Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 25 |
Descriptor
Armed Forces | 33 |
Information Technology | 33 |
Military Personnel | 8 |
Computer Security | 6 |
Educational Technology | 6 |
Case Studies | 5 |
Computer Software | 5 |
Military Training | 5 |
Qualitative Research | 5 |
Decision Making | 4 |
Federal Government | 4 |
More ▼ |
Source
Author
Publication Type
Education Level
Postsecondary Education | 7 |
Higher Education | 5 |
Adult Education | 3 |
Elementary Secondary Education | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
Arizona | 1 |
California | 1 |
District of Columbia | 1 |
Italy | 1 |
Maryland | 1 |
New York | 1 |
Tennessee | 1 |
Ukraine | 1 |
United States | 1 |
Laws, Policies, & Programs
Rehabilitation Act 1973 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Arielle A. Gaither – ProQuest LLC, 2021
Bag-of-words is a commonly used text representation method for many text classification applications. However, bag-of-words representation fails to consider the context of the text because it only examines text documents based on the presence of individual words and explores relationships between texts with similar word choices (Bengfort, 2018).…
Descriptors: Journal Articles, Classification, Language Usage, Databases
Gordon, Jerry; Hayden, Trey; Johnson, Andy; Smith, Brent – Advanced Distributed Learning Initiative, 2020
The DoD's [Department of Defense's] Advanced Distributed Learning (ADL) Initiative is designing a framework of commercial standards, technical specifications, and business rules to enable plug and play interoperability of learning technologies. The Total Learning Architecture (TLA) framework will allow education and training products to…
Descriptors: Armed Forces, Military Training, Educational Technology, Delivery Systems
Johnson, Andy; Miller, Shawn – Advanced Distributed Learning Initiative, 2022
The founding goal of using standards within acquisition of distributed learning content and technology is to reduce cost in both current and future acquisitions and collaborative efforts across organizations. This document explores existing successful acquisitions and supplies that language as well as successful ways to implement best practices of…
Descriptors: Standards, Course Content, Information Technology, Cost Effectiveness
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Schneider, Jacquelyn – ProQuest LLC, 2017
Over the last twenty years, the digital technologies of the information revolution have fundamentally impacted the nature of modern warfare and introduced significant uncertainty about capabilities, intentions, and the limits of conflict. How do these digital advances and the explosion of cyber technologies on and off the battlefield impact…
Descriptors: Information Technology, National Security, Incentives, Armed Forces
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Osodlo, Vasyl; Rakhmanov, Vitalii; Krykun, Viktoriia; Tarasenko, Nataliya; Aristarkhova, Marharyta – Review of Education, 2022
The purpose of this study was to examine the effects of a blended learning method on the development of foreign language communicative competence of the officers of the Armed Forces of Ukraine in the educational and information environment of a Higher Military Educational Institution. The foreign language training was carried out at 11 military…
Descriptors: Military Training, Military Personnel, Second Language Learning, Second Language Instruction
Marchisio, Marina; Spinello, Enrico – International Association for Development of the Information Society, 2021
Internationalization of Higher Education is one of the key trends of development. Security and Defence Education aims to prepare highly specialized military (officers) and civilian personnel who are able to operate in national as well as international environments with colleagues and people of different nationalities and sometimes in a very…
Descriptors: International Education, Higher Education, National Security, Armed Forces
Moreland, James D., Jr – ProQuest LLC, 2013
This research investigates the instantiation of a Service-Oriented Architecture (SOA) within a hard real-time (stringent time constraints), deterministic (maximum predictability) combat system (CS) environment. There are numerous stakeholders across the U.S. Department of the Navy who are affected by this development, and therefore the system…
Descriptors: Information Technology, Client Server Architecture, Armed Forces, Readiness
Allen, Ronald Timothy – ProQuest LLC, 2014
Automated Logistics Environment (ALE) is a new term used by Navy and aerospace industry executives to describe the aggregate of logistics-related information systems that support modern aircraft weapon systems. The development of logistics information systems is not always well coordinated among programs, often resulting in solutions that cannot…
Descriptors: Administrators, Experience, Automation, Information Systems
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Delaquis, Richard Serge – ProQuest LLC, 2012
The Clinger Cohen Act of 1996 requires that all major Federal Government Information Technology (IT) systems prepare an Enterprise Architecture prior to IT acquisitions. Enterprise Architecture, like house blueprints, represents the system build, capabilities, processes, and data across the enterprise of IT systems. Enterprise Architecture is used…
Descriptors: Human Resources, Information Technology, Information Management, Federal Government
Manzano, Sancho J., Jr. – ProQuest LLC, 2012
Empirical studies have been conducted on what is known as end-user computing from as early as the 1980s to present-day IT employees. There have been many studies on using quantitative instruments by Cotterman and Kumar (1989) and Rockart and Flannery (1983). Qualitative studies on end-user computing classifications have been conducted by…
Descriptors: Mixed Methods Research, Satisfaction, Computer Use, Military Personnel
Hickman, Linnel W., Jr. – ProQuest LLC, 2017
The purpose of this qualitative interpretive phenomenological analysis (IPA) study was to understand how white collar African American male senior executives within the defense industry contractor IT organizations make sense of their career advancement into senior management positions. The 12 African American males that participated in this study…
Descriptors: Career Development, African Americans, Males, African American Leadership
Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies