NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)0
Since 2017 (last 10 years)4
Since 2007 (last 20 years)9
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jevremovic, Aleksandar; Shimic, Goran; Veinovic, Mladen; Ristic, Nenad – IEEE Transactions on Learning Technologies, 2017
The case study presented in this paper describes the pedagogical aspects and experience gathered while using an e-learning tool named IPA-PBL. Its main purpose is to provide additional motivation for adopting theoretical principles and procedures in a computer networks course. In the proposed model, the sequencing of activities of the learning…
Descriptors: Problem Based Learning, Computer Networks, Case Studies, Electronic Learning
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Kumari, Neeraj – Journal of Educational Technology, 2019
The objective of the study is to examine the current education system present in private technical education universities in Haryana from the faculty members' perspective. It is a descriptive research. The data has been collected with the help of Questionnaire Based Survey. The sample size is 180 comprising of the faculty respondents. The sample…
Descriptors: Statistical Analysis, Computer Software, Educational Quality, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Su, Chiu Hung; Tzeng, Gwo-Hshiung; Hu, Shu-Kung – Interactive Learning Environments, 2016
The purpose of this study was to address this problem by applying a new hybrid fuzzy multiple criteria decision-making model including (a) using the fuzzy decision-making trial and evaluation laboratory (DEMATEL) technique to construct the fuzzy scope influential network relationship map (FSINRM) and determine the fuzzy influential weights of the…
Descriptors: Electronic Learning, Decision Making, Feedback (Response), Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Kern, Cindy L.; Crippen, Kent J. – Journal of Science Education and Technology, 2017
Scientific inscriptions--graphs, diagrams, and data--and argumentation are integral to learning and communicating science and are common elements in cyberlearning environments--those involving the use of networked learning technologies. However, previous research has indicated that learners struggle to use inscriptions and when they engage in…
Descriptors: Scaffolding (Teaching Technique), Internet, Electronic Learning, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Uysal, Murat Pasa – Interactive Learning Environments, 2016
Various methods and tools have been proposed to overcome the learning obstacles for Object-Oriented Programming (OOP). However, it remains difficult especially for novice learners. The problem may be not only adopting an instructional method, but also an Integrated Development Environment (IDE). Learners employ IDEs as a means to solve programming…
Descriptors: Evaluation, Educational Environment, Cognitive Processes, Difficulty Level
Peer reviewed Peer reviewed
Direct linkDirect link
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries