NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 18 results Save | Export
Higgins, Cynthia A. – ProQuest LLC, 2023
Workplaces increasingly have enlisted their subject matter experts to construct online, asynchronous slideware lessons with simplified authoring tools. However, these subject matter experts lack instructional design knowledge and often transfer in-person slide lessons to an online format with few modifications and assume learners automatically…
Descriptors: Instructional Design, Online Courses, Asynchronous Communication, Expertise
Loo, Michelle – ProQuest LLC, 2023
Based on the Technology Acceptance Model (TAM) (Davis et al., 1989), this research examines the variables of perceived usefulness and perceived ease of use as predictors of video creation usage after software training. To gain a comprehensive understanding of the technology adoption process, the study also employed the Learning Adoption Trajectory…
Descriptors: Value Judgment, Usability, Predictor Variables, Computer Software
LaMontagne, Liva G. – ProQuest LLC, 2023
Mindfulness apps have shown promise to reduce stress and improve well-being among college students however the mechanisms of these beneficial effects are less clear. In addition, findings are inconclusive about the necessary dose of mindfulness app usage to achieve improvements in mental health. Thus, more dose-response research is needed on…
Descriptors: College Students, Metacognition, Training, Computer Software
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Alves, Lisa Marie – ProQuest LLC, 2021
The purpose of this mixed-methods action research study was to increase the awareness and knowledge of secondary school professionals on dyslexia, including the role of the school-based speech-language pathologist. Two research questions guiding the quantitative data collection centered on the impact of a PowerPoint dyslexia training on the…
Descriptors: Secondary Schools, School Personnel, Knowledge Level, Dyslexia
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Jennifer Hu – ProQuest LLC, 2023
Language is one of the hallmarks of intelligence, demanding explanation in a theory of human cognition. However, language presents unique practical challenges for quantitative empirical research, making many linguistic theories difficult to test at naturalistic scales. Artificial neural network language models (LMs) provide a new tool for studying…
Descriptors: Linguistic Theory, Computational Linguistics, Models, Language Research
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Kiper, J. Richard – ProQuest LLC, 2013
For large organizations, updating instructional programs presents a challenge to keep abreast of constantly changing business processes and policies. Each time a process or policy changes, significant resources are required to locate and modify the training materials that convey the new content. Moreover, without the ability to track learning…
Descriptors: Computer Software, Knowledge Management, Instructional Systems, Instructional Design
Frost, Wende – ProQuest LLC, 2013
The speech of non-native (L2) speakers of a language contains phonological rules that differentiate them from native speakers. These phonological rules characterize or distinguish accents in an L2. The Shibboleth program creates combinatorial rule-sets to describe the phonological pattern of these accents and classifies L2 speakers into their…
Descriptors: Second Language Learning, Pronunciation, Phonology, Native Speakers
McGinnis, Thomas C. – ProQuest LLC, 2011
Organizations expend a great deal of time, effort and money on the implementation of enterprise resource planning (ERP) systems. They are considered the price of entry for large organizations to do business. Yet the success rate of ERP systems is poor. IS literature suggests that one possible reason for this is the underutilization of these…
Descriptors: Planning, Business, Program Implementation, Entrepreneurship
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Boxwell, Stephen A. – ProQuest LLC, 2011
Treebanks are a necessary prerequisite for many NLP tasks, including, but not limited to, semantic role labeling. For many languages, however, treebanks are either nonexistent or too small to be useful. Time-critical applications may require rapid deployment of natural language software for a new critical language--much faster than the development…
Descriptors: Natural Language Processing, Training, Programming, Computer System Design
Previous Page | Next Page ยป
Pages: 1  |  2