NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 6,406 to 6,420 of 21,334 results Save | Export
Pearson, Marcia L. Y. – ProQuest LLC, 2013
Researchers have consistently documented high turnover rates among repatriated workers after overseas assignments, mainly due to post-repatriation concerns about career advancement, compensation reduction, subsequent use of overseas experience, and job security. What is unknown is a method to alleviate this problem by selecting the types of…
Descriptors: Personality Traits, Reentry Workers, Information Technology, Case Studies
Sharma, Shruti – ProQuest LLC, 2013
This dissertation is an investigation into how trade liberalization and the adoption of information technology have impacted labour and productivity in India's manufacturing sector respectively. The second chapter analyses the relationship between India's liberalization of tariffs on imported intermediate inputs (henceforth input tariff…
Descriptors: Foreign Countries, International Trade, Manufacturing Industry, Labor Market
Stewart, Jeffrey E. – ProQuest LLC, 2013
Leadership in information technology (IT) firms remains a topic for study. Understanding how IT professionals react to leadership styles creates an opportunity for IT leaders to better lead by matching expectation to leadership style. Previous research has linked transformation leadership to the learning organization in the pharmaceutical sector,…
Descriptors: Leadership Styles, Information Technology, Organizational Culture, Models
Parsons, Earl H. – ProQuest LLC, 2013
Organization leaders manage change through projects to realize specific expected benefits. Under Expectation-Confirmation theory, expected benefits can be used to judge the ongoing viability and final success of the project. Organization leaders often develop management controls to ensure that the expected benefits are defined to allow their use…
Descriptors: Management Systems, Audits (Verification), Failure, Expectation
Brooks, Stoney L. – ProQuest LLC, 2013
This dissertation is concerned with investigating topics surrounding the phenomenon of social media usage. Essay One draws from the technology acceptance literature by utilizing concepts from the Technology Acceptance Model (TAM), the Unified Theory of Acceptance and Use of Technology (UTAUT), and the model of hedonic technology acceptance. The…
Descriptors: Social Media, Computer Attitudes, Individual Characteristics, Theories
Simha, Anand N. – ProQuest LLC, 2013
This dissertation comprises of three essays examining the interplay of information technology with various social processes that typically inhabit the organizational space. The first essay presents the concept of a Relationship Memory System (RMS). This study uses grounded theory methodology and interview data collected at a global…
Descriptors: Information Technology, Social Capital, Risk Management, Innovation
Aldukheil, Maher A. – ProQuest LLC, 2013
The Healthcare industry is characterized by its complexity in delivering care to the patients. Accordingly, healthcare organizations adopt and implement Information Technology (IT) solutions to manage complexity, improve quality of care, and transform to a fully integrated and digitized environment. Electronic Medical Records (EMR), which is…
Descriptors: Information Technology, Records (Forms), Medical Evaluation, Electronic Publishing
Payne, Wendy Louise – ProQuest LLC, 2013
In this study the core job characteristics that contribute to the internal motivational factors and job satisfaction of information technology faculty members working at a community or state college in Florida were investigated. Fifty-four information technology faculty members working at a community or state college in Florida completed the Job…
Descriptors: Community Colleges, State Colleges, Information Technology, Teacher Motivation
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Watson, Etáin – Research-publishing.net, 2013
The internet is the largest communications network in the world. It has become the virtual backbone of all communication. Therefore, it seems natural to leverage it as a major tool in any education involving communication skills, especially language skills. This chapter outlines a practitioner's experience on how this can be done in a foreign…
Descriptors: Information Technology, Technology Uses in Education, Second Language Instruction, Internet
Bryant, Veneschia R. – ProQuest LLC, 2013
The 21st century has allowed for endless possibilities in the areas of technology and technological innovations. Access is unlimited and society as a whole is benefiting from the abundance and availability, from private sectors to public. This access is truly tremendous as it continues to make many advances in areas such as medicine and education,…
Descriptors: Information Technology, Critical Thinking, Internet, Safety
McKee, Shari Turner – ProQuest LLC, 2013
Between 2002 and 2012, information technology (IT) procedural decisions related to technology, fraud, bias, greed, and misleading information increased cost by more than $44 billion. The purpose of this phenomenological study was to explore IT professionals' experiences of IT procedural decisions. The research questions were intended to learn from…
Descriptors: Information Technology, Professional Personnel, Decision Making, Corporations
Li, Zhepeng – ProQuest LLC, 2013
Link recommendation, which suggests links to connect currently unlinked users, is a key functionality offered by major online social networking platforms. Salient examples of link recommendation include "people you may know"' on Facebook and "who to follow" on Twitter. A social networking platform has two types of stakeholder:…
Descriptors: Social Networks, Hypermedia, Use Studies, Users (Information)
Kurien, Sam – ProQuest LLC, 2013
The purpose of the study was to explore whether there are relationships between elements of information technology (IT) governance, strategic planning, and strategic functions among senior and mid-level management at medium-scaled software development firms. Several topics and models of IT governance literature were discussed and the gap in…
Descriptors: Correlation, Information Technology, Governance, Strategic Planning
An, SangJin; Lee, Eunkyoung; Lee, YoungJun – International Association for Development of the Information Society, 2013
Korean government aims to implement SMART education nationwide, so it is planning many ways to provide digital learning contents. There are some ways of distributing digital contents, and each way has its own characteristics. Edunet is a nationwide system for providing educational resource. Cyber Home Learning System is a regional service which…
Descriptors: Electronic Learning, Educational Resources, Supplementary Reading Materials, Textbooks
Pages: 1  |  ...  |  424  |  425  |  426  |  427  |  428  |  429  |  430  |  431  |  432  |  ...  |  1423