Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 17 |
Descriptor
Armed Forces | 17 |
Information Technology | 17 |
Computer Security | 5 |
Qualitative Research | 5 |
Military Personnel | 4 |
Statistical Analysis | 4 |
Case Studies | 3 |
Constructivism (Learning) | 3 |
Decision Making | 3 |
Industry | 3 |
Interviews | 3 |
More ▼ |
Source
ProQuest LLC | 17 |
Author
Publication Type
Dissertations/Theses -… | 17 |
Education Level
Adult Education | 1 |
Postsecondary Education | 1 |
Audience
Location
California | 1 |
District of Columbia | 1 |
Maryland | 1 |
Tennessee | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Arielle A. Gaither – ProQuest LLC, 2021
Bag-of-words is a commonly used text representation method for many text classification applications. However, bag-of-words representation fails to consider the context of the text because it only examines text documents based on the presence of individual words and explores relationships between texts with similar word choices (Bengfort, 2018).…
Descriptors: Journal Articles, Classification, Language Usage, Databases
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Schneider, Jacquelyn – ProQuest LLC, 2017
Over the last twenty years, the digital technologies of the information revolution have fundamentally impacted the nature of modern warfare and introduced significant uncertainty about capabilities, intentions, and the limits of conflict. How do these digital advances and the explosion of cyber technologies on and off the battlefield impact…
Descriptors: Information Technology, National Security, Incentives, Armed Forces
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Moreland, James D., Jr – ProQuest LLC, 2013
This research investigates the instantiation of a Service-Oriented Architecture (SOA) within a hard real-time (stringent time constraints), deterministic (maximum predictability) combat system (CS) environment. There are numerous stakeholders across the U.S. Department of the Navy who are affected by this development, and therefore the system…
Descriptors: Information Technology, Client Server Architecture, Armed Forces, Readiness
Allen, Ronald Timothy – ProQuest LLC, 2014
Automated Logistics Environment (ALE) is a new term used by Navy and aerospace industry executives to describe the aggregate of logistics-related information systems that support modern aircraft weapon systems. The development of logistics information systems is not always well coordinated among programs, often resulting in solutions that cannot…
Descriptors: Administrators, Experience, Automation, Information Systems
Delaquis, Richard Serge – ProQuest LLC, 2012
The Clinger Cohen Act of 1996 requires that all major Federal Government Information Technology (IT) systems prepare an Enterprise Architecture prior to IT acquisitions. Enterprise Architecture, like house blueprints, represents the system build, capabilities, processes, and data across the enterprise of IT systems. Enterprise Architecture is used…
Descriptors: Human Resources, Information Technology, Information Management, Federal Government
Hickman, Linnel W., Jr. – ProQuest LLC, 2017
The purpose of this qualitative interpretive phenomenological analysis (IPA) study was to understand how white collar African American male senior executives within the defense industry contractor IT organizations make sense of their career advancement into senior management positions. The 12 African American males that participated in this study…
Descriptors: Career Development, African Americans, Males, African American Leadership
Manzano, Sancho J., Jr. – ProQuest LLC, 2012
Empirical studies have been conducted on what is known as end-user computing from as early as the 1980s to present-day IT employees. There have been many studies on using quantitative instruments by Cotterman and Kumar (1989) and Rockart and Flannery (1983). Qualitative studies on end-user computing classifications have been conducted by…
Descriptors: Mixed Methods Research, Satisfaction, Computer Use, Military Personnel
Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies
Herring, Terry W. – ProQuest LLC, 2012
Since the attacks on September 11, 2001, a major transformation of the United States Army began to create a modular, scalable, and modernized military force. This effort was the most significant restructuring of military forces in the last 80 years. However, after 6 years of sustained combat operations in the Middle East many of the collaboration…
Descriptors: Armed Forces, Qualitative Research, Phenomenology, Military Personnel
Webb, James O., Jr. – ProQuest LLC, 2012
There is a perception that there are risks and benefits associated with the use of online social networking media within a military organization. This research study explored this perception by investigating how employees use social networking applications and their perceptions of the benefits they receive. The study also assessed the measures…
Descriptors: Grounded Theory, Risk, Social Networks, Computer Mediated Communication
Haley, M. – ProQuest LLC, 2013
The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…
Descriptors: Manufacturing, Information Technology, Armed Forces, Aerospace Education
Cherry, John D. – ProQuest LLC, 2010
According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…
Descriptors: Quasiexperimental Design, Social Behavior, Program Effectiveness, Social Change
O'Malley, Kevin Dermit – ProQuest LLC, 2010
Centralized customer support is an established industry method used to improve revenue and profitability. What remains unknown is whether this cost-saving commercial business practice is similarly applicable to the unique, often isolated military environment. This research study statistically tested a theoretical framework for knowledge management…
Descriptors: Financial Policy, Business, Economic Factors, Consumer Economics
Previous Page | Next Page ยป
Pages: 1 | 2