Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 22 |
Descriptor
Computer Software | 22 |
Privacy | 22 |
Computer Security | 10 |
Information Security | 9 |
Information Technology | 5 |
Case Studies | 4 |
Crime | 4 |
Program Effectiveness | 4 |
Accuracy | 3 |
Artificial Intelligence | 3 |
Barriers | 3 |
More ▼ |
Source
ProQuest LLC | 22 |
Author
Publication Type
Dissertations/Theses -… | 22 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Kindergarten | 1 |
Two Year Colleges | 1 |
Audience
Location
California | 1 |
Minnesota | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Andrea E. Green – ProQuest LLC, 2024
No solution can ultimately eliminate cheating in online courses. However, universities reserve funding for authentication systems to minimize the threat of cheating in online courses. Most higher education institutions use a combination of authentication methods to secure systems against impersonation attacks during online examinations.…
Descriptors: College Students, Cheating, Online Courses, Intervention
Xuandong Zhao – ProQuest LLC, 2024
The rapid advancement of powerful Large Language Models (LLMs), such as ChatGPT and Llama, has revolutionized the world by bringing new creative possibilities and enhancing productivity. However, these advancements also pose significant challenges and risks, including the potential for misuse in the form of fake news, academic dishonesty,…
Descriptors: Computational Linguistics, Intellectual Property, Artificial Intelligence, Productivity
Alison Eber – ProQuest LLC, 2022
The purpose of this qualitative study was to explore how elementary teachers use different social media platforms to connect with other teachers for informal professional learning. The researcher sought to understand how elementary teachers decide which platform(s) to use and how their expectations vary among different social media platforms.…
Descriptors: Social Media, Faculty Development, Informal Education, Teacher Attitudes
Barry J. Bailey – ProQuest LLC, 2021
Learning analytics systems are software designed to aggregate student data to be analyzed for the purpose of delivering information to students, with the goal of increasing student success, academic goal completion, and retention. Despite being identified as stakeholders and beneficiaries of learning analytics, student perceptions make up a small…
Descriptors: Community College Students, Student Attitudes, Learning Analytics, Ethics
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Gloria Ashiya Katuka – ProQuest LLC, 2024
Dialogue act (DA) classification plays an important role in understanding, interpreting and modeling dialogue. Dialogue acts (DAs) represent the intended meaning of an utterance, which is associated with the illocutionary force (or the speaker's intention), such as greetings, questions, requests, statements, and agreements. In natural language…
Descriptors: Dialogs (Language), Classification, Intention, Natural Language Processing
Sanjana Gautam – ProQuest LLC, 2024
Adaptive learning systems aim to emulate how skilled educators provide every student with the best possible learning experience. We investigate how these systems might be enriched by incorporating activities and indicators of social learning, which focus on the influences of learners' social context and interactions. This doctoral research aims to…
Descriptors: Intelligent Tutoring Systems, Artificial Intelligence, Computer Software, Rating Scales
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Antony, Laljith – ProQuest LLC, 2016
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Descriptors: Computer Software, Qualitative Research, Case Studies, Information Security
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Owens, Rodney – ProQuest LLC, 2013
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…
Descriptors: Computer Software, Risk, Handheld Devices, Information Technology
Beadnell, Stephen Allen – ProQuest LLC, 2014
The banking industry is being challenged by shareholders and consumers to provide its products in the most efficient manner, provide good customer service, and earn a fair profit. Although the infrastructure is in place to serve most customers through Internet banking, the number of customers using this channel is less than expected. The purpose…
Descriptors: Case Studies, Banking, Computer Software, Internet
Adeyeye, Adebisi – ProQuest LLC, 2015
Electronic medical record (EMR) use has improved significantly in health care organizations. However, many barriers and factors influence the success of EMR implementation and adoption. The purpose of the descriptive qualitative single-case study was to explore health care professionals' perceptions of the use of EMRs at a hospital division of a…
Descriptors: Records (Forms), Allied Health Personnel, Hospitals, Information Storage
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Harlan, Jennifer – ProQuest LLC, 2013
Knowledge management has proven to be a sustainable competitive advantage for many organizations. Knowledge management systems are abundant, with multiple functionalities. The literature reinforces the use of workflow automation with knowledge management systems to benefit organizations; however, it was not known if process automation yielded…
Descriptors: Automation, Case Studies, Knowledge Management, Computer Software
Previous Page | Next Page ยป
Pages: 1 | 2