Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 22 |
Descriptor
Costs | 22 |
Computer Software | 21 |
Information Technology | 9 |
Correlation | 6 |
Decision Making | 5 |
Information Security | 5 |
Computer Security | 4 |
Models | 4 |
Program Effectiveness | 4 |
Statistical Analysis | 4 |
Administrator Attitudes | 3 |
More ▼ |
Source
ProQuest LLC | 22 |
Author
Publication Type
Dissertations/Theses -… | 22 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Two Year Colleges | 3 |
Adult Education | 1 |
Audience
Location
California | 2 |
Nevada | 1 |
New York | 1 |
Oman | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dewar, Cynthia – ProQuest LLC, 2023
This study examined California Community Colleges' administrator decisions about online proctoring software during the COVID-19 global pandemic between March 2020 and June 2022. Understanding how decisions were made, by whom, what information was considered, and how information was evaluated can support more informed decision making regarding…
Descriptors: Community Colleges, Computer Software, Computer Assisted Testing, COVID-19
Johnson-Huber, Cariann – ProQuest LLC, 2021
Background: Today's healthcare organizations face financial and educational challenges of sustaining electronic medical record (EMR) advancements and regulatory reporting mandates. One such mandate is providing EMR education in the Operating Room (OR) setting to support reporting compliance and patient safety. Local Problem: At a multi-state…
Descriptors: Accuracy, Video Technology, Medical Education, Nursing Education
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Moy, Mae N. – ProQuest LLC, 2016
Despite the use of earned value management (EVM) techniques to track development progress, federal information (IT) software programs continue to fail by not meeting identified business requirements. The purpose of this logistic regression study was to examine, using IT software data from federal agencies from 2011 to 2014, whether a relationship…
Descriptors: Federal Programs, Information Technology, Program Evaluation, Computer Software
Smith, Marcus L., Jr. – ProQuest LLC, 2016
During its infancy, the cloud computing industry was the province largely of small and medium-sized business customers. Despite their size, these companies required a professionally run, yet economical information technology (IT) operation. These customers used a total value strategy whereby they avoided paying for essential, yet underutilized,…
Descriptors: Decision Making, Administrator Attitudes, Information Technology, Computer Software
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Elleh, Festus U. – ProQuest LLC, 2013
This study investigated the relationship between software-enabled project management techniques and the triple constraints (time, cost, and scope). There was the dearth of academic literature that focused on the relationship between software-enabled project management techniques and the triple constraints (time, cost, and scope). Based on the gap…
Descriptors: Computer Software, Program Administration, Online Surveys, Administrator Attitudes
ElMessiry, Adel Magdi – ProQuest LLC, 2016
Complaining is a fundamental human characteristic that has prevailed throughout the ages. We normally complain about something that went wrong. Patient complaints are no exception; they focus on problems that occurred during the episode of care. The Institute of Medicine estimated that each year thousands of patients die due to medical errors. The…
Descriptors: Patients, Health Services, Medical Services, Hospitals
Gawali, Ajay R. – ProQuest LLC, 2012
Software maintenance and support costs account for up to 60% of the overall software life cycle cost and often burdens tightly budgeted information technology (IT) organizations. Agile software development approach delivers business value early, but implications on software maintainability are still unknown. The purpose of this quantitative study…
Descriptors: Computer Software, Maintenance, Statistical Analysis, Development
Al Mezeini, Khamis Abdallah – ProQuest LLC, 2017
Background: Obstructive sleep apnea (OSA) is chronic disorder that contributes to multiple physiological and psychological conditions. Obstructive sleep apnea contributes to high rates of morbidity and mortality and has substantial impacts on both health care costs and the quality of life for affected individuals and their families. Healthcare…
Descriptors: Sleep, Intervention, Foreign Countries, Physiology
Malaika, Majid A. – ProQuest LLC, 2011
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Descriptors: Internet, Programming, Automation, Methods
Lahiri, Atanu – ProQuest LLC, 2010
This dissertation consists of three essays that examine, in three specific contexts, issues related to pricing of information goods and services. As the ability to measure technology resource usage gets easier with increased connectivity, the question whether a technology resource should be priced by the amount of the resource used or by the…
Descriptors: Costs, Fees, Information Technology, Telecommunications
Manzano, Debbie L. – ProQuest LLC, 2012
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…
Descriptors: Information Security, Behavior, Safety, Statistical Analysis
Gupta, Manish – ProQuest LLC, 2011
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…
Descriptors: Information Technology, Computer Security, Organizations (Groups), Global Approach
Samuels, Jeffrey D. – ProQuest LLC, 2013
Computer-Assisted Language Learning (CALL) is an established field of academic inquiry with distinct applications for second language teaching and learning. Many CALL professionals direct language labs or language resource centers (LRCs) in which CALL software applications and generic software applications support language learning programs and…
Descriptors: Computer Assisted Instruction, Second Language Learning, Second Language Instruction, Computer Software Selection
Previous Page | Next Page ยป
Pages: 1 | 2