Essays about: "research methodology of training and development"
Showing result 11 - 15 of 51 essays containing the words research methodology of training and development.
-
11. A Vulnerability Assessment Approach for Home Networks : A case of Cameroon
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : The research highlights the importance of vulnerability assessment in evaluating the effectiveness of security mechanisms in computer and network systems. While vulnerability assessment is commonly practiced by companies and businesses, it is often underlooked in the context of home networks. READ MORE
-
12. VIRTUAL ONBOARDING TRAINING FOR NEWCOMERS’ LEARNING OF REMOTE WORKING TOOLS
University essay from Göteborgs universitet/Institutionen för pedagogik, kommunikation och lärandeAbstract : Purpose: The overall purpose of this study is to understand newcomers’ learning of remote working tools concerning their adaptation to virtual teams and how virtual onboarding training can support them. Newcomers here are newly joined members of a workplace, and virtual teams are organisations operated by geographically distributed people relying on information and communication technologies. READ MORE
-
13. Prosody and emotion: Towards the development of an emotional agent Emotional evaluation of news reports: production and perception experiments
University essay from Göteborgs universitet / Institutionen för filosofi, lingvistik och vetenskapsteoriAbstract : There is a recognised need for more research on the topic of emotion recognition from speech, and clear and defined methodology in this area is still lacking. Most studies in the field of emotional speech recognition and classification usually focus on acted speech as the data source; consequently, other methods that capture more natural speech are left aside. READ MORE
-
14. Integrating security into agile software development : A case study on the role of inertia
University essay from Uppsala universitet/Avdelningen för visuell information och interaktionAbstract : The security directives at Ericsson Group IT have recently been re-worked to apply to modern security requirements. For Ericsson's software development teams developing internal applications, security tools have been implemented into the daily workflow to follow these new directives. READ MORE
-
15. No child left behind : The implementation of inclusive education in Southern Africa
University essay from Jönköping University/HLK, CHILDAbstract : Background: Every child deserves to learn in an environment that is tailored to their specific needs. Inclusive education offers a wide range of benefits, from social, and emotional to academic achievement. READ MORE