• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 117
  • 1
  • 1
  • 1
  • Tagged with
  • 125
  • 125
  • 96
  • 57
  • 22
  • 15
  • 14
  • 10
  • 9
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Assessing Behavioral Intention to Use Low Social Presence ICTs For Interpersonal Task Completion among College Students| With Special Consideration toward Short Message Service (SMS) Text-Messaging

Linney, Jeffrey Scott 24 January 2014 (has links)
<p> This study sought to investigate whether the popularity of Information Communication Technologies (ICTs) would impact the behavioral intention (BI) to use of these technologies to aid in interpersonal task completion. Out of the ICTs available today, the most popular is text-messaging, especially among a sizable percentage of the college population. Approximately 600 students at a small, private junior college in eastern North Carolina were invited to participate in this study with a target of 248 responses needed to comprise an adequate sample. A total of 259 usable surveys (n = 259) were received and analyzed.</p><p> Qualitative data collection instruments consisted of an open-ended questionnaire and other open-ended responses that were solicited throughout the data collection phase. Quantitative data collection instruments consisted of a 22&ndash;item Likert-scale survey and a forced-choice ordinal scale instrument that measured computer user self-efficacy (CUSE) and experience using technology (EUT). Situated in the context of academic help-seeking (AHS), vignettes were developed, validated and administered to offer AHS scenarios where a problem was presented and the participants were then asked to reveal which type of ICT he or she would utilize to seek academic help (AH) in that particular situation.</p>
22

Cultural differences in the design of human-computer interfaces a multinational study of university websites /

Callahan, Ewa S. January 2007 (has links)
Thesis (Ph.D.)--Indiana University, School of Information Science, 2007. / Source: Dissertation Abstracts International, Volume: 68-07, Section: A, page: 2703. Adviser: Susan C. Herring. Title from dissertation home page (viewed Apr. 14, 2008).
23

Political judgement in a technological age /

Tabachnick, David E. January 1900 (has links)
Thesis (Ph.D.) - Carleton University, 2003. / Includes bibliographical references (p. 266-279). Also available in electronic format on the Internet.
24

Technology, mathematics and science : an integrated curriculum at Mystic Middle School /

Armitage, William B. January 1999 (has links)
Thesis (M.S.)--Central Connecticut State University, 1999. / " ... submitted in fulfillment of requirements for TE596 [for the degree of Master of Science for the Department of Technology Education]."
25

Exploring the relationship between self-regulating Intentional Internet search (IIS) and critical thinking skills

Wu, Chun-Ping. January 2008 (has links)
Thesis (Ph.D.)--Syracuse University, 2008. / "Publication number: AAT 3323093."
26

Handheld technology impact on student learning /

Corwin, Patricia M. January 2006 (has links) (PDF)
Thesis (M.Ed.)--Regis University, Denver, Colo., 2006. / Title from PDF title page (viewed on Sept. 25, 2006). Includes bibliographical references.
27

Applying the technology acceptance model to online education

Gabbard, Ralph Barnhart. January 2004 (has links)
Thesis (Ph.D.)--Indiana University, 2004. / Source: Dissertation Abstracts International, Volume: 66-01, Section: A, page: 0011. Chair: Javed Mostafa. Title from dissertation home page (viewed Oct. 12, 2006).
28

Website usability evaluation using sequential analysis

Hebb, Christopher Louis. January 2005 (has links)
Thesis (Ph.D.)--Indiana University, Dept. of Instructional Systems Technology, 2005. / Source: Dissertation Abstracts International, Volume: 66-04, Section: A, page: 1328. Adviser: Theodore W. Frick. "Title from dissertation home page (viewed Nov. 13, 2006)."
29

Knowledge sharing among professionals in three online communities

Hew, Khe Foon. January 2006 (has links)
Thesis (Ph.D.)--Indiana University, Dept. of Instructional Systems Technology, 2006. / "Title from dissertation home page (viewed July 5, 2007)." Source: Dissertation Abstracts International, Volume: 67-08, Section: A, page: 2947. Adviser: Thomas A. Brush.
30

Architecting a Cybersecurity Management Framework| Navigating and Traversing Complexity, Ambiguity, and Agility

Tisdale, Susan M. 09 June 2018 (has links)
<p> Despite advancements in technology, countermeasure, and situational awareness, cybersecurity (CS) breaches continue to increase in number, complexity, and severity. This qualitative study is one of a few to comprehensively explore CS management. The study used a systems&rsquo; approach to identify business, socioeconomic, and information technology (IT) factors, and their interrelationships. The study examined IT management frameworks and CS standards and literature. Interviews and a focus group of subject matter experts followed. The research found CS is a leadership, not a technical issue. CS is an ecosystem; its components are interrelated and inseparable, requiring qualitative, subjective, risk and knowledge management interventions. CS, IT, and threats are too complex and volatile for organizations to manage all risks and vulnerabilities in a timely, agile manner. CS lexicons lack uniformity and consistency. An IT management framework is better suited for CS. Companies must segregate and encrypt the most sensitive information and curb their appetites for new, unsecured technology. CS and IT is multilayered, requiring subspecialists, who often serve conflicting business needs and security objectives. Organizations need to minimize mid-level CS management, raise CS to a business level function (not subordinate to IT), and involve cyber specialists at all levels in the business lifecycle. Cross-pollinating people from all business areas, especially from finance, CS, and IT, increases awareness of the others&rsquo; responsibilities and obligations and facilitates more rapid portfolio, lifecycle CS activities, from investments to detection and response activities. Future studies should focus on these issues as critical success factors. Finally, the study of CS requires agile, qualitative, multidisciplinary methodology to produce thick, quick, actionable information.</p><p>

Page generated in 0.0703 seconds