Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Networks | 9 |
Data | 9 |
Computer Interfaces | 3 |
Computer System Design | 3 |
Foreign Countries | 3 |
Computer Security | 2 |
Data Use | 2 |
Decision Making | 2 |
Higher Education | 2 |
Information Technology | 2 |
Academic Libraries | 1 |
More ▼ |
Source
Education and Information… | 2 |
American Journal on… | 1 |
International Journal of… | 1 |
International Review of… | 1 |
Journal of Cybersecurity… | 1 |
Office Systems Research… | 1 |
Research in Education | 1 |
portal: Libraries and the… | 1 |
Author
Archer, Elizabeth | 1 |
Barnes, Glen | 1 |
Bui Thanh Hung | 1 |
Dan Li | 1 |
Emma Plourde | 1 |
Frances Jiménez | 1 |
Gayatri Parasa | 1 |
Hendrix, Dean | 1 |
Huichao Li | 1 |
Italo Masiello | 1 |
Johnson, Linda Ellis | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 9 |
Audience
Media Staff | 1 |
Location
South Africa | 1 |
Sweden | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Rina Dhopeshwarkar; Frances Jiménez; Sofia Ryan; Emma Plourde; Madjid Karimi – American Journal on Intellectual and Developmental Disabilities, 2024
Individuals with intellectual and developmental disabilities (IDD) continue to experience disparities in health and well-being despite improved provisions of person-centered care. Patient-centered outcomes research (PCOR) translates evidence into practice for meaningful outcomes. This piece describes findings from an environmental scan and…
Descriptors: Intellectual Disability, Developmental Disabilities, Medical Care Evaluation, Stakeholders
Lyndsay Grant – Research in Education, 2024
The digitalisation and datafication of education has raised profound questions about the changing role of teachers' educational expertise and agency, as automated processes, data-driven analytics and accountability regimes produce new forms of knowledge and governance. Increasingly, research is paying greater attention to the significant role of…
Descriptors: Data, Computer Networks, Computer Interfaces, Computer System Design
Zeynab (Artemis) Mohseni; Italo Masiello; Rafael M. Martins – Education and Information Technologies, 2024
There is a significant amount of data available about students and their learning activities in many educational systems today. However, these datasets are frequently spread across several different digital services, making it challenging to use them strategically. In addition, there are no established standards for collecting, processing,…
Descriptors: Elementary School Students, Data, Individual Development, Learning Trajectories
Archer, Elizabeth; Barnes, Glen – International Review of Research in Open and Distributed Learning, 2017
During this age of data proliferation, heavy reliance is placed on data visualisation to support users in making sense of vast quantities of information. Informational Dashboards have become the must have accoutrement for Higher Education institutions with various stakeholders jostling for development priority. Due to the time pressure and user…
Descriptors: Computer Networks, Data, Visual Aids, Databases
Hendrix, Dean – portal: Libraries and the Academy, 2007
To assess their knowledge, use, and attitudes regarding peer-to-peer (P2P) applications, this study surveyed academic librarians (n = 162) via a mail-in survey. Correlations between the sample characteristics (age, gender, year of MLS, type of library job) and P2P knowledge, use, and attitudes were also explored. Overall, academic librarians…
Descriptors: Academic Libraries, Information Technology, Library Services, Ethics

Johnson, Linda Ellis; And Others – Office Systems Research Journal, 1997
A study determined what concepts 107 information systems educators perceived as the most important in a senior undergraduate course in data communications. Educators indicated that networking concepts were more important than communications history and fundamentals. An implication is that the data communications course should be applied rather…
Descriptors: Communications, Computer Networks, Course Content, Data