NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Pequeno, Jaildo Tavares; Fonseca, Benjamim; Lopes, Joaquim Bernardino Oliveira – European Journal of Engineering Education, 2022
This study contributes to learning improvement in practical classes in Computer Network technology courses, using the Physical Technological Laboratory (PTL) as a tool. Multimodal narration content analysis was used, which aggregates and organises the data collected in the PTL environment. Based on the results, we infer that both the student and…
Descriptors: Science Instruction, Laboratories, Computer Networks, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita – Educational Technology & Society, 2017
More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…
Descriptors: Experimental Groups, Control Groups, Comparative Analysis, Academic Achievement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hwang, Wu-Yuin; Kongcharoen, Chaknarin; Ghinea, Gheorghita – International Review of Research in Open and Distance Learning, 2014
Recently, various computer networking courses have included additional laboratory classes in order to enhance students' learning achievement. However, these classes need to establish a suitable laboratory where each student can connect network devices to configure and test functions within different network topologies. In this case, the Linux…
Descriptors: Cooperative Learning, Synchronous Communication, Computer Mediated Communication, Virtual Classrooms
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ybarra, Gary A.; Collins, Leslie M.; Huettel, Lisa G.; Brown, April S.; Coonley, Kip D.; Massoud, Hisham Z.; Board, John A.; Cummer, Steven A.; Choudhury, Romit Roy; Gustafson, Michael R.; Jokerst, Nan M.; Brooke, Martin A.; Willett, Rebecca M.; Kim, Jungsang; Absher, Martha S. – Advances in Engineering Education, 2011
The field of electrical and computer engineering has evolved significantly in the past two decades. This evolution has broadened the field of ECE, and subfields have seen deep penetration into very specialized areas. Remarkable devices and systems arising from innovative processes, exotic materials, high speed computer simulations, and complex…
Descriptors: Engineering Education, Undergraduate Study, Career Choice, Curriculum Design
Peer reviewed Peer reviewed
Direct linkDirect link
Noble, Howard; Curtis, Daniel; Tang, Kang – EDUCAUSE Quarterly, 2009
The government of the United Kingdom has set a target to reduce CO2 emissions by at least 34 percent from 1990 levels by 2020. The Carbon Reduction Commitment (CRC) will require all large public and private sector organizations across the U.K. to cut carbon emissions and report total CO2 emissions annually so that the data can be published in a…
Descriptors: Energy Conservation, Computers, Foreign Countries, Technological Advancement
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Gkatzidou, Stavroula; Pearson, Elaine – Australasian Journal of Educational Technology, 2009
With the rapid development of wireless networks and mobile technologies and the increasing adoption of mobile learning, the need for "anywhere, anytime and any device" access to information becomes more evident. This has influenced the design of learning objects. The small but developing literature on vodcasting indicates its potential…
Descriptors: Access to Information, Program Effectiveness, Educational Technology, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Delialioglu, Omer; Yildirim, Zahide – Computers & Education, 2008
Using the model for learning and teaching activities (MOLTA), a new technology enhanced hybrid instruction was designed, developed and implemented. The effectiveness of the hybrid instruction in regard to students' achievement, knowledge retention, attitudes towards the subject, and course satisfaction was evaluated in comparison to traditional…
Descriptors: Experimental Groups, Control Groups, Program Effectiveness, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Masrek, Mohamad Noorman bin – Campus-Wide Information Systems, 2007
Purpose: The purpose of the paper is to evaluate the effectiveness or success of universities' portal implementation from the perspective of students as users. Adopting the model developed by Delone and McLean, portal effectiveness is defined as being composed of information quality, systems quality and service quality. In addition, the paper also…
Descriptors: Student Attitudes, User Satisfaction (Information), Program Effectiveness, Questionnaires
Legutko, Robert S. – Online Submission, 2007
Background: The idea for attempting a distance tutoring project between university tutors and elementary school students using Microsoft NetMeeting was conceived: (a) to provide a new experience mentoring children for university students pursuing a teaching certificate, (b) for university students to utilize technology in pedagogy, (c) as an…
Descriptors: Elementary School Students, College Students, Tutors, Tutoring