Management Systems, Program Implementation, Performance Technology
Anderson, George W. – ProQuest LLC, 2010
The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…
Descriptors: Program Effectiveness, Statistical Analysis, Transformational Leadership, Information Technology
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change