NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Osten, Elizabeth T. – ProQuest LLC, 2023
Interpersonal connectedness (IC) is an essential social function across life but is critical for young children. IC begins at birth and is vital to emerging physiological and affect regulation, attachment, communication, and cognition. IC occurs through dynamic interactive behavioral coordination, resulting in an embodied dyadic state of shared…
Descriptors: Parent Child Relationship, Mothers, Preschool Children, Autism Spectrum Disorders
Jiawen Zhu – ProQuest LLC, 2021
Social media with diverse functionalities enables people to communicate, make connections, exchange information, and transfer knowledge without time and location restrictions. The number of informal learning communities based on social media is growing, but the knowledge about how these communities work is still limited. Three main issues for…
Descriptors: Social Media, Informal Education, Communities of Practice, Web Sites
Elizabeth Ann Berger – ProQuest LLC, 2019
This research revealed promising results by merging old principles to new approaches in visual design education. Initial empirical analysis of participants who tested the "mDes" application applying four of the principles of design in comparison to conventional methodologies showed the most significant results of retention for the…
Descriptors: Handheld Devices, Computer Oriented Programs, Visual Literacy, Graphic Arts
Peyton, Tamara Shirlene – ProQuest LLC, 2016
Developing and delivering contextually-sensitive user experiences in sociotechnical systems which are geared at helping lower-income women manage their pregnancies requires understanding the human, technological, and the sociotechnical perspectives that are embedded in the mediation of the experience. Yet most digital systems and tools for…
Descriptors: Relevance (Education), Low Income Groups, Females, Pregnancy
Xie, Jing – ProQuest LLC, 2012
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Descriptors: Computer Software, Computer Security, Programming, Interaction