Publication Date
In 2025 | 0 |
Since 2024 | 8 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 13 |
Descriptor
Source
Author
Archer, Elizabeth | 1 |
Barnes, Glen | 1 |
Bui Thanh Hung | 1 |
Caplan, Priscilla | 1 |
Carley, Kathleen M. | 1 |
Dan Li | 1 |
Emma Plourde | 1 |
Fore, Julie A. | 1 |
Frances Jiménez | 1 |
Gayatri Parasa | 1 |
Grace Kamau | 1 |
More ▼ |
Publication Type
Journal Articles | 17 |
Reports - Research | 9 |
Reports - Descriptive | 6 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
Secondary Education | 1 |
Audience
Media Staff | 2 |
Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Rina Dhopeshwarkar; Frances Jiménez; Sofia Ryan; Emma Plourde; Madjid Karimi – American Journal on Intellectual and Developmental Disabilities, 2024
Individuals with intellectual and developmental disabilities (IDD) continue to experience disparities in health and well-being despite improved provisions of person-centered care. Patient-centered outcomes research (PCOR) translates evidence into practice for meaningful outcomes. This piece describes findings from an environmental scan and…
Descriptors: Intellectual Disability, Developmental Disabilities, Medical Care Evaluation, Stakeholders
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Lyndsay Grant – Research in Education, 2024
The digitalisation and datafication of education has raised profound questions about the changing role of teachers' educational expertise and agency, as automated processes, data-driven analytics and accountability regimes produce new forms of knowledge and governance. Increasingly, research is paying greater attention to the significant role of…
Descriptors: Data, Computer Networks, Computer Interfaces, Computer System Design
Zeynab (Artemis) Mohseni; Italo Masiello; Rafael M. Martins – Education and Information Technologies, 2024
There is a significant amount of data available about students and their learning activities in many educational systems today. However, these datasets are frequently spread across several different digital services, making it challenging to use them strategically. In addition, there are no established standards for collecting, processing,…
Descriptors: Elementary School Students, Data, Individual Development, Learning Trajectories
Archer, Elizabeth; Barnes, Glen – International Review of Research in Open and Distributed Learning, 2017
During this age of data proliferation, heavy reliance is placed on data visualisation to support users in making sense of vast quantities of information. Informational Dashboards have become the must have accoutrement for Higher Education institutions with various stakeholders jostling for development priority. Due to the time pressure and user…
Descriptors: Computer Networks, Data, Visual Aids, Databases
Landwehr, Peter; Spraragen, Marc; Ranganathan, Balki; Carley, Kathleen M.; Zyda, Michael – Simulation & Gaming, 2013
In this article, the authors discuss the development of the "Sudan Game," an interactive model of the country in the time period leading up to the Sudanese referendum on the secession of the South. While many simulations are designed to educate about their subjects, the "Sudan Game" is intended to be a prototype for policy…
Descriptors: Foreign Countries, Computer Games, Public Policy, Policy Formation
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Hendrix, Dean – portal: Libraries and the Academy, 2007
To assess their knowledge, use, and attitudes regarding peer-to-peer (P2P) applications, this study surveyed academic librarians (n = 162) via a mail-in survey. Correlations between the sample characteristics (age, gender, year of MLS, type of library job) and P2P knowledge, use, and attitudes were also explored. Overall, academic librarians…
Descriptors: Academic Libraries, Information Technology, Library Services, Ethics

Johnson, Linda Ellis; And Others – Office Systems Research Journal, 1997
A study determined what concepts 107 information systems educators perceived as the most important in a senior undergraduate course in data communications. Educators indicated that networking concepts were more important than communications history and fundamentals. An implication is that the data communications course should be applied rather…
Descriptors: Communications, Computer Networks, Course Content, Data

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data

Caplan, Priscilla – Public-Access Computer Systems Review, 1995
Discusses the 1995 OCLC/NCSA Metadata Workshop that met to define a standard set of data elements for describing network-accessible information resources. These document data elements had to be simple enough for authors and publishers to use, to facilitate discovery and retrieval, and to be useful as a basis for descriptive cataloging. (JKP)
Descriptors: Access to Information, Cataloging, Computer Networks, Data
Previous Page | Next Page »
Pages: 1 | 2