Publication Date
| In 2026 | 2 |
| Since 2025 | 386 |
| Since 2022 (last 5 years) | 2357 |
| Since 2017 (last 10 years) | 5291 |
| Since 2007 (last 20 years) | 12508 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 867 |
| Teachers | 484 |
| Administrators | 480 |
| Media Staff | 267 |
| Policymakers | 260 |
| Researchers | 169 |
| Students | 121 |
| Parents | 32 |
| Support Staff | 16 |
| Community | 13 |
| Counselors | 11 |
| More ▼ | |
Location
| Australia | 821 |
| United Kingdom | 627 |
| United States | 515 |
| Turkey | 439 |
| Canada | 422 |
| China | 329 |
| Spain | 253 |
| South Africa | 249 |
| India | 244 |
| California | 212 |
| United Kingdom (England) | 201 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Longenecker, Herbert E., Jr.; Yarbrough, David M.; Feinstein, David L. – Information Systems Education Journal, 2010
IS2002 has become a well defined standard for information systems curricula. The Data Management Association (DAMA 2006) curriculum framework defines a body of knowledge that points to a skill set that can enhance IS2002. While data management professionals are highly skilled individuals requiring as much as a decade of relevant experience before…
Descriptors: Data Analysis, Management Systems, Information Technology, Professional Personnel
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Vee, Annette – ProQuest LLC, 2010
This dissertation looks at computer programming through the lens of literacy studies, building from the concept of code as a written text with expressive and rhetorical power. I focus on the intersecting technological and social factors of computer code writing as a literacy--a practice I call "proceduracy". Like literacy, proceduracy is a human…
Descriptors: Computer Software, Computers, Programming, Foreign Countries
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach
Wei, Wei – ProQuest LLC, 2010
Social bookmarking has gained popularity since the advent of Web 2.0. Keywords known as tags are created to annotate web content, and the resulting tag space composed of the tags, the resources, and the users arises as a new platform for web content discovery. Useful and interesting web resources can be located through searching and browsing based…
Descriptors: Cooperative Planning, Semantics, Network Analysis, Social Networks
Okur Dincsoy, Meltem – ProQuest LLC, 2010
The remarkable development in ICT (Information and Communication Technology) was observed in the past decades that it has an increasing impact on economic and social activities in the world. ICT have had a significant role in the economic growth for developed and developing countries. The countries have been very dynamic in recent years in East…
Descriptors: Economic Progress, Privatization, Income, Multiple Regression Analysis
Newman, Peter – ProQuest LLC, 2010
Information technology (IT) has become a strategic vehicle for small businesses to achieve and sustain their competitive advantage. Prior research has suggested that information technology plays an important role in the decision-making process. The purpose of this study is to examine the relationship between organizational IT performance and…
Descriptors: Small Businesses, Program Effectiveness, Information Technology, Business Administration
Thomas, Valerie Brown – ProQuest LLC, 2010
Ubiquitous technology and agile organizational structures have enabled a strategic response to increasingly competitive, complex, and unpredictable challenges faced by many organizations. Using cyberinfrastructure, which is primarily the network of information, computers, communication technologies, and people, traditional organizations have…
Descriptors: Trust (Psychology), Information Technology, Communication (Thought Transfer), Virtual Classrooms
Everhart, Nancy – International Association of School Librarianship, 2010
Nationwide education initiatives are underway in various parts of the world, including a push for national curricula in the U.S. and Australia. In Australia, school librarians have been invited guests to provide input into the integration of digital/information literacy across curriculum areas. Conversely, U.S., school librarians crashed the…
Descriptors: School Libraries, Foreign Countries, Information Literacy, Information Skills
Tai, W. T. – ProQuest LLC, 2010
The basis for evaluating projects in an organizational IT project portfolio includes complexity factors, arguments/criteria, and procedures, with various implications. The purpose of this research was to develop a conceptual framework for IT project proposal evaluation. The research involved using a heuristic roadmap and the mind-mapping method to…
Descriptors: Portfolios (Background Materials), Program Proposals, Information Technology, Models
Neal, Maxwell Lewis – ProQuest LLC, 2010
Biosimulation models are valuable, versatile tools used for hypothesis generation and testing, codification of biological theory, education, and patient-specific modeling. Driven by recent advances in computational power and the accumulation of systems-level experimental data, modelers today are creating models with an unprecedented level of…
Descriptors: Semantics, Measures (Individuals), Semiotics, Computer Software
Bachman, Charles A. – ProQuest LLC, 2010
While private sector organizations have implemented enterprise resource planning (ERP) systems since the mid 1990s, ERP implementations within the public sector lagged by several years. This research conducted a mixed method, comparative assessment of post "go-live" ERP implementations between public and private sector organization. Based on a…
Descriptors: Private Sector, Public Sector, Comparative Analysis, Program Implementation
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Tanveer, Asma – Online Submission, 2010
In this age of information and technology, educational institutions not just impart knowledge to individuals, but strive to change them into lifelong learners. ICT challenges the traditional method of teaching and learning through its potential as a source of knowledge. Like other developing countries of the world, a computer revolution has taken…
Descriptors: Lifelong Learning, Information Technology, Foreign Countries, Educational Quality

Peer reviewed
Direct link
