NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Roane, Warren – Online Submission, 2010
The Texas Projection Measure (TPM) has grown out of the state's need to meet the requirements of No Child Left Behind (NCLB). An examination of the state's method of predicting 8th grade mathematics scores reveals that several factors have been ignored in the process of developing the model, including assumptions in its underlying statistical…
Descriptors: Federal Legislation, Statistical Analysis, Grade 8, Predictive Measurement
Goldhaber, Dan – Center for American Progress, 2010
The formula is simple: Highly effective teachers equal student academic success. Yet, the physics of American education is anything but. Thus, the question facing education reformers is how can teacher effectiveness be accurately measured in order to improve the teacher workforce? Given the demand for objective, quantitative measures of teacher…
Descriptors: Academic Achievement, Teacher Effectiveness, Models, Merit Pay