NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Mark S. Kim – ProQuest LLC, 2021
The late Paul Gray was a pioneer in the research tradition of IS education and curriculum (Gorgone and Gray 1999). Recently, the joint ACM/AIS IS2020 Task force published a new "Competency Model" to improve and update the IS curriculum (Leidig and Anderson 2020). This dissertation contributes to this research tradition by introducing a…
Descriptors: Information Systems, Computer Science Education, Digital Literacy, Skill Development
Michelle Marie Carter – ProQuest LLC, 2022
The increase in distance learning offerings and the deficit in providing an equivalent engagement mechanism for haptic subjects for online learners is stimulating educators to seek new pedagogical methods to meet the needs of the curriculum. A quantitative quasi-experimental study deploying a two nonequivalent groups design was conducted to…
Descriptors: Computer Science Education, Computers, Simulated Environment, Computer Simulation
Khan, Kamal Waris – ProQuest LLC, 2012
Mainframe is used for hosting large commercial databases, transaction servers and applications that require a greater degree of reliability, scalability and security. Customer Information Control System (CICS) is a mainframe software framework for implementing transaction services. It is designed for rapid, high-volume online processing. In order…
Descriptors: Information Systems, Computers, Database Management Systems, Computer Oriented Programs
Mussa, Constance C. – ProQuest LLC, 2011
In recent years, many health care organizations have begun to take advantage of computerized information systems to facilitate more effective and efficient management and processing of information. However, commensurate with the vastly innovative enhancements that computer technology has contributed to traditional paper-based health care…
Descriptors: Information Management, Health Insurance, Confidentiality, Intention
Adkins, Joni K. – ProQuest LLC, 2011
Numerous studies have shown that spreadsheets used in companies often have errors which may affect the quality of the decisions made with these tools. Many businesses are unaware or choose to ignore the risks associated with spreadsheet use. The intent of this study was to learn more about the characteristics of spreadsheet end user developers,…
Descriptors: Structural Equation Models, Self Efficacy, Computer Software, Problem Solving
Mulrooney, Timothy J. – ProQuest LLC, 2009
A Geographic Information System (GIS) serves as the tangible and intangible means by which spatially related phenomena can be created, analyzed and rendered. GIS metadata serves as the formal framework to catalog information about a GIS data set. Metadata is independent of the encoded spatial and attribute information. GIS metadata is a subset of…
Descriptors: Geographic Information Systems, Metadata, Open Source Technology, Computers
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Babu, Rakesh – ProQuest LLC, 2011
The central premise of this research is that blind and visually impaired (BVI) people cannot use the Internet effectively due to accessibility and usability problems. Use of the Internet is indispensable in today's education system that relies on Web-enhanced instruction (WEI). Therefore, BVI students cannot participate effectively in WEI. Extant…
Descriptors: Web Based Instruction, Visual Impairments, Internet, Academic Accommodations (Disabilities)
Miles, Tracy L. – ProQuest LLC, 2009
One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…
Descriptors: Information Systems, Information Technology, Federal Government, Accreditation (Institutions)