Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 25 |
Descriptor
Source
Author
Arya, Harsh Bardhan | 1 |
Bergo, Rolv Alexander | 1 |
Breeding, Marshall | 1 |
Breitbach, William | 1 |
Brown, Brandon R. | 1 |
Bucher, Tobias | 1 |
Carmichael, Patrick | 1 |
Cheshire, Coye | 1 |
Chretien, Wendy | 1 |
Cundiff, Jacob | 1 |
Dutt, Abhijit | 1 |
More ▼ |
Publication Type
Journal Articles | 22 |
Reports - Descriptive | 14 |
Reports - Research | 4 |
Dissertations/Theses -… | 3 |
Reports - Evaluative | 3 |
Opinion Papers | 1 |
Education Level
Higher Education | 12 |
Adult Education | 5 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Kindergarten | 1 |
Audience
Media Staff | 1 |
Location
California | 1 |
Canada | 1 |
Hawaii | 1 |
Missouri | 1 |
Nigeria | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Odigie, Imoisili Ojeime; Gbaje, Ezra Shiloba – E-Learning and Digital Media, 2017
Online video streaming is a learning technology used in today's world and reliant on the availability of bandwidth. This research study sought to understand the perceptions of network gatekeepers about bandwidth and online video streams in Ahmadu Bello University, Nigeria. To achieve this, the interpretive paradigm and the Network Gatekeeping…
Descriptors: Foreign Countries, Video Technology, Qualitative Research, Case Studies
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Bergo, Rolv Alexander – ProQuest LLC, 2013
Technology development is moving rapidly and our dependence on information services is growing. Building a broadband infrastructure that can support future demand and change is therefore critical to social, political, economic and technological developments. It is often up to local policy makers to find the best solutions to support this demand…
Descriptors: Delphi Technique, Computer Simulation, Computer Software, Prediction
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Arya, Harsh Bardhan; Mishra, J. K. – Journal of Library & Information Services In Distance Learning, 2012
The paper describes the theory and definition of the practice of librarianship, specifically addressing how Web 2.0 technologies (tools) such as synchronous messaging, collaborative reference service and streaming media, blogs, wikis, social networks, social bookmarking tools, tagging, RSS feeds, and mashups might intimate changes and how…
Descriptors: Web Sites, Electronic Publishing, Social Networks, Reference Services
Quint-Rapoport, Mia – Policy Futures in Education, 2012
This article addresses the question of understanding more about networked universities by looking at open source software developers working in academic contexts. It sketches their identities and work as an emerging professional community that both relies upon and develops digitally mediated networks and contributes to the progress of academic…
Descriptors: Computer Software, Open Source Technology, Computer System Design, Human Factors Engineering
Breitbach, William – Computers in Libraries, 2012
Competition in the virtual reference market got really hot this past summer. Recent developments in virtual reference offerings suggest the market is much more dynamic than most people would have imagined a short time ago. With Google's acquisition of Meebo and its subsequent decision to shut down the chat widget service, many libraries scrambled…
Descriptors: Library Services, Reference Services, Library Development, Online Systems
Kwanya, Tom; Stilwell, Christine; Underwood, Peter G. – Journal of Librarianship and Information Science, 2013
Using the "point oh" naming system for developments in librarianship is attracting debate about its appropriateness, basis and syntax and the meaning and potential of Library 2.0. Now a new term, Library 3.0, has emerged. Is there is any significant difference between the two models? Using documentary analysis to explore the terms, the…
Descriptors: Information Networks, Library Automation, Library Development, Library Services
Cundiff, Jacob; McCallum, Taylor; Rich, Andrew; Truax, Michael; Ward, Tamara; Havelka, Douglas – Journal of Information Systems Education, 2015
The launch of HealthCare.gov, the website of the Affordable Care Act (AKA Obamacare), was a major public relations disaster for the Obama administration. This case examines some of the factors that contributed to the failure of the launch and then details how Optum, an information technology service provider, considered the opportunity provided by…
Descriptors: Case Studies, Information Systems, Database Management Systems, Online Vendors
Dutt, Abhijit – ProQuest LLC, 2013
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can…
Descriptors: Essays, Economic Factors, Information Technology, Technology Integration
Breeding, Marshall – Computers in Libraries, 2010
People live in an era of social, enterprise-oriented, and increasingly cloud-based technology; a dramatic shift away from stand-alone isolated silos that previously dominated. Computing systems can flourish today only when built to easily exchange data and services. An application that stands alone may provide practical functionality but may not…
Descriptors: Computer Software, Libraries, Educational Technology, Internet
Trust, Torrey – Journal of Digital Learning in Teacher Education, 2012
In the information age, students must learn to navigate and evaluate an expanding network of information. Highly effective teachers model this process of information analysis and knowledge acquisition by continually learning through collaboration, professional development, and studying pedagogical techniques and best practices. Many teachers have…
Descriptors: Web Sites, Web 2.0 Technologies, Computer Software Evaluation, Teacher Collaboration
Chretien, Wendy – Campus Technology, 2008
Emergency notification has become a critical component of every higher education institution's overall emergency plan, as incidents across the country have galvanized campus safety officials to find more ways to notify their campus populations. Emergency notification systems can help get and keep students, faculty members, and staff out of harm's…
Descriptors: School Security, School Safety, Emergency Programs, Crisis Management
Emery, Jill – Journal of Electronic Resources Librarianship, 2009
Twitter provides rapid information in a short form, and it is extremely easy to follow the updates of others because of myriad software applications with which it works on both mobile devices and traditional computing hardware. Currently, most academic librarians are using Twitter primarily as a tool at library conferences and seminars to capture…
Descriptors: Internet, Librarians, Use Studies, Information Networks
Martinez, Michael E.; Peters Burton, Erin E. – Educational Media International, 2011
The "cyberinfrastucture" is a broad informational network that entails connections to real-time data sensors as well as tools that permit visualization and other forms of analysis, and that facilitates access to vast scientific databases. This multifaceted network, already a major boon to scientific discovery, now shows exceptional promise in…
Descriptors: Visualization, Educational Technology, STEM Education, Cognitive Processes
Previous Page | Next Page ยป
Pages: 1 | 2