DEPENDENT-ALPHA CALCULATOR: TESTING THE DIFFERENCES BETWEEN DEPENDENT COEFFICIENTS ALPHA
Journal Title: Journal of Applied Quantitative Methods - Year 2011, Vol 6, Issue 2
Abstract
Coefficient alpha (α) was first introduced by Lee J. Cronbach in 1951 and since then it continues to serve as a valuable index of reliability within different areas of research. According to the Social Sciences Citation Index, between 1951 and 2010, Cronbach’s seminar article (Cronbach, 1951) was cited 6,912 times by other published articles and numerous other publications often cite secondary sources in support of the use of coefficient alpha.
Authors and Affiliations
Sabry ABD-EL-FATTAH, Hala HASSAN
Economic Model Cost-satisfaction in Inclusive Education. Based on Research Made in Georgia
This research comprises a brief analysis of the economic model design, projected for poor countries, where complex assessments of the health status, education outcomes and motivation for children with disabilities are im...
Evaluation Methods of The Text Entities
The paper highlights some evaluation methods to assess the quality characteristics of the text entities. The main concepts used in building and evaluation processes of the text entities are presented. Also, some aggregat...
A STEP-WISE METHOD FOR EVALUATION OF DIFFERENTIAL ITEM FUNCTIONING
Item bias or differential item functioning (DIF) has an important impact on the fairness of psychological and educational testing. In this paper, DIF is seen as a lack of fit to an item response (IRT) model. Inferences a...
MONTE CARLO ANALYSIS OF CHANGE POINT ESTIMATORS
We consider several estimators for the change point in a sequence of independent observations. These are defined as the maximizing points of usually used statistics for nonparametric change point detection problems. Our...
Security Management in a Multimedia System
In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the databa...