NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 7,336 to 7,350 of 21,316 results Save | Export
Mulhearn, Michael F. – ProQuest LLC, 2011
Project management (PM) and systems engineering (SE) are essential skills in information technology (IT). There is an abundance of information available detailing the comprehensive bodies of knowledge, standards, and best practices. Despite the volume of information, there is surprisingly little information about how to tailor PM and SE tasks for…
Descriptors: Information Technology, Technology Planning, Artificial Intelligence, Information Systems
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Simeone, Michael – ProQuest LLC, 2011
Challenging the argument that liberal humanism faces extinction in the face of ubiquitous digital technologies, my dissertation analyzes the ways in which consumer electronics reinscribe the human subject as a privileged category in the information age. Through spaces like the Matrix, Windows 7, or even the single row of play controls on a…
Descriptors: Electronics, Cybernetics, Humanism, Fiction
Price, Kathleen J. – ProQuest LLC, 2011
The use of information technology is a vital part of everyday life, but for a person with functional impairments, technology interaction may be difficult at best. Information technology is commonly designed to meet the needs of a theoretical "normal" user. However, there is no such thing as a "normal" user. A user's capabilities will vary over…
Descriptors: Functional Behavioral Assessment, Interaction, Information Technology, Correlation
Liu, Dejang – ProQuest LLC, 2011
Belenky et al. (1997) found five ways of women's knowing (silent knowing, receiving knowing, subjective knowing, procedural knowing, and constructed knowing) according to the study conducted on women who majored in the social sciences and liberal arts. This study is built on the same model found by Belenky et al.'s study to collect open-ended…
Descriptors: Females, Epistemology, Two Year College Students, Community Colleges
Aponte, Jorge I. – ProQuest LLC, 2011
This qualitative case study explored the employee use of information and communication technologies (ICT) in a southern Puerto Rico healthcare organization. Thirty-two employees of a southern Puerto Rico healthcare organization provided their perspectives regarding their use of ICT in the workplace. The findings distinguished how employees use ICT…
Descriptors: Information Technology, Employees, Employee Attitudes, Qualitative Research
Cha, Un Un – ProQuest LLC, 2011
The current qualitative phenomenological study focused on how information technology (IT) leaders managed IT investment during the global economic downturn in the Taiwan IT industry. Organizations around the world spend billions of dollars on IT-related products and services every year. Determining an effective IT investment plan is a complex task…
Descriptors: Foreign Countries, Information Technology, Qualitative Research, Phenomenology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bergen, Doris; Davis, Darrel – American Journal of Play, 2011
Many early developmental theorists such as Freud, Erikson, Piaget, and Vygotsky suggested that play--which the authors of this article define as both playful activity and playful thought--had the power to influence the moral emotions, behaviors, and reasoning of children. More recent researchers have also found evidence of moral development in…
Descriptors: Play, Moral Development, Video Games, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Rader, Heidi B. – Journal of Extension, 2011
The first Extension-authored link in Google Search (2011a) for "how to garden" was ranked an abysmal 82nd. Worse, Internet users selected the top-ranked site significantly more often than they selected the second-ranked one, and they rarely selected any site ranked lower than #10 (Granka, Joachims, & Gay, 2004). An…
Descriptors: Internet, Web Sites, Information Technology, Extension Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ohler, Jason – Kappa Delta Pi Record, 2011
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are both proactive and aggressive. Taking this approach will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age…
Descriptors: Altruism, Ethical Instruction, Boards of Education, Values Education
Peer reviewed Peer reviewed
Direct linkDirect link
Graham, Charles R. – Computers & Education, 2011
The technological pedagogical content knowledge (TPACK) framework is increasing in use by educational technology researchers around the world who are interested in issues related to technology integration. Much that is good can be found in the TPACK framework; however considerable theoretical work needs to be done if TPACK research is to cohere…
Descriptors: Technology Integration, Educational Technology, Pedagogical Content Knowledge, Researchers
Peer reviewed Peer reviewed
Direct linkDirect link
Lutzer, Carl V. – PRIMUS, 2011
We propose an alternative to the standard introduction to the derivative. Instead of using limits of difference quotients, students develop Taylor expansions of polynomials. This alternative allows students to develop many of the central ideas about the derivative at an intuitive level, using only skills and concepts from precalculus, and…
Descriptors: Calculus, Mathematics Instruction, Graphs, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hess, Mary E. – Religious Education, 2011
Emerging social media that build on digital technologies are reshaping how we interact with each other. Religious education and identity formation within these new cultural flows demands recognition of the shifts in authority, authenticity, and agency that are taking place, as well as the challenges posed by "context collapse." Digital…
Descriptors: Religious Education, Social Networks, Self Concept, Story Telling
Peer reviewed Peer reviewed
Direct linkDirect link
Peyala, Venkataramana – Program: Electronic Library and Information Systems, 2011
Purpose: The purpose of this article is to present the results of a research study conducted to assess the perceptions and opinions of 100 staff working in libraries on the impact of using IT on library housekeeping operations and information services, in eight central university libraries in India. Design/methodology/approach: Data gathering…
Descriptors: Foreign Countries, Academic Libraries, Information Technology, Library Personnel
Pages: 1  |  ...  |  486  |  487  |  488  |  489  |  490  |  491  |  492  |  493  |  494  |  ...  |  1422