NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)24
Audience
Laws, Policies, & Programs
Health Insurance Portability…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 44 results Save | Export
Clark, Joseph Warren – ProQuest LLC, 2012
In turbulent business environments, change is rapid, continuous, and unpredictable. Turbulence undermines those adaptive problem solving methods that generate solutions by extrapolating from what worked (or did not work) in the past. To cope with this challenge, organizations utilize trial-based problem solving (TBPS) approaches in which they…
Descriptors: Problem Solving, Simulation, Marketing, Models
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Tambouris, Efthimios; Zotou, Maria; Kalampokis, Evangelos; Tarabanis, Konstantinos – International Journal of Training and Development, 2012
Enterprise architecture (EA) implementation refers to a set of activities ultimately aiming to align business objectives with information technology infrastructure in an organization. EA implementation is a multidisciplinary, complicated and endless process, hence, calls for adequate education and training programs that will build highly skilled…
Descriptors: Foreign Countries, Business Administration, Program Content, Educational Policy
Sung, Ji Eun – ProQuest LLC, 2012
New products continue to launch quickly but many of them are converged products. The "new product" is not a completely new thing to consumers and the basic features stay the same. As a result, the added functions or fancy design can't explain why consumers adopt the new media. Past studies have examined perceptions of innovations or user…
Descriptors: Program Effectiveness, Innovation, Context Effect, Intention
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Chebrolu, Shankar Babu – ProQuest LLC, 2010
Against the backdrop of new economic realities, one of the larger forces that is affecting businesses worldwide is cloud computing, whose benefits include agility, time to market, time to capability, reduced cost, renewed focus on the core and strategic partnership with the business. Cloud computing can potentially transform a majority of the…
Descriptors: Program Effectiveness, Information Technology, Correlation, Internet
Alodhaibi, Khalid – ProQuest LLC, 2011
Recommender systems aim to support users in their decision-making process while interacting with large information spaces and recommend items of interest to users based on preferences they have expressed, either explicitly or implicitly. Recommender systems are increasingly used with product and service selection over the Internet. Although…
Descriptors: Information Processing, Decision Support Systems, Decision Making, Preferences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Uysal, Murat Pasa – Turkish Online Journal of Distance Education, 2012
Developments in computer and information technologies continue to give opportunities for designing advanced E-learning systems while entailing objective and technical evaluation methodologies. Design and development of E-learning systems require time-consuming and labor-intensive processes; therefore any decision about these systems and their…
Descriptors: Educational Technology, Information Technology, Computer System Design, Decision Support Systems
Zand, Amir Ghasem – ProQuest LLC, 2011
Geotechnical data are one of the most prevalent data types in civil engineering projects. The majority of the civil engineering projects that are in use today are designed using site-specific geotechnical data. The usage of geotechnical data is not limited to construction projects. This data is used in a wide range of applications, including…
Descriptors: Geographic Information Systems, Industry, Maps, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Boyle, Tom – Computers & Education, 2010
The use of ICT to enhance teaching and learning depends on effective design, which operates at many levels of granularity from the small to the very large. This reflects the range of educational problems from course design down to the design of activities focused on specific learning objectives. For maximum impact these layers of design need to be…
Descriptors: Design Requirements, Research and Development, Instructional Design, Models
Bitton, Ephrat – ProQuest LLC, 2011
This dissertation explores the use of geometric and graphical models for a variety of information search and filtering applications. These models serve to provide an intuitive understanding of the problem domains and as well as computational efficiencies to our solution approaches. We begin by considering a search and rescue scenario where both…
Descriptors: Safety, Opinions, Hypothesis Testing, Intuition
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Liu, Yipeng – ProQuest LLC, 2009
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Descriptors: Information Technology, Competition, Computer Software, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Teixeira, Claudio; Pinto, Joaquim Sousa; Martins, Joaquim Arnaldo – Campus-Wide Information Systems, 2008
Purpose: The aim of this paper is to describe a project to provide an online web portal that can be used as a front-end for all university users--students, teachers, staff--and services, library, administration, e-learning, and e-mail. Design/methodology/approach: The profile model proposed is mainly inheritable, defined by profile components with…
Descriptors: Information Systems, Profiles, Internet, Web Sites
Previous Page | Next Page ยป
Pages: 1  |  2  |  3