Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Technology | 5 |
Computer Science | 3 |
Bias | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
Teaching Methods | 2 |
Achievement Gains | 1 |
Barriers | 1 |
Brain | 1 |
Coding | 1 |
Cognitive Processes | 1 |
More ▼ |
Source
ProQuest LLC | 5 |
Publication Type
Dissertations/Theses -… | 5 |
Education Level
Postsecondary Education | 2 |
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alannah Oleson – ProQuest LLC, 2023
To realize more equitable technology futures, it is not enough to simply adapt technology to be more inclusive "after" it is created. We will also need to equip technology creators with the skills they need to critically reflect upon bias and exclusion "during" the technology design process. The question of how to best to…
Descriptors: Computation, Computer Science Education, Inclusion, Decision Making
Kimberly A. Mayer – ProQuest LLC, 2020
This action research study explored how women perceived the influences of collaborative software development methodologies on workplace culture at one financial technology firm. While collaborative software development methodologies were not designed to increase gender diversity, the transformational shifts in the way technology teams work…
Descriptors: Employed Women, Technology, Computer Software, Cooperation
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers