Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 67 |
Descriptor
Source
Author
Breeding, Marshall | 4 |
Descy, Don E. | 4 |
Nickerson, Gord | 4 |
Machovec, George S. | 3 |
Barker, Philip | 2 |
Coffman, Steve | 2 |
Detweiler, Richard A. | 2 |
Harris, Judi | 2 |
Johnson, Doug | 2 |
Koch, Melissa | 2 |
Lockwood, Russ | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 32 |
Teachers | 13 |
Policymakers | 12 |
Administrators | 9 |
Students | 4 |
Media Staff | 2 |
Parents | 2 |
Community | 1 |
Researchers | 1 |
Location
Canada | 6 |
Australia | 4 |
Arizona | 3 |
Kansas | 3 |
Michigan | 3 |
Spain | 3 |
Texas | 3 |
United Kingdom | 3 |
Virginia | 3 |
Africa | 2 |
California | 2 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Etherington, Thomas R. – Journal of Geography in Higher Education, 2016
Computer programming is not commonly taught to geographers as a part of geographic information system (GIS) courses, but the advent of NeoGeography, big data and open GIS means that programming skills are becoming more important. To encourage the teaching of programming to geographers, this paper outlines a course based around a series of…
Descriptors: Programming, Geographic Information Systems, Geography Instruction, Introductory Courses
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Tang, Stephen; Hanneghan, Martin; Carter, Christopher – Electronic Journal of e-Learning, 2013
Game-based learning (GBL) combines pedagogy and interactive entertainment to create a virtual learning environment in an effort to motivate and regain the interest of a new generation of "digital native" learners. However, this approach is impeded by the limited availability of suitable "serious" games and high-level design…
Descriptors: Models, Engineering, Instructional Design, Computer Games
Rabkin, Ariel; Reiss, Charles; Katz, Randy; Patterson, David – ACM Transactions on Computing Education, 2013
We describe our experiences teaching MapReduce in a large undergraduate lecture course using public cloud services and the standard Hadoop API. Using the standard API, students directly experienced the quality of industrial big-data tools. Using the cloud, every student could carry out scalability benchmarking assignments on realistic hardware,…
Descriptors: Assignments, Undergraduate Study, Computer Networks, Educational Technology
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics