Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 30 |
Descriptor
Computer Software | 30 |
Computers | 30 |
Information Technology | 11 |
Internet | 8 |
Computer Security | 7 |
Educational Technology | 7 |
Correlation | 5 |
Programming | 5 |
Universities | 5 |
Computer Science | 4 |
Information Security | 4 |
More ▼ |
Source
ProQuest LLC | 30 |
Author
Publication Type
Dissertations/Theses -… | 30 |
Education Level
Higher Education | 6 |
Elementary Secondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Grade 5 | 1 |
High Schools | 1 |
Kindergarten | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mohammad Mahdi Amanzadeh – ProQuest LLC, 2022
The overarching theme of this research project is to build a machine-accessible and mathematically precise abstraction of human body movement through experiments in programming an articulated puppet that imitates the human body structure and mobility within a "Real-Time Interactive Computer Animation" (RTICA). Human movement has been the…
Descriptors: Motion, Human Body, Programming, Man Machine Systems
Mark S. Kim – ProQuest LLC, 2021
The late Paul Gray was a pioneer in the research tradition of IS education and curriculum (Gorgone and Gray 1999). Recently, the joint ACM/AIS IS2020 Task force published a new "Competency Model" to improve and update the IS curriculum (Leidig and Anderson 2020). This dissertation contributes to this research tradition by introducing a…
Descriptors: Information Systems, Computer Science Education, Digital Literacy, Skill Development
Thomas Conmy – ProQuest LLC, 2023
The purpose of this meta-analysis was to investigate the effectiveness of the use of games as part of mathematics instruction on academic achievement in grades Kindergarten to 12 in the United States. There were 17 studies selected for investigation published from 2010 to 2023 that focused on game-based learning and mathematics. This meta-analysis…
Descriptors: Meta Analysis, Mathematics Instruction, Game Based Learning, Learning Management Systems
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Adamo, Oluwayomi – ProQuest LLC, 2011
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Descriptors: Coding, Technology, Error Correction, Computer Software
Paquet, Katherine G. – ProQuest LLC, 2013
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Descriptors: Internet, Computer Software, Computers, Information Technology
Manzano, Debbie L. – ProQuest LLC, 2012
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…
Descriptors: Information Security, Behavior, Safety, Statistical Analysis
Cangiano, Gaston R. – ProQuest LLC, 2011
It was just a generation ago that computers entered the workplace. Back then, they only "represented" the work we did, nothing else. But today, some sort of computing device is involved in how we play, how we communicate, how we get our news and of course, how we work. What this means is that today almost all aspects of our lives are "represented"…
Descriptors: Computers, Memory, Activities, Ethnography
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Adkins, Joni K. – ProQuest LLC, 2011
Numerous studies have shown that spreadsheets used in companies often have errors which may affect the quality of the decisions made with these tools. Many businesses are unaware or choose to ignore the risks associated with spreadsheet use. The intent of this study was to learn more about the characteristics of spreadsheet end user developers,…
Descriptors: Structural Equation Models, Self Efficacy, Computer Software, Problem Solving
Strickland, LaVada A. – ProQuest LLC, 2011
A long-standing question in educational research and policy discussion turns on whether technology-based instruction can improve academic performance. Finding a convincing answer to this question is important because school systems across the country have invested and continue to invest very large sums on new instructional hardware and software.…
Descriptors: Educational Research, Educational Objectives, Outcomes of Education, Mathematics Tests
Vee, Annette – ProQuest LLC, 2010
This dissertation looks at computer programming through the lens of literacy studies, building from the concept of code as a written text with expressive and rhetorical power. I focus on the intersecting technological and social factors of computer code writing as a literacy--a practice I call "proceduracy". Like literacy, proceduracy is a human…
Descriptors: Computer Software, Computers, Programming, Foreign Countries
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Feller, Andrew Lee – ProQuest LLC, 2010
Rapid growth in eBusiness has made industry and commerce increasingly dependent on the hardware and software infrastructure that enables high-volume transaction processing across the Internet. Large transaction volumes at major industrial-firm data centers rely on robust transaction protocols and adequately provisioned hardware capacity to ensure…
Descriptors: Industry, Internet, Computer Uses in Education, Simulation
Previous Page | Next Page ยป
Pages: 1 | 2