Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Campus Technology | 3 |
Journal of Information… | 2 |
Behavioral & Social Sciences… | 1 |
Campus-Wide Information… | 1 |
ProQuest LLC | 1 |
School Library Journal | 1 |
Teacher Education Quarterly | 1 |
Turkish Online Journal of… | 1 |
Author
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 7 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 9 |
Adult Education | 2 |
Elementary Secondary Education | 1 |
Audience
Teachers | 1 |
Location
Florida | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Raths, David – Campus Technology, 2011
In this era of political rancor when everything is a zero-sum game, it is refreshing to think that two parties could actually come together to create a win-win situation. That is exactly what is happening, though, as a number of universities take on the role of application service provider (ASP) for smaller schools. It is not all confetti and…
Descriptors: Intercollegiate Cooperation, Partnerships in Education, Information Networks, Computer Networks
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2010
Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…
Descriptors: Computer Software, Internet, Computer Software Evaluation, Computer Networks
Messner, Kate – School Library Journal, 2009
As the ranks of educators on Twitter grow, more and more are heard about the importance of their "PLNs" (a term reportedly coined by educational technology guru David Warlick). A PLN, or Personal Learning Network, is a group of like-minded professionals with whom one can exchange ideas, advice, and resources. So why shouldn't students have PLNs of…
Descriptors: Educational Change, Educational Technology, Social Networks, Computer Security
Factors Impacting Adult Learner Achievement in a Technology Certificate Program on Computer Networks
Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M. – Turkish Online Journal of Educational Technology - TOJET, 2010
This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…
Descriptors: Adult Learning, Adult Students, Program Effectiveness, Educational Technology
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Mayrath, Michael Charles – ProQuest LLC, 2009
This study examined the effects of manipulating the modality (text-only, voice-only, voice+text) of a tutorial and restriction (restricted vs. unrestricted) of a simulation's interface on retention and transfer of tutorial content. The tutorial prepared novice students to use Packet Tracer, a simulation developed by Cisco that teaches network…
Descriptors: Multiple Choice Tests, Interaction, Educational Technology, Computer Networks
Masrek, Mohamad Noorman bin – Campus-Wide Information Systems, 2007
Purpose: The purpose of the paper is to evaluate the effectiveness or success of universities' portal implementation from the perspective of students as users. Adopting the model developed by Delone and McLean, portal effectiveness is defined as being composed of information quality, systems quality and service quality. In addition, the paper also…
Descriptors: Student Attitudes, User Satisfaction (Information), Program Effectiveness, Questionnaires
Roberts, Amy – Teacher Education Quarterly, 2007
World dilemmas such as poverty, immigration, globalization, technology, transportation, and transnational endeavors define the notion of "global village" in the same way that multicultural populations currently in all nations are described. No longer are nations as homogeneous as they were even a decade ago. In classroom settings the study of…
Descriptors: International Education, Global Approach, Educational Change, Foreign Countries
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering