Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Software | 6 |
Factor Structure | 6 |
Goodness of Fit | 6 |
Factor Analysis | 3 |
Matrices | 3 |
Comparative Analysis | 2 |
Construct Validity | 2 |
Data Analysis | 2 |
Mathematical Models | 2 |
Research Methodology | 2 |
Test Items | 2 |
More ▼ |
Source
International Journal of… | 1 |
Author
Bennett, Randy Elliot | 1 |
Byrne, Barbara M. | 1 |
Hocevar, Dennis | 1 |
Khattab, Ali-Maher | 1 |
Lee, Soon-Mook | 1 |
Marsh, Herbert W. | 1 |
Roberts, J. Kyle | 1 |
Publication Type
Reports - Research | 3 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
Advanced Placement… | 1 |
Beck Depression Inventory | 1 |
Students Evaluation of… | 1 |
What Works Clearinghouse Rating
Lee, Soon-Mook – International Journal of Testing, 2010
CEFA 3.02(Browne, Cudeck, Tateneni, & Mels, 2008) is a factor analysis computer program designed to perform exploratory factor analysis. It provides the main properties that are needed for exploratory factor analysis, namely a variety of factoring methods employing eight different discrepancy functions to be minimized to yield initial…
Descriptors: Factor Structure, Computer Software, Factor Analysis, Research Methodology
Roberts, J. Kyle – 1999
Many researchers acknowledge the prominent role that factor analysis can play in efforts to establish construct validity. Data can be analyzed with no preconceived ideas about the underlying constructs of structure of the data. This approach is exploratory factor analysis, Another approach is used when the researcher has an understanding of the…
Descriptors: Computer Software, Construct Validity, Factor Structure, Goodness of Fit
Byrne, Barbara M. – 1994
Working from a common data base and hypothesized model, this paper demonstrates and compares the EQS and LISREL computer program strategies in the analysis of a second-order factor model. Program similarities and differences are noted with respect to: (1) preliminary analyses of the data; (2) treatment of data that are not multivariately normal;…
Descriptors: Adolescents, Comparative Analysis, Computer Oriented Programs, Computer Software
Bennett, Randy Elliot; And Others – 1989
This study examined the relationship of a machine-scorable, constrained free-response computer science item that required the student to debug a faulty program to two other types of items: multiple-choice and free-response requiring production of a computer program. The free-response items were from the College Board's Advanced Placement Computer…
Descriptors: College Students, Computer Science, Computer Software, Debugging (Computers)
Marsh, Herbert W.; Hocevar, Dennis – 1986
The advantages of applying confirmatory factor analysis (CFA) to multitrait-multimethod (MTMM) data are widely recognized. However, because CFA as traditionally applied to MTMM data incorporates single indicators of each scale (i.e., each trait/method combination), important weaknesses are the failure to: (1) correct appropriately for measurement…
Descriptors: Computer Software, Construct Validity, Correlation, Error of Measurement
Khattab, Ali-Maher – 1986
This study investigates the extent to which the higher order factors of symbolic and semantic content are differentiated. The main concern is an expository description of the use of confirmatory factor analysis in establishing factorial validity. Reanalyzed data originally collected in 1968 involved a sample of 197 tenth, eleventh and twelfth…
Descriptors: Cognitive Ability, Computer Software, Factor Analysis, Factor Structure