NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Brown v Board of Education1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 61 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bo Wang – Interactive Learning Environments, 2024
The rise and development of new network technologies have shaped a new information revolution. At the same time, they have penetrated education, including football training. The study aimed to determine the impact of network technologies on players' ability to cooperate, be engaged, and be creative when teaching football tactics. ANCOVA (analysis…
Descriptors: Team Sports, Cooperation, Creativity, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Barlowe, Scott – IEEE Transactions on Education, 2021
Contribution: This article demonstrates that social, cultural, economic, and political topics can be effectively addressed in the context of traditional computer science and engineering topics with few additional resources and little coordination. Background: Social, cultural, economic, and political influences are often secondary topics in…
Descriptors: Global Approach, Computer Science Education, Computer Networks, Social Influences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nisar Ahmad; Arif Alam; Ikram Shah – Knowledge Management & E-Learning, 2024
Information Communication Technology (ICT) is ubiquitous in the 21st century, hence both educators and learners need to integrate relevant ICT resources in their teaching and learning practices, to meet stakeholder's expectations and keep abreast with the race of technological advancement. The current research focuses on the analysis of ICT…
Descriptors: Foreign Countries, Information Technology, Communications, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – International Journal of Computer Science Education in Schools, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – Online Submission, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Jevremovic, Aleksandar; Shimic, Goran; Veinovic, Mladen; Ristic, Nenad – IEEE Transactions on Learning Technologies, 2017
The case study presented in this paper describes the pedagogical aspects and experience gathered while using an e-learning tool named IPA-PBL. Its main purpose is to provide additional motivation for adopting theoretical principles and procedures in a computer networks course. In the proposed model, the sequencing of activities of the learning…
Descriptors: Problem Based Learning, Computer Networks, Case Studies, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Castrillon-Velandia, Oscar; Hemandez-Rodriguez, Omar – International Journal for Technology in Mathematics Education, 2019
This study focuses on how the combined use of graphic calculators with connectivity software promotes the social construction of mathematical knowledge. Particular emphasis is placed on the aspects related to design, development, implementation, and evaluation of didactic activities that integrate these technologies. We use Didactical Engineering…
Descriptors: Mathematics Instruction, Graphing Calculators, Teaching Methods, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hariadi, Bambang; Dewiyani Sunarto, M. J.; Sudarmaningtyas, Pantjawati – International Journal of Evaluation and Research in Education, 2016
This study aimed to develop a web-based learning application as a form of learning revolution. The form of learning revolution includes the provision of unlimited teaching materials, real time class organization, and is not limited by time or place. The implementation of this application is in the form of hybrid learning by using Google Apps for…
Descriptors: Educational Technology, Computer Oriented Programs, Web Based Instruction, Blended Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Sarkar, Nurul I. – International Journal of Web-Based Learning and Teaching Technologies, 2013
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…
Descriptors: Telecommunications, Computer Networks, Undergraduate Students, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5