Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Author
Angeles, Rebecca | 1 |
Azeta, A. A. | 1 |
Bishop, Ann Peterson | 1 |
Brady D. Lund | 1 |
Bui Thanh Hung | 1 |
Chen, Alexander N. | 1 |
Chun, Dorothy M. | 1 |
Demetriadis, Stavros | 1 |
Dewiyani Sunarto, M. J. | 1 |
Gayatri Parasa | 1 |
Hariadi, Bambang | 1 |
More ▼ |
Publication Type
Reports - Research | 18 |
Journal Articles | 15 |
Information Analyses | 2 |
Reports - Descriptive | 2 |
Numerical/Quantitative Data | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Policymakers | 2 |
Administrators | 1 |
Practitioners | 1 |
Teachers | 1 |
Location
Indonesia | 1 |
New York | 1 |
Texas (Fort Worth) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Hariadi, Bambang; Dewiyani Sunarto, M. J.; Sudarmaningtyas, Pantjawati – International Journal of Evaluation and Research in Education, 2016
This study aimed to develop a web-based learning application as a form of learning revolution. The form of learning revolution includes the provision of unlimited teaching materials, real time class organization, and is not limited by time or place. The implementation of this application is in the form of hybrid learning by using Google Apps for…
Descriptors: Educational Technology, Computer Oriented Programs, Web Based Instruction, Blended Learning
Azeta, A. A. – Turkish Online Journal of Distance Education, 2008
This paper describes an architectural framework and a prototype implementation of a web-based multi-channel e-Learning application that allows students, lecturers and the research communities to collaborate irrespective of the communication device a user is carrying. The application was developed based on the concept of "right once run on any…
Descriptors: Electronic Learning, Handheld Devices, Telecommunications, Laptop Computers

Nunn, Samuel – Evaluation Review, 1993
Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)
Descriptors: Computer Networks, Computer Oriented Programs, Crime, Digital Computers

Rice, Ronald; Love, Gail – Communication Research: An International Quarterly, 1987
Indicates that (1) computer-mediated communication systems, specifically public computer conferencing, can facilitate a moderate exchange of socioemotional content and (2) basic network roles do not generally differ in percentage of socioemotional content. Discusses some fundamental issues in analyzing content and networks in computer-mediated…
Descriptors: Communication Research, Computer Networks, Computer Oriented Programs, Interpersonal Communication

Angeles, Rebecca – Internet Research, 2001
This study seeks a practical understanding of the business, organizational, and technical components of and implementation guidelines needed to effectively deploy extranets. It aims to establish a basic conceptual framework for understanding extranet implementation guidelines. Provides a specific case using VF Playwear, Inc.'s HealthTexbtob.com, a…
Descriptors: Business, Computer Mediated Communication, Computer Networks, Computer Oriented Programs

Watson, J. Allen; And Others – Journal of Educational Technology Systems, 1989
Reports on a computer-based research model that was designed to test family process variables. Integration with an existing family decision-making process model is described, the microcomputer/mainframe system is explained, and system reliability and validity are discussed in relation to traditional process variable research methodologies. (29…
Descriptors: Computer Networks, Computer Oriented Programs, Decision Making, Family Life Education
University of Southern California, Marina del Rey. Information Sciences Inst. – 1986
Summaries of research performed by the Information Sciences Institute at the University of Southern California for the U.S. Department of Defense Advanced Research Projects Agency in 17 areas are provided in this report: (1) Common LISP framework, an exportable version of the Formalized Software Development (FSD) testbed; (2) Explainable Expert…
Descriptors: Computer Graphics, Computer Networks, Computer Oriented Programs, Computer Software
Kitching, Christopher – 1991
This report is based on a questionnaire sent to 32 selected National Archives and on interviews with archivists from eight countries. Geared to the needs of developing countries, the report covers: (1) the impact of computerization on finding aids; (2) advantages and problems of computerization, including enhanced archival control, integration of…
Descriptors: Archives, Automation, Computer Networks, Computer Oriented Programs

Tsai, Chin-Chung; Liu, Eric Zhi-Feng; Lin, Sunny S. J.; Yuan, Shyan-Ming – Innovations in Education and Teaching International, 2001
This study implements a networked peer assessment system based on the use of a Vee heuristic. Students submit their homework via the underlying network, then assess each other's homework by offering suggestions through the network. Preliminary results revealed that the networked peer assessment model and Vee heuristic facilitated pre-service…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Oriented Programs, Instructional Innovation

Bishop, Ann Peterson – Library Trends, 1994
Presents selected results from an empirical investigation into the use of computer networks in aerospace engineering based on data from a national mail survey. The need for user-based studies of electronic networking is discussed, and a copy of the questionnaire used in the survey is appended. (Contains 46 references.) (LRW)
Descriptors: Aerospace Industry, Computer Networks, Computer Oriented Programs, Engineering

Kimmel, Howard; And Others – Science Education, 1988
Describes a model of inservice education designed to increase opportunities for teacher interaction and the availability of instructional resources. Emphasizes teacher control. Discusses workshops, school visits, and computer conferencing. Presents an analysis of the participation of teachers in computer conferencing following the workshop. (CW)
Descriptors: Communications, Computer Networks, Computer Oriented Programs, Computer Uses in Education

Chun, Dorothy M. – System, 1994
Over 2 semesters, 15 first-year German students used a real-time networking program on the Macintosh in computer-assisted class discussion. Students interact directly with each other rather than interacting mainly with the teacher. Data (number of turns/entries, sentence types) are appended. (Contains 25 references.) (JP)
Descriptors: Class Activities, Classroom Techniques, Communicative Competence (Languages), Computer Assisted Instruction
Previous Page | Next Page ยป
Pages: 1 | 2