NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20242
Since 2021 (last 5 years)4
Since 2016 (last 10 years)7
Since 2006 (last 20 years)12
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Whitacre, Brian – Journal of Extension, 2019
In today's society, individuals and households without reliable Internet connections are increasingly at risk of facing significant disadvantages. This article describes an Extension-led pilot project in Oklahoma centered on addressing this issue through the establishment of a hotspot lending program in four rural libraries. Through the program,…
Descriptors: Program Development, Rural Areas, Public Libraries, Library Services
Peer reviewed Peer reviewed
Direct linkDirect link
Edwards, Darla – Learning Professional, 2019
A networked improvement community can be a tremendous resource for people who share a common interest and desire to learn from each other, and, thanks to technology, this can occur even when participants are separated by a large distance. This article discusses Virginia Advanced Study Strategies' Rural Math Innovation Network, a four-year project…
Descriptors: Networks, Rural Schools, Middle Schools, High Schools
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Alberta Education, 2009
Alberta's education system is a leader in the use of technology in teaching and learning. New information technologies create options for how teachers teach, how students learn, and how classrooms look and operate. This document chronicles the history of computer technology in Alberta from 1975-2009. The information is arranged in a tabulated…
Descriptors: Computers, Foreign Countries, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
O'Donnell, Tom – EDUCAUSE Quarterly, 2009
A decade ago, people wanting to practice "green computing" recycled their printer paper, turned their personal desktop systems off from time to time, and tried their best to donate old equipment to a nonprofit instead of throwing it away. A campus IT department can shave a few watts off just about any IT process--the real trick is planning and…
Descriptors: Energy Conservation, Computer Centers, Energy Management, Facility Improvement
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Retalis, Symeon; Georgiakakis, Petros; Dimitriadis, Yannis – Computer Science Education, 2006
Design pattern creation, especially in the e-learning domain, is a highly complex process that has not been sufficiently studied and formalized. In this paper, we propose a systematic pattern development cycle, whose most important aspects focus on reverse engineering of existing systems in order to elicit features that are cross-validated through…
Descriptors: Validated Programs, Instructional Design, Courseware, Electronic Learning
Alberta Education, 2006
This literature review is intended to provide practical information; lessons learned and promising practices which have been drawn from recent Kindergarten to Grade 12 (K-12) one-to-one mobile computing research reports and related articles. The information is presented in the form of answers to the following questions: (1) How is one-to-one…
Descriptors: Technical Support, Long Range Planning, Holistic Approach, Computer Software