Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Diffusion of innovation (2)
- Game (2)
- K-12 (2)
- 21st century (1)
- ADDIE (1)
-
- Behavior (1)
- Business technology (1)
- Charter Schools (1)
- Communities of practice (1)
- Competencies (1)
- Disruptive innovation (1)
- ELearning (1)
- Education (1)
- Educational robotics (1)
- Electronic health record (1)
- Electronic medical record (1)
- Elementary Students (1)
- Faculty perceptions (1)
- Health information technology (1)
- InfoSec (1)
- Informatics (1)
- Innovation strategies (1)
- Instructional strategies (1)
- Integration of new technology (1)
- Mobile (1)
- Music (1)
- Nursing competencies (1)
- Nursing informatics competency (1)
- Online learning (1)
- Problem-based learning (1)
Articles 1 - 11 of 11
Full-Text Articles in Education
Applying Modern Software Development Methodologies To Elearning, Martin Tyszka
Applying Modern Software Development Methodologies To Elearning, Martin Tyszka
Mathematics and Computer Science Capstones
Modern rapid application and agile development methodologies have been key to getting software to market quickly and ensuring that it meets customer needs. The improvements brought about by these methodologies are not limited to the product, but also improve the development process through the feedback approach integral to the methodology. eLearning, the content and technology that enables learning via the Internet, has been adopted by businesses based on its advantages in lower costs, increased productivity, and flexibility when compared to traditional training approaches. This has resulted in a growth in this area. eLearning has been developed following tradition Instructional Design …
Mining Helpdesk Databases For Professional Development Topic Discovery, Joel T. Lowsky
Mining Helpdesk Databases For Professional Development Topic Discovery, Joel T. Lowsky
All Theses And Dissertations
This single-site, instrumental case study created and tested a methodological road map by which academic institutions can use text data mining techniques to derive technology skillset weaknesses and professional development topics from the site’s technical support helpdesk database. The methods employed were described in detail and applied to the helpdesk database of an independent, co-educational boarding high school in the northeastern United States. Standard text data mining procedures, including the formation of a wordlist (frequently occurring terms), and the creation and application of clustering (automated data grouping) and classification (automated data labeling) models generated meaningful and revealing themes from the …
Music Times: A Music Learning Game, Emily Woo
Music Times: A Music Learning Game, Emily Woo
Computer Science and Software Engineering
Music Times is a two dimensional educational video game with the purpose of gamifying learning of musical concepts. It has elements of adventure and visual novel games, and incentivizes the player to learn music to explore new levels. It is developed in the Unity game engine, scripted in C#, and targeted for mobile devices. It has six working levels: three lesson levels and three corresponding challenge levels. Each level contains slight differences in visual and aural feel.
Zuca Words, Lancelot Jeff-Macauley Jr.
Zuca Words, Lancelot Jeff-Macauley Jr.
Mathematics and Computer Science Capstones
A small educational website geared towards helping Kindergarten students practice their sight words through a few fun online games.
How Attitude Toward The Behavior, Subjective Norm, And Perceived Behavioral Control Affects Information Security Behavior Intention, David Philip Johnson
How Attitude Toward The Behavior, Subjective Norm, And Perceived Behavioral Control Affects Information Security Behavior Intention, David Philip Johnson
Walden Dissertations and Doctoral Studies
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and …
Strategies For Integrating Technological Innovations In Small Businesses, Petra Samuel
Strategies For Integrating Technological Innovations In Small Businesses, Petra Samuel
Walden Dissertations and Doctoral Studies
The effective integration of technological innovation is vital to the success of small businesses and can catapult growth and profitability. Some business managers and supervisors, however, may not have a firm understanding of strategies for integrating technological innovations in businesses; this lack of knowledge may result in employee frustration and costly roadblocks to achieving business objectives. This case study was conducted to identify the strategies used by business managers and supervisors to integrate technological innovations in small businesses. Christensen's theory of disruptive innovation and Rogers' theory of diffusion of innovation served as the conceptual framework. Ten business managers and supervisors …
Educating Nurses On Workflow Changes From Electronic Health Record Adoption, Rhoda Lynn Atienza San Jose
Educating Nurses On Workflow Changes From Electronic Health Record Adoption, Rhoda Lynn Atienza San Jose
Walden Dissertations and Doctoral Studies
Workflow issues related to adoption of the electronic health record (EHR) has led to unsafe workarounds, decreased productivity, inefficient clinical documentation and slow rates of EHR adoption. The problem addressed in this quality improvement project was nurses' lack of knowledge about workflow changes due to EHR adoption. The purpose of this project was to identify changes in workflow and to develop an educational module to communicate the changes. This project was guided by both the ADDIE model (analysis, design, development, implementation, and evaluation) and the diffusion of innovations theory. Five stages were involved: process mapping, cognitive walkthrough, eLearning module development, …
Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas
Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas
Walden Dissertations and Doctoral Studies
Millions of dollars have been spent to acquire educational computing tools, and many education, government, and business leaders believe that investing in these computing tools will improve teaching and learning. The purpose of this quantitative study was to determine whether charter school educators face technological barriers hindering them from incorporating technology into their classrooms. If they experienced self-efficacy issues integrating technology in their classrooms and if they believed their students were technologically prepared as 21st century professionals. A 5-point Likert scale survey, validated by a pilot study, was completed by 61 charter high school teachers. Their responses were analyzed, scores …
Evaluating Intention To Use Remote Robotics Experimentation In Programming Courses, Pericles Leng Cheng
Evaluating Intention To Use Remote Robotics Experimentation In Programming Courses, Pericles Leng Cheng
Walden Dissertations and Doctoral Studies
The Digital Agenda for Europe (2015) states that there will be 825,000 unfilled vacancies for Information and Communications Technology by 2020. This lack of IT professionals stems from the small number of students graduating in computer science. To retain more students in the field, teachers can use remote robotic experiments to explain difficult concepts. This correlational study used the unified theory of acceptance and use of technology (UTAUT) to examine if performance expectancy, effort expectancy, social influence, and facilitating conditions can predict the intention of high school computer science teachers in Cyprus, to use remote robotic experiments in their classes. …
Faculty Perceptions Of Instructional Strategies That Foster Student Engagement In Online Courses, Sharon M. Hope
Faculty Perceptions Of Instructional Strategies That Foster Student Engagement In Online Courses, Sharon M. Hope
Walden Dissertations and Doctoral Studies
Developing online instructional strategies for increasing student engagement and success is significant locally and nationally due to growth in the online field, advances in technology, and the need for colleges to maximize student success. This study stemmed from the desire of administrators at an upstate New York private college to discover additional ways to design and deliver effective online instruction. The purpose of this qualitative instrumental case study was to discover faculty perceptions of and experiences with instructional strategies that they used to foster student engagement in online learning. Kearsley and Shneiderman's engagement theory formed the study's conceptual framework. Ten …
Nursing Informatics Competency Program, Kristina Ann Dunn
Nursing Informatics Competency Program, Kristina Ann Dunn
Walden Dissertations and Doctoral Studies
Currently, C Hospital lacks a standardized nursing informatics competency program to validate nurses' skills and knowledge in using electronic medical records (EMRs). At the study locale, the organization is about to embark on the implementation of a new, more comprehensive EMR system. All departments will be required to use the new EMR, unlike the current policy that allows some areas to still document on paper. The Institute of Medicine, National League of Nursing, and American Association of Colleges of Nursing support and recommend that information technology be an essential core competency for nurses. Evidence of the need for nursing informatic …