NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Hemenway, Bradley Keith – ProQuest LLC, 2018
Misconceptions on affordability remain a barrier to postsecondary access for millions of potential students. When students recognize financial aid availability during secondary school years, they gain the capability to better establish a curricular path that aligns with postsecondary aspirations. This dissertation assesses the use of…
Descriptors: Access to Information, Student Financial Aid, Student Costs, High School Students
Argov, Sharon R. – ProQuest LLC, 2017
Sense-making theory involves a sociological/communications science approach to the need of students to make sense of their environment and the information they are seeking to find. With many digital resources to choose from, non-traditional students often have difficulty finding the best resource for their assignments, opting for the easiest path…
Descriptors: Information Seeking, Student Behavior, Nontraditional Students, Self Esteem
Yu, Pulan – ProQuest LLC, 2012
Classification, clustering and association mining are major tasks of data mining and have been widely used for knowledge discovery. Associative classification mining, the combination of both association rule mining and classification, has emerged as an indispensable way to support decision making and scientific research. In particular, it offers a…
Descriptors: Databases, Classification, Data Collection, Chemistry
Kennedy, Lynn M. – ProQuest LLC, 2013
This dissertation is a study of the impact of federal legislative proposals considered between 1997 and 2004 that offer protection to databases. It investigates the effect that the proposals had on the balance between the economic interests of owners and the right of the public to unfettered access to information. This identified legislation…
Descriptors: Federal Legislation, Copyrights, Laws, Databases
Lin, Yi-Ling – ProQuest LLC, 2013
This dissertation focuses on investigating whether users will locate desired images more efficiently and effectively when they are provided with information descriptors from both experts and the general public. This study develops a way to support image finding through a human-computer interface by providing subject headings and social tags about…
Descriptors: Information Science, Users (Information), Information Retrieval, Access to Information
Bhatia, Sumit – ProQuest LLC, 2013
Online discussion forums have become popular in recent times. They provide a platform for people from different parts of the world sharing a common interest to come together and topics of mutual interest and seek solutions to their problems. There are hundreds of thousands of internet forums containing tens of millions of discussion threads and…
Descriptors: Access to Information, Computer Mediated Communication, Discussion Groups, Internet
Gao, Jinglun – ProQuest LLC, 2012
This thesis work is mainly focused on two problems related to improving accessibility of information graphics for visually impaired users. The first problem is automated analysis of information graphics for information extraction and the second problem is multi-modal representations for accessibility. Information graphics are graphical…
Descriptors: Visual Aids, Users (Information), User Needs (Information), Visual Impairments
Velez, Olivia – ProQuest LLC, 2011
Midwives in Ghana provide the majority of rural primary and maternal healthcare services, but have limited access to data for decision making and knowledge work. Few mobile health (mHealth) applications have been designed for midwives. The study purpose was to design and test an mHealth application (mClinic) that can improve data access and reduce…
Descriptors: Family Planning, Participant Observation, Self Efficacy, Testing
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business