NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 7,636 to 7,650 of 21,334 results Save | Export
Literacy Information and Communication System, 2011
This edition of "'LINCS' Resource Collection News" features the Workforce Competitiveness Collection, covering the topics of workforce education, English language acquisition, and technology. Each month Collections News features one of the three "LINCS" (Literacy Information and Communication System) Resource Collections--Basic…
Descriptors: Family Literacy, English (Second Language), Language Acquisition, Labor Force
Gupta, Manish – ProQuest LLC, 2011
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…
Descriptors: Information Technology, Computer Security, Organizations (Groups), Global Approach
Harrell, J. Michael – ProQuest LLC, 2011
Enterprise architecture is a relatively new concept that arose in the latter half of the twentieth century as a means of managing the information technology resources within the enterprise. Borrowing from the disciplines of brick and mortar architecture, software engineering, software architecture, and systems engineering, the enterprise…
Descriptors: Information Technology, Case Studies, Computer Software, Business Administration
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Cuthrell, Michael Gerard – ProQuest LLC, 2011
Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…
Descriptors: Information Technology, Information Systems, Telecommunications, Expertise
Peer reviewed Peer reviewed
Direct linkDirect link
Park, Hee Sun; Smith, Sandi; Klein, Katherine A. – Journal of Drug Education, 2011
This study examined estimation and accuracy of normative perceptions for students during one celebratory drinking occasion. Students who drank on St. Patrick's Day overestimated the percentage of others who also drank, whereas the students who did not drink on St. Patrick's Day underestimated the percentage of others who also did not drink. The…
Descriptors: Drinking, Student Behavior, College Students, Student Attitudes
Yonan, Jesay; Bardick, Angela D.; Willment, Jo-Anne H. – Canadian Journal of Counselling and Psychotherapy, 2011
Cellular telephones and social networking sites pose new challenges to the maintenance of therapeutic boundaries. One such difficulty is the possible development of dual relationships between clients and counselling professionals as a result of communicating by these means. Most regulatory bodies advise professional counsellors and psychologists…
Descriptors: Psychologists, Ethics, Therapy, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Seif, Hinda – New Directions for Child and Adolescent Development, 2011
Young immigrants are challenging the boundaries of citizenship and insisting on their human rights. This chapter examines the civic lives of immigrant youth through the case of Latina/os, exploring the paradox of their apparent low civic education and engagement levels and remarkable participation in recent protests. After an overview of…
Descriptors: Democracy, Information Technology, Developmental Stages, Immigrants
Armbruster, Stephanie; Strasburger, Tom – School Business Affairs, 2011
The economic crisis has caused districts throughout the United States to cut resources and limit spending, particularly with regard to staff. However, the requirements for maintaining safe, efficiently functioning schools and for remaining in compliance with state and federal regulations have not decreased; in many cases, those responsibilities…
Descriptors: Human Resources, School Administration, Automation, Job Simplification
Peer reviewed Peer reviewed
Direct linkDirect link
Beachboard, John; Aytes, Kregg – Journal of Information Technology Education, 2011
Core MBA IT courses have tended to be survey courses that cover important topics but often do not sufficiently engage students. The result is that many top-ranked MBA programs have not found such courses useful enough to include in their core MBA requirements. In this paper, we present a design of an MBA course emphasizing information technology…
Descriptors: Higher Education, Business Administration Education, Introductory Courses, Core Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Awang, Marinah; Ismail, Ramlee; Flett, Peter; Curry, Adrienne – Quality Assurance in Education: An International Perspective, 2011
Purpose: The purpose of this paper is to shed light on changes in the Malaysian education system, with particular reference to the development of Smart Schools, and to evaluate progress with respect to knowledge management in school education. Design/methodology/approach: The research is designed around questionnaires based on a knowledge…
Descriptors: Foreign Countries, Knowledge Management, Educational Change, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Abdous, M'hammed – Journal of Higher Education Policy and Management, 2011
In this paper, a conceptual and operational framework for business process reengineering in higher education is proposed. The outline of a sequential and non-linear four-step framework designed to reengineer higher education administrative and academic processes is presented. The first two steps, initiating and analysing, are used to examine,…
Descriptors: Higher Education, Total Quality Management, Administrative Organization, Information Technology
Pages: 1  |  ...  |  506  |  507  |  508  |  509  |  510  |  511  |  512  |  513  |  514  |  ...  |  1423