NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Filipowski, Tomasz; Kazienko, Przemyslaw; Brodka, Piotr; Kajdanowicz, Tomasz – Behaviour & Information Technology, 2012
Knowledge exchange between employees is an essential feature of recent commercial organisations on the competitive market. Based on the data gathered by various information technology (IT) systems, social links can be extracted and exploited in knowledge exchange systems of a new kind. Users of such a system ask their queries and the system…
Descriptors: Expertise, Informal Education, Information Technology, Workplace Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Bejar, Isaac I. – Assessment in Education: Principles, Policy & Practice, 2011
Automated scoring of constructed responses is already operational in several testing programmes. However, as the methodology matures and the demand for the utilisation of constructed responses increases, the volume of automated scoring is likely to increase at a fast pace. Quality assurance and control of the scoring process will likely be more…
Descriptors: Evidence, Quality Control, Scoring, Quality Assurance
Freifeld, Lorri – Training, 2010
With technology changing every second of every day, it is no surprise a learning management system (LMS) quickly can become outdated. But it is no easy task to re-engineer a current LMS or find exactly the right new one to purchase. In this article, three 2010 Top Young Trainers share their experiences with implementing or re-engineering an…
Descriptors: Barriers, Database Management Systems, Program Implementation, Performance Technology
Anderson, George W. – ProQuest LLC, 2010
The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…
Descriptors: Program Effectiveness, Statistical Analysis, Transformational Leadership, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wills, Gary B.; Bailey, Christopher P.; Davis, Hugh C.; Gilbert, Lester; Howard, Yvonne; Jeyes, Steve; Millard, David E.; Price, Joseph; Sclater, Niall; Sherratt, Robert; Tulloch, Iain; Young, Rowin – Assessment & Evaluation in Higher Education, 2009
This article reports on the e-Framework Reference Model for Assessment (FREMA) project that aimed at creating a reference model for the assessment domain: a guide to what resources (standards, projects, people, organisations, software, services and use cases) exist for the domain, aimed at helping strategists understand the state of e-learning…
Descriptors: Concept Mapping, Topology, Courseware, Electronic Learning
Chen, Melinda Elena – ProQuest LLC, 2010
The purpose of this study is to determine the potential effects of an Internet2 implementation at the FDA. Because Internet2 does not currently exist in the FDA, research will be made to compare the tools used today to transmit data to what may develop with an Internet2 presence. These effects will be assessed from the point-of-view of the…
Descriptors: Work Environment, Public Agencies, Interviews, Industrial Psychology
Cagle West, Marsha – ProQuest LLC, 2010
Software is a critical component of systems ranging from simple consumer appliances to complex health, nuclear, and flight control systems. The development of quality, reliable, and effective software solutions requires the incorporation of effective software engineering processes and leadership. Processes, approaches, and methodologies for…
Descriptors: Grounded Theory, Computer Software, Program Development, Leadership
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government
Peer reviewed Peer reviewed
Direct linkDirect link
Downes, Stephen – Innovate: Journal of Online Education, 2005
Stephen Downes visits Robin Good's Master NewMedia, a Web site dedicated to Web 2.0 in both thought and deed. The site both utilizes the design principles and technologies central to the concept of Web 2.0--relentless referencing, cross-referencing, and linking to a wide variety of articles from across the Web; a fluid and often chaotic…
Descriptors: Internet, Web Sites, Computer Software Reviews, Computer System Design