NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)1
Since 2017 (last 10 years)5
Since 2007 (last 20 years)25
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 25 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Pequeno, Jaildo Tavares; Fonseca, Benjamim; Lopes, Joaquim Bernardino Oliveira – European Journal of Engineering Education, 2022
This study contributes to learning improvement in practical classes in Computer Network technology courses, using the Physical Technological Laboratory (PTL) as a tool. Multimodal narration content analysis was used, which aggregates and organises the data collected in the PTL environment. Based on the results, we infer that both the student and…
Descriptors: Science Instruction, Laboratories, Computer Networks, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Recalde, Jordi Mogas; Palau, Ramon; Galés, Neus Lorenzo; Gallon, Ray – International Journal of Mobile and Blended Learning, 2020
This paper presents results of a focus group that gathered data from principals of several public schools in Catalonia regarding the educational impact of Industry 4.0 technologies. Conclusions and recommendations are drawn from qualitative analysis with a view to improving smart classrooms via educational innovation. Results show that the schools…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Public Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Edwards, Darla – Learning Professional, 2019
A networked improvement community can be a tremendous resource for people who share a common interest and desire to learn from each other, and, thanks to technology, this can occur even when participants are separated by a large distance. This article discusses Virginia Advanced Study Strategies' Rural Math Innovation Network, a four-year project…
Descriptors: Networks, Rural Schools, Middle Schools, High Schools
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Terasawa, Ikuo – Higher Education Studies, 2016
The challenge study is a project based learning curriculum at Technical High School aimed at the construction of a wireless communication system. The first period was engineering issues in the construction of an artificial satellite and the second period was a positional locating system based on the general purpose wire-less device--ZigBee device.…
Descriptors: Vocational High Schools, Technical Education, Telecommunications, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita – Educational Technology & Society, 2017
More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…
Descriptors: Experimental Groups, Control Groups, Comparative Analysis, Academic Achievement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hwang, Wu-Yuin; Kongcharoen, Chaknarin; Ghinea, Gheorghita – International Review of Research in Open and Distance Learning, 2014
Recently, various computer networking courses have included additional laboratory classes in order to enhance students' learning achievement. However, these classes need to establish a suitable laboratory where each student can connect network devices to configure and test functions within different network topologies. In this case, the Linux…
Descriptors: Cooperative Learning, Synchronous Communication, Computer Mediated Communication, Virtual Classrooms
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ybarra, Gary A.; Collins, Leslie M.; Huettel, Lisa G.; Brown, April S.; Coonley, Kip D.; Massoud, Hisham Z.; Board, John A.; Cummer, Steven A.; Choudhury, Romit Roy; Gustafson, Michael R.; Jokerst, Nan M.; Brooke, Martin A.; Willett, Rebecca M.; Kim, Jungsang; Absher, Martha S. – Advances in Engineering Education, 2011
The field of electrical and computer engineering has evolved significantly in the past two decades. This evolution has broadened the field of ECE, and subfields have seen deep penetration into very specialized areas. Remarkable devices and systems arising from innovative processes, exotic materials, high speed computer simulations, and complex…
Descriptors: Engineering Education, Undergraduate Study, Career Choice, Curriculum Design
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M. – Turkish Online Journal of Educational Technology - TOJET, 2010
This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…
Descriptors: Adult Learning, Adult Students, Program Effectiveness, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Previous Page | Next Page »
Pages: 1  |  2