Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 5 |
Descriptor
Source
| EDUCAUSE Quarterly | 1 |
| Federal Communications… | 1 |
| Interactive Learning… | 1 |
| Journal of Cybersecurity… | 1 |
| Minerva: A Review of Science,… | 1 |
Author
| Abhishek Vaish | 1 |
| Agee, Anne | 1 |
| Hu, Shu-Kung | 1 |
| Ravindra Kumar | 1 |
| Rowe, Theresa | 1 |
| Samo Bobek | 1 |
| Simona Sternad | 1 |
| Su, Chiu Hung | 1 |
| Tzeng, Gwo-Hshiung | 1 |
| Woo, Melissa | 1 |
| Woods, David | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
| Policymakers | 1 |
Location
| Massachusetts | 1 |
| Michigan | 1 |
| Ohio | 1 |
| Sweden | 1 |
| Wisconsin | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Öznur Karakas – Minerva: A Review of Science, Learning and Policy, 2024
E-science, or networked, collaborative and multidisciplinary scientific research on a shared e-infrastructure using computational tools, methods and applications, has also brought about new networked organizational forms in the transition of higher education towards the entrepreneurial academy. While the under-representation of women in ICTs is…
Descriptors: Foreign Countries, Research and Development, Research Universities, Researchers
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Su, Chiu Hung; Tzeng, Gwo-Hshiung; Hu, Shu-Kung – Interactive Learning Environments, 2016
The purpose of this study was to address this problem by applying a new hybrid fuzzy multiple criteria decision-making model including (a) using the fuzzy decision-making trial and evaluation laboratory (DEMATEL) technique to construct the fuzzy scope influential network relationship map (FSINRM) and determine the fuzzy influential weights of the…
Descriptors: Electronic Learning, Decision Making, Feedback (Response), Computer Networks
Agee, Anne; Rowe, Theresa; Woo, Melissa; Woods, David – EDUCAUSE Quarterly, 2010
A 2006 ECAR study defined cyberinfrastructure as the coordinated aggregate of "hardware, software, communications, services, facilities, and personnel that enable researchers to conduct advanced computational, collaborative, and data-intensive research." While cyberinfrastructure was initially seen as support for scientific and…
Descriptors: Research Needs, Research and Development, Research Universities, Computer Uses in Education
Federal Communications Commission, 2010
In early 2009, Congress directed the Federal Communications Commission (FCC) to develop a National Broadband Plan to ensure every American has "access to broadband capability." Congress also required that this plan include a detailed strategy for achieving affordability and maximizing use of broadband to advance "consumer welfare, civic…
Descriptors: Telecommunications, Computer Networks, Information Technology, Federal Programs

Peer reviewed
Direct link
