NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Caroline D. Hardin – ProQuest LLC, 2019
Hackathons, the time-bound collaborative project-based competitions increasingly popular with undergraduate CS students, are both transformative and problematic. On one hand, they are unique opportunities to apply skills learned in the classroom to real-world, interest driven projects that celebrate risk taking, collaboration, and playfulness. On…
Descriptors: Undergraduate Students, Computer Science Education, Programming, Group Activities
Abedtash, Hamed – ProQuest LLC, 2017
Precision medicine refers to the delivering of customized treatment to patients based on their individual characteristics, and aims to reduce adverse events, improve diagnostic methods, and enhance the efficacy of therapies. Among efforts to achieve the goals of precision medicine, researchers have used observational data for developing predictive…
Descriptors: Medical Evaluation, Records (Forms), Patients, Information Technology
Okongo, James – ProQuest LLC, 2014
The failure rate of information technology (IT) development projects is a significant concern for today's organizations. Perceptions of IT project risk and project performance have been identified as important factors by scholars studying the topic, and Wallace, Keil, and Rai (2004a) developed a survey instrument to measure how dimensions of…
Descriptors: Information Technology, Computer Software, Risk, Performance
Taft, Laritza M. – ProQuest LLC, 2010
In its report "To Err is Human", The Institute of Medicine recommended the implementation of internal and external voluntary and mandatory automatic reporting systems to increase detection of adverse events. Knowledge Discovery in Databases (KDD) allows the detection of patterns and trends that would be hidden or less detectable if analyzed by…
Descriptors: Pregnancy, Risk, Patients, Program Effectiveness
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis