Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 42 |
Descriptor
Source
ProQuest LLC | 42 |
Author
Publication Type
Dissertations/Theses -… | 42 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Adult Education | 2 |
Elementary Secondary Education | 2 |
Secondary Education | 2 |
High School Equivalency… | 1 |
High Schools | 1 |
Two Year Colleges | 1 |
Audience
Location
Ohio | 3 |
Idaho | 2 |
Alabama | 1 |
Egypt | 1 |
Kansas | 1 |
Massachusetts | 1 |
New Jersey | 1 |
New York | 1 |
Nigeria | 1 |
Texas | 1 |
Thailand | 1 |
More ▼ |
Laws, Policies, & Programs
American Recovery and… | 1 |
Race to the Top | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Lisa Claudine Jenkins – ProQuest LLC, 2024
This quantitative non-experimental correlational study aimed to examine the significant association between Information System (IS)/Information Technology (IT)/Business Intelligence System (BIS) project managers' digital leadership skills and BIS project success. It also sought to determine if PMP® certification moderated this relationship. The…
Descriptors: Certification, Leadership Styles, Information Systems, Information Technology
Klose, Erika S. – ProQuest LLC, 2023
As educational practices include foundational and cutting-edge preparation, the value of problem-based instruction employing industry-standard technologies increases. Geospatial technologies (GST), are a group of professional technologies, including GIS (Geographic Information Systems), used by industries to make informed decisions with spatial…
Descriptors: Geographic Information Systems, Technology Uses in Education, Intention, Teacher Attitudes
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Skinner, Ann – ProQuest LLC, 2018
Resource-based theory provided the theoretical foundation to investigate the extent that developer knowledge correlated to success of information technology (IT) development projects. Literature indicated there was a knowledge gap in understanding whether developer information system development, behavior and business knowledge contributed to IT…
Descriptors: Information Technology, Information Systems, Correlation, Prediction
Baker, Ali M. – ProQuest LLC, 2018
Knowledge management (KM) has been determined by many researchers as one of the most important domains within the information systems (IS) field, and knowledge sharing (KS) has been identified as the most vital component of KM. Lack of KS within organizations has been approached from many perspectives. One perspective that has been outlined in…
Descriptors: Correlation, Organizational Culture, Case Studies, Values
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Maghrabi, Rozan Omar – ProQuest LLC, 2017
One of the demonstrators during the 2011 Egyptian revolution tweeted "We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world," thus acknowledging and establishing the fundamental role of social media in the political unrest and revolution against the regime in Egypt. Information Systems (IS) have…
Descriptors: Social Systems, Activism, Social Media, Authoritarianism
DeShield, Leslie A. – ProQuest LLC, 2017
Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.…
Descriptors: Program Implementation, Technology Uses in Education, Handheld Devices, Telecommunications
Okolo, Nkiru Benjamin – ProQuest LLC, 2016
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Descriptors: Information Security, Foreign Countries, Confidentiality, Information Systems
Kochis, Shelia P. – ProQuest LLC, 2013
Children represent the future of mankind and their safety, well-being, and permanency are goals of the Department of Health and Human Services. The Department of Health and Human Services is the primary funding source for child welfare and protection in the United States; their requirements, rules, and laws must be upheld and understood by every…
Descriptors: Information Systems, Automation, Child Welfare, Caseworkers
Kates, Earl B. – ProQuest LLC, 2016
Despite significant investments made by organizations to implement ERP systems and prior research that explored contributing factors of ERP failure, the ERP implementation success rate continues to remain low in practice. Increased technology usage in the workplace coupled with higher dependency on technology to complete project tasks often leads…
Descriptors: Management Systems, Information Systems, Information Technology, Program Implementation
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Carcillo, Anthony Joseph, Jr. – ProQuest LLC, 2013
Although it is assumed that increasing the institutionalization (or maturity) of project management in an organization leads to greater project success, the literature has diverse views. The purpose of this mixed methods study was to examine the correlation between project management maturity and IT/IS project outcomes. The sample consisted of two…
Descriptors: Information Technology, Information Systems, Program Administration, Statistical Analysis
Bishop, Daniel J. – ProQuest LLC, 2013
In an era of professional standards for educators and teacher evaluations linked to measures of student achievement, researchers use data from student information systems to address research questions linking teacher feedback to student achievement. A quantitative study of teacher use of the Skyward student information system (SIS) was conducted…
Descriptors: Secondary School Teachers, Researchers, Statistical Analysis, Difficulty Level
Wallace, Ryan J. – ProQuest LLC, 2013
The purpose of this study was to determine the impact of advanced search and rescue devices and techniques on search duration for general aviation aircraft crashes. The study assessed three categories of emergency locator transmitters, including 121.5 MHz, 406 MHz, and GPS-Assisted 406 MHz devices. The impact of the COSPAS-SARSAT organization…
Descriptors: Aviation Education, Accidents, Aviation Technology, Crime