NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 181 to 195 of 2,323 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos – Computers and Education, 2007
While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…
Descriptors: Computer Security, Distance Education, Computer Networks, Educational Environment
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Hegedus, Stephen – Educational Technology, 2007
This article shows how highly mobile computing, when used with new forms of network connectivity, can allow new forms of activities in the mathematics classroom. Examples are provided, such as the ability to share, harvest, and aggregate mathematical objects, and the ability for teachers and students to analyze the entire set of classroom…
Descriptors: Computer Uses in Education, Computer Networks, College Mathematics, Calculus
Azeta, A. A.; Oyelami M. O. – Online Submission, 2008
With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge, rather, an electronic means of learning has continued to evolve. Electronic learning (e-Learning), which facilitates education using communications networks, has made learning…
Descriptors: Computer Uses in Education, Computer Software, Computer Networks, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Western Interstate Commission for Higher Education, 2009
A forward-thinking National Broadband Strategy should focus on the transformative power of advanced networks to unleash new waves of innovation, jobs, economic growth, and national competitiveness. Such a strategy should create new tools to deliver health care, education, and a low carbon economy. The American Recovery and Reinvestment Act…
Descriptors: Computer Networks, Futures (of Society), Economic Progress, Social Change
Peer reviewed Peer reviewed
Direct linkDirect link
Butler, LeRoy – EDUCAUSE Quarterly, 2009
Lourdes College is a small, private, coeducational commuter college located in northwest Ohio. In early 2009, the Lourdes College Board of Trustees ratified a new strategic plan promoting institutional strength and sustainability over the next six years. The desired outcome was to make Lourdes College a stronger, more vibrant, even more socially…
Descriptors: Strategic Planning, Commuter Colleges, Sustainable Development, Feasibility Studies
Johnson, L.; Smith, R.; Levine, A.; Haywood, K. – New Media Consortium, 2010
The "Horizon Report" series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. This volume, the "2010…
Descriptors: Advisory Committees, Elementary Secondary Education, Creative Activities, Global Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Sheehan, Mark C. – EDUCAUSE Review, 2008
Drawn from a recent ECAR research study, this article addresses the importance of five CI technologies to various academic areas in research and in teaching and learning at present and how survey respondents think the importance of these technologies might change in the near future. (Contains 2 figures, 2 tables and 7 notes.)
Descriptors: Computer Networks, Internet, Technological Advancement, Research
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, William P.; Pant, Vik; Hilken, Ralph – Journal of Information Technology Education, 2008
eXtensible Markup Language (XML) is a new technology that is currently being extolled by many industry experts and software vendors. Potentially it represents a platform independent language for sharing information over networks in a way that is much more seamless than with previous technologies. It is extensible in that XML serves as a "meta"…
Descriptors: Internet, Computer Software, Information Technology, Computer Networks
Technology & Learning, 2008
This article presents a list of this year's best practices from America's classrooms. This list was compiled by the staff of the Tech&Learning magazine. These best practices include: (1) video programs produced by the Horry County in Myrtle Beach, South Carolina; (2) a gaming design course introduced at Phoebus High School, Hampton City Schools,…
Descriptors: Reading, Reading Programs, Genetics, School Districts
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Panettieri, Joseph C. – Campus Technology, 2008
Despite the hype, IP convergence does not happen overnight. Navigating the IP convergence market is not easy. Some network equipment makers are taking traditional voice over IP (VoIP) product lines and rebranding them as unified communications offerings. But beware: While closely related, VoIP and UC are not the same. Generally speaking, VoIP…
Descriptors: Computer Networks, Information Networks, Computer Mediated Communication, Free Enterprise System
Houston, Melissa; Goggins, Patrick – Technology & Learning, 2008
It used to be much easier to get paid by the San Diego Unified School District (SDUSD). A lot easier, that is, if you didn't work there. Saddled with an antiquated computer system and manual, repetitive data entry of time cards, officials at California's second-largest school district discovered the payroll department was mistakenly issuing $1…
Descriptors: Management Systems, Employees, Computers, School Districts
Pages: 1  |  ...  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  ...  |  155