Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Networks | 11 |
Guidelines | 11 |
Information Technology | 6 |
Higher Education | 4 |
Universities | 4 |
Foreign Countries | 3 |
Information Security | 3 |
Information Systems | 3 |
Teaching Methods | 3 |
Telecommunications | 3 |
Case Studies | 2 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 4 |
Reports - Evaluative | 3 |
Reports - Research | 3 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Audience
Location
Bulgaria | 1 |
Congo | 1 |
Iran | 1 |
Texas (Dallas) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gallagher, Michael – Discourse: Studies in the Cultural Politics of Education, 2020
This paper concerns children's relations with the geological aspects of digital media technologies. Using ideas from media theory, I develop a new conceptual framework for childhood studies research on digital media that goes beyond the dominant focus on children's use of technology. I argue that studies of use would benefit from being linked up…
Descriptors: Geology, Information Technology, Climate, Local Issues
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Nedyalkova, Anna; Bakardjieva, Teodora; Nedyalkov, Krasimir – International Association for Development of the Information Society, 2016
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better…
Descriptors: Information Security, Information Systems, Computer Networks, Guidelines
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Iyer, Viswanathan K. – Education and Information Technologies, 2017
This paper addresses the issue of effective content-delivery of Computer Science subjects taking advantage of a university intranet. The proposal described herein for teaching a subject like Combinatorics and Graph Theory (CGT) is to supplement lectures with a moderated online forum against an associated intranet portal, which is referred to as a…
Descriptors: Computer Networks, Computer Science Education, Universities, Mathematical Concepts
Akhavan, Peyman; Arefi, Majid Feyz – Interdisciplinary Journal of E-Learning and Learning Objects, 2014
The purpose of this study is to obtain suitable quality criteria for evaluation of electronic content for virtual courses. We attempt to find the aspects which are important in developing e-content for virtual courses and to determine the criteria we need to judge for the quality and efficiency of learning objects and e-content. So we can classify…
Descriptors: Electronic Learning, Classification, Educational Technology, Course Content
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Blackbourn, J. M.; Fillingim, Jennifer G.; McCelland, Susan; Elrod, G. Franklin; Medley, Meagan B.; Kritsonis, Mary Alice; Ray, Jan – Journal of Instructional Psychology, 2008
This study examines the use of wireless laptop technology to support the application of problem-based learning (PBL) in a special education methods course. This field based course used a progressive disclosure process in weekly seminars to address issues posed in a case study. Eight scenarios, all related to the case, were presented to upper level…
Descriptors: Preservice Teachers, Methods Courses, Teacher Education, Group Discussion
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security