Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 61 |
Descriptor
Computer System Design | 62 |
Computer Software | 52 |
Information Technology | 30 |
Programming | 20 |
Computer Software Evaluation | 17 |
Internet | 15 |
Computer Security | 11 |
Models | 10 |
Computer Networks | 9 |
Information Systems | 9 |
Case Studies | 8 |
More ▼ |
Source
ProQuest LLC | 61 |
Author
Ahn, Jae-wook | 1 |
Ali, Qasim | 1 |
Alodhaibi, Khalid | 1 |
Amin, Rohan Mahesh | 1 |
An, Ho | 1 |
Bao, Xiaowei | 1 |
Batcheller, Archer L. | 1 |
Benton, Morgan C. | 1 |
Bitton, Ephrat | 1 |
Black, August | 1 |
Boxwell, Stephen A. | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 62 |
Reports - Research | 1 |
Education Level
Higher Education | 10 |
Adult Education | 5 |
Elementary Secondary Education | 3 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Audience
Location
United States | 3 |
Bangladesh | 1 |
Indiana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Iannotti, Nicholas V. – ProQuest LLC, 2013
The last several years have seen unprecedented advancements in the application of technology to the life sciences, particularly in the area of data generation. Novel scientific insights are now often driven primarily by software development supporting new multidisciplinary and increasingly multifaceted data analysis. However, despite the…
Descriptors: Biological Sciences, Computer Software, Computer System Design, Recycling
Seyed, Ali Patrice – ProQuest LLC, 2012
The Open Biomedical Ontology (OBO) Foundry initiative is a collaborative effort for developing interoperable, science-based ontologies. The Basic Formal Ontology (BFO) serves as the upper ontology for the domain-level ontologies of OBO. BFO is an upper ontology of types as conceived by defenders of realism. Among the ontologies developed for OBO…
Descriptors: Evaluation Criteria, Computer Software, Expertise, Programming
Kramer, Aleksey – ProQuest LLC, 2013
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
Descriptors: Computer Software, Computer Security, Information Technology, Demography
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Kharabe, Amol T. – ProQuest LLC, 2012
Over the last two decades, firms have operated in "increasingly" accelerated "high-velocity" dynamic markets, which require them to become "agile." During the same time frame, firms have increasingly deployed complex enterprise systems--large-scale packaged software "innovations" that integrate and automate…
Descriptors: Computer Software, Computer System Design, Innovation, Organizational Effectiveness
Khoury, Fadi E. – ProQuest LLC, 2012
Data centric applications, an important effort of software development in large organizations, have been mostly adopting a software methodology, such as a waterfall or Rational Unified Process, as the framework for its development. These methodologies could work on structural, procedural, or object oriented based applications, but fails to capture…
Descriptors: Computer Software, Computer System Design, Data, Computer Oriented Programs
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Kaveh, Payman – ProQuest LLC, 2010
With the increasing role that software systems play in our daily lives, software quality has become extremely important. Software quality is impacted by the efficiency of the software testing process. There are a growing number of software testing methodologies, models, and initiatives to satisfy the need to improve software quality. The main…
Descriptors: Grounded Theory, Computer Software, Information Seeking, Decision Making
Malaika, Majid A. – ProQuest LLC, 2011
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Descriptors: Internet, Programming, Automation, Methods
Black, August – ProQuest LLC, 2011
The research presented in this dissertation studies and describes how technical standards, protocols, and application programming interfaces (APIs) shape the aesthetic, functional, and affective nature of our most dominant mode of online communication, the World Wide Web (WWW). I examine the politically charged and contentious battle over browser…
Descriptors: Internet, Web Browsers, Standards, Economic Factors
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Gomillion, David – ProQuest LLC, 2013
In information systems development, end-users have shifted in their role: from consumers of information to informants for requirements to developers of systems. This shift in the role of users has also changed how information systems are developed. Instead of systems developers creating specifications for software or end-users creating small…
Descriptors: Information Systems, Computer Software, Efficiency, Performance
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration