NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 6,751 to 6,765 of 21,324 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gumus, Sedat – Turkish Online Journal of Educational Technology - TOJET, 2013
Information and Communication Technology (ICT) has become an indispensable part of the 21st century. Having basic ICT skills is now seen as an important attribute that members of the young cohort should possess in order to be successful in life. Thus, countries all over the world, including Turkey, have attempted to adjust their educational…
Descriptors: Foreign Countries, Predictor Variables, High School Students, Hierarchical Linear Modeling
Peer reviewed Peer reviewed
Direct linkDirect link
Brusi, Rima; Portnoy, Arturo; Toro, Nilsa – Journal of STEM Education: Innovations and Research, 2013
The Precalculus Mega Section project was developed with the main purpose of improving the overall performance of the student body in Precalculus, an important gatekeeper course that affects student engagement and completion, with typical drop/failure rates of over 50 percent. Strategies such as integration of technology and additional practice…
Descriptors: College Mathematics, Introductory Courses, Calculus, Curriculum Design
Peer reviewed Peer reviewed
Direct linkDirect link
Chang, Chi-Cheng; Liang, Chaoyun; Chen, Yi-Hui – Computers & Education, 2013
This study explored the reliability and validity of Web-based portfolio self-assessment. Participants were 72 senior high school students enrolled in a computer application course. The students created learning portfolios, viewed peers' work, and performed self-assessment on the Web-based portfolio assessment system. The results indicated: 1)…
Descriptors: Computer Oriented Programs, High School Students, Portfolio Assessment, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Marner, Anders; Örtegren, Hans – Education Inquiry, 2013
This article is included in a research project called "Skolämnesparadigm och undervisningspraktik i skärmkulturen -- bild, musik och svenska" ["School subject paradigm and teaching practice in the screen culture -- art, music and Swedish"]. Due to digital changes in the media world of pictures and art, digital media are…
Descriptors: Foreign Countries, Art Education, Technology Integration, Secondary School Students
Al Ayubi, Soleh Udin – ProQuest LLC, 2013
Persuasive technology (PT) has the potential to support individuals to perform self-management and social support as a part of health behavior change. This has led a few researchers in the intersection of the areas of health behavior change and software engineering to apply behavior change and persuasion theories to software development practices,…
Descriptors: Information Technology, Health Promotion, Health Behavior, Behavior Change
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Houck, Christiana L. – ProQuest LLC, 2013
This interpretative phenomenological study used semi-structured interviews of 10 participants to gain a deeper understanding of the experience for virtual team members using collaborative technology. The participants were knowledge workers from global software companies working on cross-functional project teams at a distance. There were no…
Descriptors: Information Technology, Cooperation, Teamwork, Global Approach
Daniel, Ben Kei; Butson, Russell – International Association for Development of the Information Society, 2013
This paper examines the role of Big Data Analytics in addressing contemporary challenges associated with current changes in institutions of higher education. The paper first explores the potential of Big Data Analytics to support instructors, students and policy analysts to make better evidence based decisions. Secondly, the paper presents an…
Descriptors: Data Analysis, Higher Education, Data Collection, Foreign Countries
Rider, Andrew Kent – ProQuest LLC, 2013
Data in many growing fields has an underlying network structure that can be taken advantage of. In this dissertation we apply data and network science to problems in the domains of systems biology and healthcare. Data challenges in these fields include noisy, heterogeneous data, and a lack of ground truth. The primary thesis of this work is that…
Descriptors: Computer Networks, Computer Science, Biological Sciences, Health Sciences
Louis-Jacques, Carmel G. – ProQuest LLC, 2013
As attention increasingly focuses on the role of information communication technology (ICT) in augmenting the efficiency of institutions, researchers have postulated that implementation of effective ICT enables decision makers to explore opportunities and maximize benefits. Review of current literature revealed a lack of information on how Haitian…
Descriptors: Foreign Countries, Technology Integration, Information Technology, Economics
Johnson, Marcia L. – ProQuest LLC, 2013
This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…
Descriptors: Qualitative Research, Gender Differences, Females, Information Security
Jeong, Jong Cheol – ProQuest LLC, 2013
1.2 billion users in Facebook, 17 million articles in Wikipedia, and 190 million tweets per day have demanded significant increase of information processing through Internet in recent years. Similarly life sciences and bioinformatics also have faced issues of processing Big data due to the explosion of publicly available genomic information…
Descriptors: Social Networks, Information Technology, Information Processing, Internet
Oh, Chong Keat – ProQuest LLC, 2013
Due to the popularity of Web 2.0 and Social Media in the last decade, the percolation of user generated content (UGC) has rapidly increased. In the financial realm, this results in the emergence of virtual investing communities (VIC) to the investing public. There is an on-going debate among scholars and practitioners on whether such UGC contain…
Descriptors: Internet, Social Networks, Web 2.0 Technologies, Peer Influence
Kruse, Clemens Scott – ProQuest LLC, 2013
Despite a Presidential Order in 2004 that launched national incentives for the use of health information technology, specifically the Electronic Health Record (EHR), adoption of the EHR has been slow. This study attempts to quantify factors associated with adoption of the EHR and Computerized Provider Order Entry (CPOE) by combining multiple…
Descriptors: Records (Forms), Case Records, Databases, Technological Advancement
Pages: 1  |  ...  |  447  |  448  |  449  |  450  |  451  |  452  |  453  |  454  |  455  |  ...  |  1422