NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)4
Since 2006 (last 20 years)10
Education Level
Higher Education11
Postsecondary Education5
High Schools1
Secondary Education1
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Peer reviewed Peer reviewed
Direct linkDirect link
Zhamanov, Azamat; Yoo, Seong-Moo; Sakhiyeva, Zhulduz; Zhaparov, Meirambek – International Journal of Information and Communication Technology Education, 2018
Students nowadays are hard to be motivated to study lessons with traditional teaching methods. Computers, smartphones, tablets and other smart devices disturb students' attentions. Nevertheless, those smart devices can be used as auxiliary tools of modern teaching methods. In this article, the authors review two popular modern teaching methods:…
Descriptors: Program Implementation, Program Evaluation, Blended Learning, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hariadi, Bambang; Dewiyani Sunarto, M. J.; Sudarmaningtyas, Pantjawati – International Journal of Evaluation and Research in Education, 2016
This study aimed to develop a web-based learning application as a form of learning revolution. The form of learning revolution includes the provision of unlimited teaching materials, real time class organization, and is not limited by time or place. The implementation of this application is in the form of hybrid learning by using Google Apps for…
Descriptors: Educational Technology, Computer Oriented Programs, Web Based Instruction, Blended Learning
Ford, Tracy – Campus Technology, 2012
Many institutions implement a distributed antenna system (DAS) as part of a holistic approach to providing better wireless coverage and capacity on campus. A DAS provides wireless service within a particular area or structure via a network of separate antenna nodes that are connected to a common source through fiber or coaxial cable. Because DAS…
Descriptors: Technology Planning, Information Networks, Systems Development, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Andergassen, Monika; Guerra, Victor; Ledermüller, Karl; Neumann, Gustaf – International Journal of Mobile and Blended Learning, 2013
Didactical advantages of audience response systems (ARS) have been discussed extensively ever since they have been used in classes. However, conventional ARS bear some drawbacks, such as requiring specific hardware, generating costs (text messaging based and web service fees) and creating a dependency on external hosts. In this paper we present a…
Descriptors: Foreign Countries, Web Browsers, Handheld Devices, Audience Response Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Masrek, Mohamad Noorman bin – Campus-Wide Information Systems, 2007
Purpose: The purpose of the paper is to evaluate the effectiveness or success of universities' portal implementation from the perspective of students as users. Adopting the model developed by Delone and McLean, portal effectiveness is defined as being composed of information quality, systems quality and service quality. In addition, the paper also…
Descriptors: Student Attitudes, User Satisfaction (Information), Program Effectiveness, Questionnaires
Peer reviewed Peer reviewed
Direct linkDirect link
Suhonen, Jarkko; Sutinen, Erkki – Educational Technology & Society, 2006
FODEM (FOrmative DEvelopment Method) is a design method for developing digital learning environments for widely dispersed learning communities. These are communities in which the geographical distribution and density of learners is low when compared to the kind of learning communities in which there is a high distribution and density of learners…
Descriptors: Formative Evaluation, Foreign Countries, Educational Technology, Educational Environment
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy