NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Tadesse, Yohannes – ProQuest LLC, 2012
The importance of information security has made many organizations to invest and utilize effective information security controls within the information systems (IS) architecture. An organization's strategic decisions to secure enterprise-wide services often associated with the overall competitive advantages that are attained through the process of…
Descriptors: Information Security, Computer System Design, Information Systems, Information Technology
Joyner, Donald Thomas – ProQuest LLC, 2011
The granting of credit is a necessary risk of doing business. If companies only accepted cash, sales would be negatively impacted. In a perfect world, all consumers would pay their bills when they become due. However, the fact is that some consumers do default on debt. Companies are willing to accept default risk because the value of defaults does…
Descriptors: Brain, Computation, Debt (Financial), Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Mu-Yen; Chang, Francis Mou-Te; Chen, Chia-Chen; Huang, Mu-Jung; Chen, Jing-Wen – Educational Technology & Society, 2012
As the use of Information Technology (IT) applications has become more widespread, focus has turned toward applying IT to the learning domain, with policy initiatives aimed at integrating IT with teaching. E-Portfolios have assumed growing importance in higher education as institutions seek new teaching-learning-assessment tools to increase…
Descriptors: Foreign Countries, Student Motivation, Student Attitudes, Information Technology
Fischer, Carl E. – ProQuest LLC, 2010
This research investigated the impact of automated cognitive assistants, specifically, the Personalized Assistant that Learns (PAL), on situational awareness, efficiency and effectiveness of decision making in the brigade combat team. PAL was recently commissioned by Defense Advanced Research Projects Agency (DARPA) to enhance decision making with…
Descriptors: Constructivism (Learning), Efficiency, Tests, Program Effectiveness
Anderson, George W. – ProQuest LLC, 2010
The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…
Descriptors: Program Effectiveness, Statistical Analysis, Transformational Leadership, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Knight, Allan; Almeroth, Kevin – Journal of Interactive Learning Research, 2011
As part of the research carried out at the University of California, Santa Barbara's Center for Information Technology and Society (CITS), the Paper Authentication and Integrity Research (PAIR) project was launched. We began by investigating how one recent technology affected student learning outcomes. One aspect of this research was to study the…
Descriptors: Plagiarism, Student Attitudes, Form Classes (Languages), Researchers
Peer reviewed Peer reviewed
Direct linkDirect link
Penedo, Janaina Rodrigues; Diniz, Morganna; Ferreira, Simone Bacellar Leal; Silveira, Denis S.; Capra, Eliane – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to analyze the usability of a remote learning system in its initial development phase, using a quantitative usability evaluation method through Markov models. Design/methodology/approach: The paper opted for an exploratory study. The data of interest of the research correspond to the possible accesses of users…
Descriptors: Markov Processes, Evaluation Methods, Probability, Evaluation Research
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Kumar, Sanjeev – ProQuest LLC, 2009
Information Technology has brought significant benefits to organizations by allowing greater information sharing within and across firm boundaries leading to performance improvements. Emerging technologies such as Service Oriented Architecture (SOA) and Web2.0 have transformed the volume and process of information sharing. However, a comprehensive…
Descriptors: Organizational Effectiveness, Information Technology, Decision Making, Business