Sciweavers

432 search results - page 39 / 87
» Education, Outreach, and Training
Sort
View
IVA
2009
Springer
15 years 6 months ago
Predicting User Psychological Characteristics from Interactions with Empathetic Virtual Agents
Enabling virtual agents to quickly and accurately infer users’ psychological characteristics such as their personality could support a broad range of applications in education, t...
Jennifer L. Robison, Jonathan P. Rowe, Scott W. Mc...
IFIP
1997
Springer
15 years 4 months ago
Representing a body of knowledge for teaching, learning and assessment
: National and international standards for professional groups may become a dominant and governing force as internet-based professional training becomes universally accepted. Educa...
Don Sheridan, David White
ISSA
2008
15 years 1 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
SEC
2007
15 years 1 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 1 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...