Publication Date
In 2024 | 0 |
Since 2023 | 0 |
Since 2020 (last 5 years) | 1 |
Since 2015 (last 10 years) | 3 |
Since 2005 (last 20 years) | 4 |
Descriptor
Biology | 5 |
Information Technology | 4 |
Computer Security | 2 |
Identification | 2 |
Information Security | 2 |
Safety | 2 |
Technology | 2 |
Technology Integration | 2 |
Adult Education | 1 |
Artificial Intelligence | 1 |
Business | 1 |
More ▼ |
Author
Agerwala, Tilak | 1 |
Buerle, Stephen | 1 |
Dorpenyo, Isidore K. | 1 |
Gamble, Cheryl | 1 |
Kim, Jungsun | 1 |
Tappert, Charles C. | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Adult Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dorpenyo, Isidore K. – Journal of Technical Writing and Communication, 2022
In this article, I focus on two competing technical communication discourses used to represent the biometric technology Ghana adopted in 2012 and subsequent elections to demonstrate how communication about technology could potentially marginalize local, nondominant knowledge systems whereas it privileges global, dominant knowledge systems.…
Descriptors: Elections, Technical Writing, Communications, Technology
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Buerle, Stephen – ProQuest LLC, 2017
This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of…
Descriptors: Information Security, Information Technology, Research, Technology Integration
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness