Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
College Students | 5 |
Computer Networks | 5 |
Privacy | 5 |
Information Technology | 4 |
Internet | 4 |
Computer Security | 3 |
Computer Software | 3 |
Higher Education | 3 |
Teaching Methods | 3 |
Telecommunications | 3 |
Access to Computers | 2 |
More ▼ |
Source
Campus Technology | 1 |
Educational Technology &… | 1 |
IEEE Transactions on Education | 1 |
International Association for… | 1 |
Journal of Interactive… | 1 |
Author
Almeroth, Kevin | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Miron, Eli | 1 |
Panettieri, Joseph C. | 1 |
Ravid, Gilad | 1 |
Thompson, Dale R. | 1 |
Zhang, Hangjin | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers