Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 36 |
Descriptor
Information Systems | 36 |
Computer Software | 32 |
Information Technology | 16 |
Models | 14 |
Computer System Design | 9 |
Internet | 7 |
Computer Software Evaluation | 5 |
Program Effectiveness | 5 |
Programming | 5 |
Business | 4 |
Case Studies | 4 |
More ▼ |
Source
ProQuest LLC | 36 |
Author
Adkins, Joni K. | 1 |
Benton, Morgan C. | 1 |
Claybaugh, Craig C. | 1 |
DeSerranno, Allen Ronald | 1 |
Dutt, Abhijit | 1 |
Fryling, Meg | 1 |
Gendreau, Audrey | 1 |
Golikov, Steven | 1 |
Gomillion, David | 1 |
Harlan, Jennifer | 1 |
Hu, Zhen | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 36 |
Education Level
Adult Education | 3 |
Higher Education | 3 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United States | 2 |
Indiana | 1 |
New York | 1 |
Pennsylvania | 1 |
South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Mark S. Kim – ProQuest LLC, 2021
The late Paul Gray was a pioneer in the research tradition of IS education and curriculum (Gorgone and Gray 1999). Recently, the joint ACM/AIS IS2020 Task force published a new "Competency Model" to improve and update the IS curriculum (Leidig and Anderson 2020). This dissertation contributes to this research tradition by introducing a…
Descriptors: Information Systems, Computer Science Education, Digital Literacy, Skill Development
DeSerranno, Allen Ronald – ProQuest LLC, 2017
Internet of Things ("IoT") systems are complex, asynchronous solutions often comprised of various software and hardware components developed in isolation of each other. These components function with different degrees of reliability and performance over an inherently unreliable network, the Internet. Many IoT systems are developed within…
Descriptors: Computer Software, Internet, Computer Networks, Engineering
Hu, Zhen – ProQuest LLC, 2017
The Detection of surgical adverse events has become increasingly important with the growing demand for quality improvement and public health surveillance with surgery. Event reporting is one of the key steps in determining the impact of postoperative complications from a variety of perspectives and is an integral component of improving…
Descriptors: Surgery, Health Services, Safety, Medical Evaluation
Toure, Ibrahim – ProQuest LLC, 2017
Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…
Descriptors: Data Analysis, Prediction, Terrorism, Risk
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Golikov, Steven – ProQuest LLC, 2013
Data integration is a critical component of enterprise system integration, and XML data validation is the foundation for sound data integration of XML-based information systems. Since B2B e-commerce relies on data validation as one of the critical components for enterprise integration, it is imperative for financial industries and e-commerce…
Descriptors: Information Systems, Computer Software, Syntax, Semantics
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Xiao, Xiao – ProQuest LLC, 2013
Due to their low cost of implementation and considerable elasticity, cloud-based IT solutions are being widely adopted or considered in organizations across various industries. However, such IT solutions bring forth several unique challenges--challenges that make it difficult for organizations to achieve successful utilization of cloud-based…
Descriptors: Information Technology, Adoption (Ideas), Information Systems, Nonprofit Organizations
Huang, Jia – ProQuest LLC, 2014
Information retrieval (IR) systems have tremendously broaden users' access to information. However, users need to select their needs from trillions of information indexed daily. Due to the "semantic gap" between queries and indexed terms in IR system, whether users can satisfy their needs depends on whether they use the correct terms as…
Descriptors: Information Retrieval, Information Needs, Documentation, Information Systems
Tripp, John F. – ProQuest LLC, 2012
Agile Information Systems Development Methods have emerged in the past decade as an alternative manner of managing the work and delivery of information systems development teams, with a large number of organizations reporting the adoption & use of agile methods. The practitioners of these methods make broad claims as to the benefits of their…
Descriptors: Information Systems, Delivery Systems, Computer Software, Programming
Harlan, Jennifer – ProQuest LLC, 2013
Knowledge management has proven to be a sustainable competitive advantage for many organizations. Knowledge management systems are abundant, with multiple functionalities. The literature reinforces the use of workflow automation with knowledge management systems to benefit organizations; however, it was not known if process automation yielded…
Descriptors: Automation, Case Studies, Knowledge Management, Computer Software
Tran, Kiet T. – ProQuest LLC, 2012
This study examined the relationship between information technology (IT) governance and software reuse success. Software reuse has been mostly an IT problem but rarely a business one. Studies in software reuse are abundant; however, to date, none has a deep appreciation of IT governance. This study demonstrated that IT governance had a positive…
Descriptors: Computer Software, Models, Success, Information Systems