Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Computer System Design | 6 |
| Design Preferences | 3 |
| Internet | 3 |
| Models | 3 |
| Preferences | 3 |
| Case Studies | 2 |
| Comparative Analysis | 2 |
| Electronic Learning | 2 |
| Health Services | 2 |
| Information Technology | 2 |
| Programming | 2 |
| More ▼ | |
Source
| ProQuest LLC | 6 |
Author
| AL Faresi, Ahmed | 1 |
| Alodhaibi, Khalid | 1 |
| Fuller, Nathaniel J. | 1 |
| Mallchok, Malia M. | 1 |
| Mattord, Herbert J. | 1 |
| Sun, Yu-Lin | 1 |
Publication Type
| Dissertations/Theses -… | 6 |
Education Level
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Grade 2 | 1 |
| Grade 5 | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Taiwan | 1 |
Laws, Policies, & Programs
| Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mallchok, Malia M. – ProQuest LLC, 2017
The purpose of this qualitative design case study was to determine the design elements that can lead to technology acceptance of a mobile multimedia tour at an informal historical site. Using rapid prototyping, a tour prototype was developed using a low-cost Website building platform. The tour was then tested with thirteen participants in two…
Descriptors: Multimedia Materials, Electronic Learning, Qualitative Research, Historic Sites
Fuller, Nathaniel J. – ProQuest LLC, 2014
The usability of Identity Management (IdM) systems is highly dependent upon design that simplifies the processes of identification, authentication, and authorization. Recent findings reveal two critical problems that degrade IdM usability: (1) unfeasible techniques for managing various digital identifiers, and (2) ambiguous security interfaces.…
Descriptors: Models, Usability, Database Management Systems, Computer System Design
Mattord, Herbert J. – ProQuest LLC, 2012
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Descriptors: Internet, Electronic Learning, Comparative Analysis, Benchmarking
Alodhaibi, Khalid – ProQuest LLC, 2011
Recommender systems aim to support users in their decision-making process while interacting with large information spaces and recommend items of interest to users based on preferences they have expressed, either explicitly or implicitly. Recommender systems are increasingly used with product and service selection over the Internet. Although…
Descriptors: Information Processing, Decision Support Systems, Decision Making, Preferences
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Sun, Yu-Lin – ProQuest LLC, 2010
The Chinese writing system has traditionally organized the typographic text vertically, with one square-shaped character placed on top of another. With the influence of globalization, an increasing number of reading materials have been presented in the Western horizontal format, including school textbooks for children in Taiwan. This study looked…
Descriptors: Foreign Countries, Reading Materials, Textbooks, Written Language

Direct link
