Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 10 |
Descriptor
Behavior Patterns | 10 |
Prediction | 10 |
Correlation | 5 |
Models | 5 |
Information Technology | 3 |
Algorithms | 2 |
Case Studies | 2 |
Cognitive Processes | 2 |
Computer Software | 2 |
Conceptual Tempo | 2 |
Information Security | 2 |
More ▼ |
Source
ProQuest LLC | 10 |
Author
Bui, Ngot P. | 1 |
Halim, Joseph | 1 |
Harrison, Brynne | 1 |
Jennifer Hu | 1 |
Messina, Bryan Gregory | 1 |
Mitchell, Melissa Sue | 1 |
Mutchler, Leigh Ann | 1 |
Skinner, Ann | 1 |
Sungjin Nam | 1 |
Wilmer, Henry H. | 1 |
Publication Type
Dissertations/Theses -… | 10 |
Education Level
Higher Education | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Location
Kenya (Nairobi) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jennifer Hu – ProQuest LLC, 2023
Language is one of the hallmarks of intelligence, demanding explanation in a theory of human cognition. However, language presents unique practical challenges for quantitative empirical research, making many linguistic theories difficult to test at naturalistic scales. Artificial neural network language models (LMs) provide a new tool for studying…
Descriptors: Linguistic Theory, Computational Linguistics, Models, Language Research
Skinner, Ann – ProQuest LLC, 2018
Resource-based theory provided the theoretical foundation to investigate the extent that developer knowledge correlated to success of information technology (IT) development projects. Literature indicated there was a knowledge gap in understanding whether developer information system development, behavior and business knowledge contributed to IT…
Descriptors: Information Technology, Information Systems, Correlation, Prediction
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management
Sungjin Nam – ProQuest LLC, 2020
This dissertation presents various machine learning applications for predicting different cognitive states of students while they are using a vocabulary tutoring system, DSCoVAR. We conduct four studies, each of which includes a comprehensive analysis of behavioral and linguistic data and provides data-driven evidence for designing personalized…
Descriptors: Vocabulary Development, Intelligent Tutoring Systems, Student Evaluation, Learning Analytics
Wilmer, Henry H. – ProQuest LLC, 2017
Mobile electronic devices such as smartphones are playing an increasingly pervasive role in our daily activities. A growing body of literature is beginning to investigate how mobile technology habits might relate to individual differences in cognitive traits. The present study is an investigation into how individual differences in intertemporal…
Descriptors: Telecommunications, Handheld Devices, Correlation, Individual Differences
Messina, Bryan Gregory – ProQuest LLC, 2016
Alcohol consumption and related negative consequences continues to be a systemic societal problem. College students are a population that has been identified as particularly high risk for a number of negative consequences as they are more likely to engage in binge drinking and heavy episodic drinking even when compared to same age non-college…
Descriptors: Drinking, Health Behavior, Alcohol Abuse, College Students
Bui, Ngot P. – ProQuest LLC, 2016
The emergence of social networks and social media has resulted in exponential increase in the amount of data that link diverse types of richly structured digital objects e.g., individuals, articles, images, videos, music, etc. Such data are naturally represented as heterogeneous networks with multiple types of objects e.g., actors, video,…
Descriptors: Social Media, Social Networks, Data Analysis, Network Analysis
Halim, Joseph – ProQuest LLC, 2015
This single explorative case study investigated the causes of churn in the telecommunication industry in Kenya, narrowed down to include only the capital city of Nairobi. The question of this dissertation was split into three sub-questions. The first sub-question investigated the behavioral patterns of customers causing churn. The second…
Descriptors: Telecommunications, Industry, Foreign Countries, Case Studies
Mutchler, Leigh Ann – ProQuest LLC, 2012
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…
Descriptors: Role, Information Security, Online Surveys, Information Systems
Mitchell, Melissa Sue – ProQuest LLC, 2011
Cyberbullying takes place through the information technology that students access every day: cell phones, text messages, email, Internet messaging, social networks, pictures, and video clips. With the world paying more attention to this new form of bullying, scholars have been researching the topic in an attempt to learn more about this…
Descriptors: Video Technology, Gifted, Bullying, Academic Achievement