NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dorpenyo, Isidore K. – Journal of Technical Writing and Communication, 2022
In this article, I focus on two competing technical communication discourses used to represent the biometric technology Ghana adopted in 2012 and subsequent elections to demonstrate how communication about technology could potentially marginalize local, nondominant knowledge systems whereas it privileges global, dominant knowledge systems.…
Descriptors: Elections, Technical Writing, Communications, Technology
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Buerle, Stephen – ProQuest LLC, 2017
This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of…
Descriptors: Information Security, Information Technology, Research, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness