Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Author
Annessi, Robert | 1 |
Arif Alam | 1 |
Bernhardt, Valentin | 1 |
Blanes, Ian | 1 |
Bo Wang | 1 |
Borrego, Carlos | 1 |
Dewiyani Sunarto, M. J. | 1 |
Fernández, Cristina | 1 |
Frkat, Davor | 1 |
Hariadi, Bambang | 1 |
Howard, Elizabeth V. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 4 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 9 |
Elementary Secondary Education | 1 |
Audience
Location
Ohio | 2 |
Pakistan | 2 |
Asia | 1 |
Australia | 1 |
Austria (Vienna) | 1 |
Brazil | 1 |
China | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bo Wang – Interactive Learning Environments, 2024
The rise and development of new network technologies have shaped a new information revolution. At the same time, they have penetrated education, including football training. The study aimed to determine the impact of network technologies on players' ability to cooperate, be engaged, and be creative when teaching football tactics. ANCOVA (analysis…
Descriptors: Team Sports, Cooperation, Creativity, Learner Engagement
Nisar Ahmad; Arif Alam; Ikram Shah – Knowledge Management & E-Learning, 2024
Information Communication Technology (ICT) is ubiquitous in the 21st century, hence both educators and learners need to integrate relevant ICT resources in their teaching and learning practices, to meet stakeholder's expectations and keep abreast with the race of technological advancement. The current research focuses on the analysis of ICT…
Descriptors: Foreign Countries, Information Technology, Communications, Computer Mediated Communication
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Hariadi, Bambang; Dewiyani Sunarto, M. J.; Sudarmaningtyas, Pantjawati – International Journal of Evaluation and Research in Education, 2016
This study aimed to develop a web-based learning application as a form of learning revolution. The form of learning revolution includes the provision of unlimited teaching materials, real time class organization, and is not limited by time or place. The implementation of this application is in the form of hybrid learning by using Google Apps for…
Descriptors: Educational Technology, Computer Oriented Programs, Web Based Instruction, Blended Learning
Sarkar, Nurul I. – International Journal of Web-Based Learning and Teaching Technologies, 2013
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…
Descriptors: Telecommunications, Computer Networks, Undergraduate Students, Learning Activities
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers