Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
Campus Technology | 1 |
European Journal of… | 1 |
IEEE Transactions on Learning… | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
TechTrends: Linking Research… | 1 |
Turkish Online Journal of… | 1 |
Author
Anwar, M. | 1 |
Bonneau, Thomas | 1 |
Descy, Don E. | 1 |
Greer, J. | 1 |
Hong, Soongoo | 1 |
Kam, Hwee-Joo | 1 |
Katerattanakul, Pairin | 1 |
Lee, James J. | 1 |
Mandal, Sraboni | 1 |
Marchant, Robert L. | 1 |
Panettieri, Joseph C. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Mandal, Sraboni; Sanjay; Shrivastava, Rajnish – Turkish Online Journal of Distance Education, 2010
Presence of a teacher appraisal system plays a major role in deciding the level of professionalism of an educational institution. In addition to this it also plays a major role in improvement in quality of education imparted by the teacher. Recently assessment of the teaching fraternity has become indispensable measure and thus it is necessary to…
Descriptors: Foreign Countries, Teacher Evaluation, Technical Institutes, Case Studies
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software