Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Author
Abel, Marie-Helene | 1 |
Barry, Catherine | 1 |
Basak, P. C. | 1 |
Benayache, Ahcene | 1 |
Bennett, Cedric | 1 |
Chaput, Brigitte | 1 |
Cheng, C. D. | 1 |
Day, David J. | 1 |
Kaya, Zeki | 1 |
Khanna, Pankaj | 1 |
Kirkwood, Keith | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Descriptive | 13 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 13 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Teachers | 1 |
Location
Alaska | 1 |
Australia | 1 |
California | 1 |
France | 1 |
India | 1 |
Missouri | 1 |
New York | 1 |
Pennsylvania | 1 |
Rhode Island | 1 |
Texas | 1 |
Turkey | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Wagner, William P.; Pant, Vik – Journal of Information Systems Education, 2010
One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database…
Descriptors: College Instruction, Computer Science Education, Information Technology, Business Administration Education
Raths, David – Campus Technology, 2011
Many university officials recognize the need to upgrade their older analog video surveillance systems. In a 2010 survey by "Campus Safety" magazine, half of university respondents expressed dissatisfaction with the quality and coverage of their current video surveillance systems. Among the limitations of analog closed-circuit television…
Descriptors: Video Technology, Internet, Computer Uses in Education, Technology Planning
Zelkowski, Jeremy – TechTrends: Linking Research and Practice to Improve Learning, 2011
This article justifies classifying the TI-Nspire CAS Touchpad as a mobile device for grades 8-16 mathematics classrooms equipped with a Navigator system. The 2010 Horizon Report: K-12 indicates virtually every secondary school aged child has some sort of mobile device. Yet, many school policies ban the use of mobile devices, preventing students…
Descriptors: Mathematics Instruction, Teaching Methods, Time on Task, Classroom Techniques
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Kirkwood, Keith – Campus-Wide Information Systems, 2010
Purpose: This paper aims to introduce an enterprise-wide Web 2.0 learning support platform--SNAP, developed at Victoria University in Melbourne, Australia. Design/methodology/approach: Pointing to the evolution of the social web, the paper discusses the potential for the development of e-learning platforms that employ constructivist, connectivist,…
Descriptors: Foreign Countries, Electronic Learning, Communities of Practice, Knowledge Management
Ko, C. C.; Cheng, C. D. – Computers & Education, 2008
Electronic examination systems, which include Internet-based system, require extremely complicated installation, configuration and maintenance of software as well as hardware. In this paper, we present the design and development of a flexible, easy-to-use and secure examination system (e-Test), in which any commonly used computer can be used as a…
Descriptors: Computer Assisted Testing, Computers, Program Effectiveness, Examiners
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
St. George, Art – EDUCAUSE Review, 2007
Today, at the end of 2007, there are evident consolidations in wireless, storage, and virtualization and the path forward seems clearer now than previously. Trends from last year continue strongly, particularly Web 2.0 and the shift to user-driven environments and Internet sites where significant data and video processing is available to those…
Descriptors: Internet, Educational Trends, Information Technology, Technology Integration
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Künüçen, Hale; Kaya, Zeki; Mirici, I. Hakki; Künüçen, A. Sükrü; Öztürk, Zekai – Turkish Online Journal of Educational Technology - TOJET, 2003
In this study, "Needs for the Distance Education", which is the first unit of the "Foundations of the Distance Education" course in Computer and Teaching Technologies Departments, has been prepared in written and this unit has been scripted for a web-based asynchrony presentation. In the preparation of the script a special…
Descriptors: Foreign Countries, Computer Assisted Instruction, Computer Storage Devices, Scripts
Abel, Marie-Helene; Benayache, Ahcene; Lenne, Dominique; Moulin, Claude; Barry, Catherine; Chaput, Brigitte – Educational Technology & Society, 2004
E-learning leads to evolutions in the way of designing a course. Diffused through the web, the course content cannot be the direct transcription of a face to face course content. A course can be seen as an organization in which different actors are involved. These actors produce documents, information and knowledge that they often share. We…
Descriptors: Course Content, Internet, College Instruction, Models