References of "Schiltz, Jang 50003012"
     in
Bookmark and Share    
Full Text
See detailZwei IT-Sicherheitsmethoden im Vergleich: Mehari versus BSI IT-Grundschutz
Dagorn, Nathalie; Schiltz, Jang UL

E-print/Working paper (2008)

Detailed reference viewed: 92 (3 UL)
Full Text
Peer Reviewed
See detailDeveloping and Evaluating a Computerized Adaptive Mathematical Test
Schiltz, Jang UL

in Stemmler, Mark; Lautsch, Erwin; Martinke, Dirk (Eds.) Configural Frequency Analysis (CFA) and other non-parametrical methods: Gustav A. Lienert Memorial Issue. (2008)

The theoretical basis underlying the construction of a CAT is summed up and the item response theory explained. In comparison with a classical paper-and-pencil test, the characteristics and the advantages ... [more ▼]

The theoretical basis underlying the construction of a CAT is summed up and the item response theory explained. In comparison with a classical paper-and-pencil test, the characteristics and the advantages of a CAT are exposed. After performing a thorough analysis of the data, we developed a CAT based on the responses of 3590 children to a standardized mathematical test. The software presents a great amount of flexibility and allows treating multiple-choice items, as well as items with free response options and graphical items. Some results of an empirical evaluating study are presented. We showed that qualities of power, flexibility and economy of time of the CAT do not imply the loss of the classical psychometric properties of a paper-and-pencil test; we analyze the carry-over effect between the computerized and the paper-and-pencil test situation and as well as the relations between mathematical skills and general cognitive abilities. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
See detailProcess Reference Model "IT Grundschutz"
Asselborn, Jean-Claude; Dagorn, Nathalie; Niederkorn, Philippe et al

Report (2006)

Detailed reference viewed: 59 (0 UL)
Full Text
See detailProcess Reference Model "Mehari"
Asselborn, Jean-Claude; Dagorn, Nathalie; Niederkorn, Philippe et al

Report (2006)

Detailed reference viewed: 74 (0 UL)
Full Text
See detailLes modes opéatoires de la cryptographie symétrique
Schiltz, Jang UL

Report (2003)

Detailed reference viewed: 57 (0 UL)