NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
XiFeng Liao – International Journal of Information and Communication Technology Education, 2024
A modern technology-supported vocational educational system significantly affects the quality of vocational training and contributes to the innovation and economic development of the regional area. The visualization literature analysis was adopted with the purpose of exploring the theoretical framework for developing a 6G-assisted network to…
Descriptors: Computer Networks, Information Networks, Technology Integration, Regional Cooperation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Amitabh Verma – Journal of Educators Online, 2025
This study provides a thorough bibliometric analysis of the research landscape concerning the application of soft computing in higher education. This study collects 5,140 pieces including books, book chapters, journal articles published in respected journals, and conference papers presented at notable international conferences that were published…
Descriptors: Bibliometrics, Computer Uses in Education, Computer Science, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simeo B. Kisanjara – International Journal of Education and Development using Information and Communication Technology, 2025
The main purpose of this study is to determine how computer networks (CNs) affects teaching and learning (T&L) and administrative operations performance at Tanzanian universities. A questionnaire was used as part of a quantitative methodology to gather data for this study. The response rate was 97.95% out of 342 respondents, including…
Descriptors: Foreign Countries, Universities, College Students, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sicart, Miguel – American Journal of Play, 2018
The author proposes a rhetoric of computational play as a perspective for the analysis of the ludic in the Information Age. Combining concepts from the philosophy of information and postphenomenology with different theories of play, he argues that there is a play element shaping the cultural impact of computational media and that this kind of play…
Descriptors: Computer Use, Play, Computation, Information Science
European Commission, 2019
The second objective of the '2nd Survey of Schools: ICT in Education' designs a conceptual model for a 'highly equipped and connected classroom' (HECC), defines three scenarios of a HECC and estimates the costs to equip and connect an average EU classroom with advanced components of the HECC model. The entry level scenario outlines the minimum and…
Descriptors: Computer Uses in Education, Technology Integration, Costs, Faculty Development
Forrest J. Bowlick; Karen K. Kemp; Shana Crosson; Eric Shook – Geography Teacher, 2024
Cyberinfrastructure (CI) empowers the foundational computation resources underlying data analytics, spatial modeling, and many other domains serving the growing knowledge economy in the United States. In every part of these interactions with CI, questions of how to seamlessly integrate CI training into educational programs exist. In this article,…
Descriptors: Knowledge Economy, Global Approach, World Problems, Multiple Literacies
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
Galanek, Joseph D.; Gierdowski, Dana C.; Brooks, D. Christopher – EDUCAUSE, 2018
For 15 years, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology (IT) and higher education's most important end users, undergraduate students. This year's report includes inclusion of the perspectives of students with learning and physical disabilities on how their institutions respond to their…
Descriptors: Undergraduate Students, Information Technology, Computer Uses in Education, Access to Computers