NotesFAQContact Us
Collection
Advanced
Search Tips
Source
ProQuest LLC943
Showing 646 to 660 of 943 results Save | Export
Yang, Yubao – ProQuest LLC, 2011
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Descriptors: Information Security, Surveys, Information Technology, Economic Factors
Petrzelka, Valerie – ProQuest LLC, 2012
This ethnographic case study was designed to investigate a successful professional development model, perceived effective professional learning and process for determining professional development for teachers. With eighty years of research on professional development, limited research was available on the process for determining professional…
Descriptors: Ethnography, Case Studies, Interviews, Computer Software
Baker, Gloria Waters – ProQuest LLC, 2012
Background: Wound care is an essential competency which nursing students are expected to acquire. To foster students' competency, nurse educators use high fidelity simulation to expose nursing students to various wound characteristics. Problem: Little is known about how nursing students react to simulated wound characteristics. Malodor is a…
Descriptors: Nursing Students, Nursing Education, Injuries, Medical Services
Hilton, Tod M. – ProQuest LLC, 2010
The use of user-centered design (UCD) principles has a positive impact on the use of web-based interactive systems in customer-centric organizations. User-centered design methodologies are not widely adopted in organizations due to intraorganizational factors. A qualitative study using a modified Delphi technique was used to identify the factors…
Descriptors: Expertise, Delphi Technique, Organizational Culture, Models
Wallshein, Corinne C. – ProQuest LLC, 2010
Software Cost Estimation (SCE) uses labor hours or effort required to conceptualize, develop, integrate, test, field, or maintain program components. Department of Defense (DoD) SCE can use initial software data parameters to project effort hours for large, software-intensive programs for contractors reporting the top levels of process maturity,…
Descriptors: Computer Software, Costs, Public Agencies, Computation
Zecca, Mark S. – ProQuest LLC, 2010
Business managers who look for ways to cut costs face difficult questions about the efficiency and effectiveness of software engineering practices that are used to complete projects on time, on specification, and within budget (Johnson, 1995; Lindstrom & Jeffries, 2004). Theoretical models such as the Theory of Reasoned Action (TRA) have linked…
Descriptors: Models, Computer Software, Programming, Engineering
Fryling, Meg – ProQuest LLC, 2010
Enterprise Research Planning (ERP) software is advertised as the product that will "run the enterprise", improving data access and accuracy as well as enhancing business process efficiency. Unfortunately, organizations often make implementation decisions with little consideration for the maintenance phase of an ERP, resulting in significant…
Descriptors: Costs, Computer Software, Planning, Higher Education
Lecusay, Robert A. – ProQuest LLC, 2013
For several decades improvement of science education has been a major concern of policy makers concerned that the U.S. is a "nation at risk" owing to the dearth of students pursing careers in science. Recent policy proposals have argued that provision of broadband digital connectivity to organizations in the informal sector would…
Descriptors: Mentors, Telecommunications, Computer Mediated Communication, Physics
Coffey, Debra J. – ProQuest LLC, 2013
This dissertation uses data from the evaluation of a Striving Readers project to examine the associations between levels of implementation of different components of Scholastic's "READ 180" and student achievement as measured on the Iowa Test of Basic Skills (ITBS) reading assessment. The approach was hierarchical linear modeling using…
Descriptors: Correlation, Program Implementation, Reading Achievement, Achievement Tests
Mattord, Herbert J. – ProQuest LLC, 2012
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Descriptors: Internet, Electronic Learning, Comparative Analysis, Benchmarking
Lee, Woon Jee – ProQuest LLC, 2012
The purpose of this study was to explore the nature of students' mapping and discourse behaviors while constructing causal maps to articulate their understanding of a complex, ill-structured problem. In this study, six graduate-level students were assigned to one of three pair groups, and each pair used the causal mapping software program,…
Descriptors: Student Behavior, Graduate Students, Maps, Computer Uses in Education
Fonkert, Karen L. – ProQuest LLC, 2012
This study analyzes the nature of student interaction and discourse in an environment that includes the use of Java-based, curriculum-embedded mathematical software. The software "CPMP-Tools" was designed as part of the development of the second edition of the "Core-Plus Mathematics" curriculum. The use of the software on…
Descriptors: High School Students, Secondary School Mathematics, Mathematics Instruction, Computer Software
Hartness, Seajae Calvin – ProQuest LLC, 2011
Repeated Reading is a common reading intervention that has been used to help students read fluently since 1979. There are many variations of Repeated Reading that have been investigated and found to be effective. However, there is a relative research deficit on the effectiveness of software programs for administering Repeated Reading. This…
Descriptors: Early Intervention, Program Effectiveness, Internet, Reading
Sanders, Elizabeth A. – ProQuest LLC, 2011
This paper explores multilevel modeling approaches for 2-group randomized experiments in which a treatment condition involving clusters of individuals is compared to a control condition involving only ungrouped individuals, otherwise known as partially nested cluster randomized designs (PNCRTs). Strategies for comparing groups from a PNCRT in the…
Descriptors: Computer Software, Educational Research, Monte Carlo Methods, Effect Size
Valente, Mario Manuel – ProQuest LLC, 2011
Most California Community Colleges have chosen to purchase and implement a Management Information Systems software solution also known as an Enterprise Resource Planning (ERP) system in order to monitor, control, and automate their administrative tasks. ERP implementations are complex, expensive, high profile, and therefore high risk. To reduce…
Descriptors: Risk, Management Information Systems, Community Colleges, College Presidents
Pages: 1  |  ...  |  40  |  41  |  42  |  43  |  44  |  45  |  46  |  47  |  48  |  ...  |  63