NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Barton, Irving Gary, Jr. – ProQuest LLC, 2017
Military education is held to high standards for our servicemen and women. The purpose of this quantitative, comparative study was to determine if significant differences existed in learning styles relative to military experience as determined by learning in a serious game environment. Study results are expected to advance the state of research in…
Descriptors: Educational Games, Evaluation Methods, Military Training, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Gafni, Ruti; Nagar, Idan – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2016
CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…
Descriptors: Program Effectiveness, Learning Disabilities, Questionnaires, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Nyagowa, Hesbon O.; Ocholla, Dennis N.; Mutula, Stephen M. – Education for Information, 2013
This study was conducted to determine the effect of a set of dimensions on e-School success in a cross-sectional study of NEPAD's e-School pilot in Kenya. All of the six e-Schools participating in the NEPAD's e-School pilot in Kenya were selected. The study used survey methodology. Students and teachers in those schools formed the study…
Descriptors: Computer Security, Foreign Countries, User Satisfaction (Information), Pilot Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Henning, Marcus – Internet and Higher Education, 2004
In the current information age, there is a growing use of and reliance on the Internet. One area of concern for educators is the communication of information using an electronic questionnaire interface. Therefore, it seems pertinent to look at the issue of dissemination of Internet questionnaire information and the integrity of this process.…
Descriptors: Integrity, Questionnaires, Conflict Resolution, Internet