Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 177 |
| Since 2017 (last 10 years) | 368 |
| Since 2007 (last 20 years) | 943 |
Descriptor
Source
| ProQuest LLC | 943 |
Author
| Abdulrahman Alshammari | 1 |
| Abedtash, Hamed | 1 |
| Acharya, Jayadev | 1 |
| Adam Pfau | 1 |
| Adamo, Oluwayomi | 1 |
| Adefope, Olufunke | 1 |
| Adeyeye, Adebisi | 1 |
| Adkins, Joni K. | 1 |
| Agada, Chuks N. | 1 |
| Ahmed Abu Ghoush | 1 |
| Ahn, Jae-wook | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 943 |
| Tests/Questionnaires | 3 |
Education Level
Audience
| Practitioners | 2 |
| Teachers | 2 |
| Researchers | 1 |
Location
| California | 21 |
| United States | 18 |
| Texas | 14 |
| Pennsylvania | 12 |
| North Carolina | 10 |
| Florida | 7 |
| New York | 7 |
| China | 6 |
| Georgia | 6 |
| Ohio | 6 |
| South Korea | 6 |
| More ▼ | |
Laws, Policies, & Programs
| No Child Left Behind Act 2001 | 3 |
| Digital Millennium Copyright… | 1 |
| G I Bill | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
| Does not meet standards | 2 |
Mills, Kelly – ProQuest LLC, 2019
The ubiquitous use of social media by children offers a unique opportunity to view diverse funds of knowledge. Connecting learning to students' funds of knowledge is particularly important for non-dominant learners, who experience tensions between home, community and school science cultures. This study is embedded in a research project which…
Descriptors: Cultural Background, After School Programs, Social Media, Science Education
Worthy, William – ProQuest LLC, 2018
After nearly 2 decades of advances in information and communications technologies (ICT) including social media, mobile, analytics, and cloud computing, disaster response agencies in the United States have not been able to improve alignment between ICT-based information and disaster response actions. This grounded theory study explored emergency…
Descriptors: Social Media, Computer Software, Emergency Programs, Information Technology
Iannotti, Nicholas V. – ProQuest LLC, 2013
The last several years have seen unprecedented advancements in the application of technology to the life sciences, particularly in the area of data generation. Novel scientific insights are now often driven primarily by software development supporting new multidisciplinary and increasingly multifaceted data analysis. However, despite the…
Descriptors: Biological Sciences, Computer Software, Computer System Design, Recycling
Smith, Marcus L., Jr. – ProQuest LLC, 2016
During its infancy, the cloud computing industry was the province largely of small and medium-sized business customers. Despite their size, these companies required a professionally run, yet economical information technology (IT) operation. These customers used a total value strategy whereby they avoided paying for essential, yet underutilized,…
Descriptors: Decision Making, Administrator Attitudes, Information Technology, Computer Software
Darren Page – ProQuest LLC, 2021
This dissertation analyzes the ways that college applicants and college students navigate through higher education with a focus on ways to improve their experience. In the first chapter, I examine the ways that college applicants change their application and enrollment decisions when using the Common Application. In the second chapter, I highlight…
Descriptors: College Students, College Applicants, Educational Experience, Decision Making
Hauser, Deanna Mae – ProQuest LLC, 2017
Social engineers manipulate individuals into divulging confidential information or compromising personal or organizational security. The purpose of this qualitative case study was to examine the potential lack of social engineering awareness that affects employees at companies in southeastern Michigan. The research method consisted of interviews…
Descriptors: Engineering, Behavior Modification, Familiarity, College Faculty
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Gyllen, Justin Gordon – ProQuest LLC, 2017
This dissertation examines students' use of written course materials in introductory engineering courses, begins to elucidate the relationships between students' study habits and their subsequent course performance, and evaluates the impact that carefully designed preparatory assignments has on these relationships. Much of previous educational…
Descriptors: Use Studies, Users (Information), Instructional Materials, Introductory Courses
Svare, Ragnar – ProQuest LLC, 2018
This dissertation sheds light on how learners of German, NSs of German, and Americans unfamiliar with German reach decisions about the nature of speech acts that they witness NSs of German perform in three authentic video clips. It also aims to gain a better understanding of what sources members of the three groups bring to bear when they attempt…
Descriptors: Pragmatics, German, Speech Acts, Cues
Szwed, Kathryn L. – ProQuest LLC, 2016
Preschool students who display social emotional deficits pose challenging issues for families, caregivers and teachers who educate them. In this study, the effectiveness of an assistive technology based treatment package consisting of video self-modeling and behavior management software was investigated to determine if its combined use would…
Descriptors: Preschool Children, Educational Technology, Technology Uses in Education, Video Technology
Dames, Michele – ProQuest LLC, 2016
The present action research study involved a participant-researcher and her undergraduate students enrolled in the Course: Visual Arts Computing, at the University of South Carolina from 2012 to 2013. This research examined six sections of the course with an average of 20 students in each section, totaling 120 participants. The overarching…
Descriptors: Self Efficacy, Undergraduate Students, Social Cognition, Social Theories
Jackson, Bernedette S. – ProQuest LLC, 2017
Learning a second or foreign language may be a daunting task for anyone; however, learning a language that is vastly different from a person's native language can be extremely difficult. This is especially true in South Korea where English is taught and spoken as a foreign language. For Korean students, who typically study English from a young…
Descriptors: English (Second Language), Second Language Learning, Second Language Instruction, Foreign Countries
Brown, David A. – ProQuest LLC, 2017
Information security is a concern for managers implementing protection measures. Implementing information security measures requires communicating both the reason and remediation for the protection measure. Examining how an anti-spyware security communication affects an individual's intention to implement a protection measure could help improve…
Descriptors: College Students, Fear, Intention, Information Security
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Alhindawi, Nouh – ProQuest LLC, 2013
This dissertation addresses the problems of program comprehension to support the evolution of large-scale software systems. The research concerns how software engineers locate features and concepts along with categorizing changes within very large bodies of source code along with their versioned histories. More specifically, advanced Information…
Descriptors: Computer Software, Comprehension, Information Retrieval, Natural Language Processing

Direct link
