NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 7,621 to 7,635 of 21,316 results Save | Export
Vyas, Avinash – ProQuest LLC, 2011
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Descriptors: Computers, Navigation, Experiments, Comparative Analysis
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Cuthrell, Michael Gerard – ProQuest LLC, 2011
Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…
Descriptors: Information Technology, Information Systems, Telecommunications, Expertise
Peer reviewed Peer reviewed
Direct linkDirect link
Park, Hee Sun; Smith, Sandi; Klein, Katherine A. – Journal of Drug Education, 2011
This study examined estimation and accuracy of normative perceptions for students during one celebratory drinking occasion. Students who drank on St. Patrick's Day overestimated the percentage of others who also drank, whereas the students who did not drink on St. Patrick's Day underestimated the percentage of others who also did not drink. The…
Descriptors: Drinking, Student Behavior, College Students, Student Attitudes
Yonan, Jesay; Bardick, Angela D.; Willment, Jo-Anne H. – Canadian Journal of Counselling and Psychotherapy, 2011
Cellular telephones and social networking sites pose new challenges to the maintenance of therapeutic boundaries. One such difficulty is the possible development of dual relationships between clients and counselling professionals as a result of communicating by these means. Most regulatory bodies advise professional counsellors and psychologists…
Descriptors: Psychologists, Ethics, Therapy, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Seif, Hinda – New Directions for Child and Adolescent Development, 2011
Young immigrants are challenging the boundaries of citizenship and insisting on their human rights. This chapter examines the civic lives of immigrant youth through the case of Latina/os, exploring the paradox of their apparent low civic education and engagement levels and remarkable participation in recent protests. After an overview of…
Descriptors: Democracy, Information Technology, Developmental Stages, Immigrants
Armbruster, Stephanie; Strasburger, Tom – School Business Affairs, 2011
The economic crisis has caused districts throughout the United States to cut resources and limit spending, particularly with regard to staff. However, the requirements for maintaining safe, efficiently functioning schools and for remaining in compliance with state and federal regulations have not decreased; in many cases, those responsibilities…
Descriptors: Human Resources, School Administration, Automation, Job Simplification
Peer reviewed Peer reviewed
Direct linkDirect link
Beachboard, John; Aytes, Kregg – Journal of Information Technology Education, 2011
Core MBA IT courses have tended to be survey courses that cover important topics but often do not sufficiently engage students. The result is that many top-ranked MBA programs have not found such courses useful enough to include in their core MBA requirements. In this paper, we present a design of an MBA course emphasizing information technology…
Descriptors: Higher Education, Business Administration Education, Introductory Courses, Core Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Awang, Marinah; Ismail, Ramlee; Flett, Peter; Curry, Adrienne – Quality Assurance in Education: An International Perspective, 2011
Purpose: The purpose of this paper is to shed light on changes in the Malaysian education system, with particular reference to the development of Smart Schools, and to evaluate progress with respect to knowledge management in school education. Design/methodology/approach: The research is designed around questionnaires based on a knowledge…
Descriptors: Foreign Countries, Knowledge Management, Educational Change, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Abdous, M'hammed – Journal of Higher Education Policy and Management, 2011
In this paper, a conceptual and operational framework for business process reengineering in higher education is proposed. The outline of a sequential and non-linear four-step framework designed to reengineer higher education administrative and academic processes is presented. The first two steps, initiating and analysing, are used to examine,…
Descriptors: Higher Education, Total Quality Management, Administrative Organization, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Lobuts, John, Jr. – Simulation & Gaming, 2011
This autobiography is an attempt to write and share the author's personal story, first as a learner, then as a teacher. It also attempts to share the educational gifts initially bestowed and then passed on from one generation to the next. The writer will talk about how games and simulations were first inherited and learned, then employed in…
Descriptors: Play, Literature Appreciation, Autobiographies, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tosun, Nilgun; Baris, M. Fatih – Turkish Online Journal of Educational Technology - TOJET, 2011
Advances in information and communication technologies, shortly called as ICT, require educators to present a more efficient and modern education by using these technologies. Therefore; the role of ICT in the development of education has been a popular research subject nowadays. Even not only education content but it has started to be dwelt on how…
Descriptors: Educational Technology, Educational Change, Foreign Countries, Educational Improvement
Peer reviewed Peer reviewed
Direct linkDirect link
Shih, Ching-Hsiang; Shih, Ching-Tien; Pi, Pi-Hsiang – Research in Developmental Disabilities: A Multidisciplinary Journal, 2011
The latest research adopting software technology to improve pointing performance is through an Automatic Target Acquisition Program (ATAP), where the user can click on the mouse button when a dashed line is aimed at the desired target, instead of moving the cursor to the target. However, ATAP has one limitation--it cannot benefit from Mouseover…
Descriptors: Intervention, Computer Simulation, Developmental Disabilities, Program Effectiveness
Pages: 1  |  ...  |  505  |  506  |  507  |  508  |  509  |  510  |  511  |  512  |  513  |  ...  |  1422