NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)18
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Pisano, Mark – ProQuest LLC, 2017
Universities and Higher Education Institutions spend large sums of money to maintain and build network infrastructures. Current research and discussions in this area revolve around providing large amounts of bandwidth to students who live in a residence hall. However, there is a lack of information showing what is being used to support research…
Descriptors: Higher Education, Computer Networks, Educational Technology, Technology Uses in Education
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Kuo-Yu – International Journal of Distance Education Technologies, 2015
This study aimed at developing a Multiplayer Online Role Playing Game-based (MORPG) Learning system which enabled instructors to construct a game scenario and manage sharable and reusable learning content for multiple courses. It used the curriculum of "Introduction to Computer Science" as a study case to assess students' learning…
Descriptors: Case Studies, Computer Science Education, Computer Networks, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Mateo Sanguino, T. J.; Serrano Lopez, C.; Marquez Hernandez, F. A. – IEEE Transactions on Education, 2013
A new educational simulation tool designed for the generic study of wireless networks, the Wireless Fidelity Simulator (WiFiSim), is presented in this paper. The goal of this work was to create and implement a didactic tool to improve the teaching and learning of computer networks by means of two complementary strategies: simulating the behavior…
Descriptors: Computer Simulation, Telecommunications, Information Networks, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Akhavan, Peyman; Arefi, Majid Feyz – Interdisciplinary Journal of E-Learning and Learning Objects, 2014
The purpose of this study is to obtain suitable quality criteria for evaluation of electronic content for virtual courses. We attempt to find the aspects which are important in developing e-content for virtual courses and to determine the criteria we need to judge for the quality and efficiency of learning objects and e-content. So we can classify…
Descriptors: Electronic Learning, Classification, Educational Technology, Course Content
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Cabrera-Lozoya, Andres; Cerdan, Fernando; Cano, Maria-Dolores; Garcia-Sanchez, Diego; Lujan, Sergio – Computers & Education, 2012
Current e-learning forms are commonly based on improving the learning process through the enhancement of certain skills in students, such as collaborative, competitive or problem-based learning. However, it seems that there is still no e-learning "formula" that gathers the implementation of a number of more generic educational principles in a…
Descriptors: Electronic Learning, Educational Principles, Learning Modalities, Problem Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Vuojarvi, Hanna; Isomaki, Hannakaisa; Hynes, Deirdre – Australasian Journal of Educational Technology, 2010
This study reports how university students domesticate their personal laptops at the beginning of studies on a wireless campus. The aim was to examine how students integrate the laptop into their personal education experience, what sort of processes were experienced to render the laptop useful and meaningful, and how gender and IT proficiency…
Descriptors: Grounded Theory, Learning Experience, Case Studies, Laptop Computers
Cochrane, Thomas D. – Journal of Asynchronous Learning Networks, 2011
Mobile learning (m-learning) has moved beyond the realms of fantasy to become a viable platform for contextual learning that bridges formal and informal learning environments. This paper overviews how mobile Web 2.0 has been instrumental in facilitating pedagogical change and informing an institution's new e-learning strategy that focuses upon…
Descriptors: Electronic Learning, Communities of Practice, Constructivism (Learning), Learning Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Casquero, Oskar; Portillo, Javier; Ovelar, Ramon; Benito, Manuel; Romo, Jesus – Interactive Learning Environments, 2010
Universities can offer eLearning 2.0 tools and services to learners while obtaining clear benefits from releasing the control over some learning content. This means a shift from the institution centred and monolithic model of traditional virtual learning environments (VLEs) to a more heterogeneous and open model. This article tries to plot an…
Descriptors: Web Sites, Learning Processes, Internet, Client Server Architecture
Peer reviewed Peer reviewed
Direct linkDirect link
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Kemppainen, Jyri; Tedre, Matti; Sutinen, Erkki – Journal of Information Technology Education: Research, 2012
Information technology (IT) professionals face markedly different kinds of challenges in developing countries from the ones in developed countries. Based on the research literature and our fourteen years of fieldwork in Iringa, Tanzania, we have identified eight groups of technical characteristics of IT work that significantly affect the work of…
Descriptors: Foreign Countries, Developing Nations, Engineering Education, Work Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Sanchez, Juana; He, Yan – Journal of Statistics Education, 2005
Statistics textbooks for undergraduates have not caught up with the enormous amount of analysis of Internet data that is taking place these days. Case studies that use Web server log data or Internet network traffic data are rare in undergraduate Statistics education. And yet these data provide numerous examples of skewed and bimodal…
Descriptors: Undergraduate Study, Internet, Data Analysis, Statistics
Previous Page | Next Page ยป
Pages: 1  |  2