Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 17 |
Descriptor
College Students | 23 |
Computer Networks | 23 |
Telecommunications | 23 |
Higher Education | 11 |
Internet | 11 |
Foreign Countries | 9 |
Educational Technology | 7 |
Computer Mediated… | 6 |
Computer Uses in Education | 6 |
Handheld Devices | 6 |
Information Technology | 6 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 19 |
Reports - Descriptive | 9 |
Reports - Research | 9 |
Collected Works - Proceedings | 2 |
Reports - Evaluative | 2 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 19 |
Postsecondary Education | 11 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Audience
Location
Ohio | 3 |
Australia | 2 |
Austria (Vienna) | 2 |
Indiana | 2 |
Pakistan | 2 |
Virginia | 2 |
Arkansas | 1 |
Asia | 1 |
Brazil | 1 |
Canada | 1 |
Connecticut | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nisar Ahmad; Arif Alam; Ikram Shah – Knowledge Management & E-Learning, 2024
Information Communication Technology (ICT) is ubiquitous in the 21st century, hence both educators and learners need to integrate relevant ICT resources in their teaching and learning practices, to meet stakeholder's expectations and keep abreast with the race of technological advancement. The current research focuses on the analysis of ICT…
Descriptors: Foreign Countries, Information Technology, Communications, Computer Mediated Communication
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Sawyer, Thomas Scott – ProQuest LLC, 2013
The purpose of this study was to determine the availability of Internet access for students attending East Tennessee State University during the fall semester 2013. It has been unknown to what degree broadband access is available in the East Tennessee State University service area that includes counties in East Tennessee, Southwest Virginia, and…
Descriptors: Internet, College Students, Access to Information, Access to Computers
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Andergassen, Monika; Guerra, Victor; Ledermüller, Karl; Neumann, Gustaf – International Journal of Mobile and Blended Learning, 2013
Didactical advantages of audience response systems (ARS) have been discussed extensively ever since they have been used in classes. However, conventional ARS bear some drawbacks, such as requiring specific hardware, generating costs (text messaging based and web service fees) and creating a dependency on external hosts. In this paper we present a…
Descriptors: Foreign Countries, Web Browsers, Handheld Devices, Audience Response Systems
Smith, Marissa L.; Cline, Mark A. – Journal of Science Education and Technology, 2011
Radford University was recently configured with a campus-wide wireless local area network. Using these new capabilities, a classroom-based Honors section of Concepts of Biology was conducted solely using electronic technologies (paper was never transferred from professor to student). To accomplish this, students used common software and freeware.…
Descriptors: Biology, Instructional Effectiveness, Computer Software, Educational Technology
Cabrera-Lozoya, Andres; Cerdan, Fernando; Cano, Maria-Dolores; Garcia-Sanchez, Diego; Lujan, Sergio – Computers & Education, 2012
Current e-learning forms are commonly based on improving the learning process through the enhancement of certain skills in students, such as collaborative, competitive or problem-based learning. However, it seems that there is still no e-learning "formula" that gathers the implementation of a number of more generic educational principles in a…
Descriptors: Electronic Learning, Educational Principles, Learning Modalities, Problem Based Learning
Cismaru, Romulus; Cismaru, Magdalena – Journal of College Teaching & Learning, 2011
Laptop use in class is a characteristic of universities that is changing rapidly. Although much of the attention and research regarding this issue has focused on the debate of whether to impose mandatory laptop programs, the reality of wireless campuses allows students to use their laptops in class for class related and non-class related…
Descriptors: Student Attitudes, Universities, Laptop Computers, Foreign Countries
Laptop Computers and Wireless University Campus Networks: Is Flexibility and Effectiveness Improved?
Eriksson, Miikka J.; Vuojarvi, Hanna; Ruokamo, Heli – Australasian Journal of Educational Technology, 2009
This study explores whether university students find that laptop computers and networks increase flexibility and effectiveness of studying. Special attention has been paid to non-traditional students who have extra commitments, such as taking care of children or term-time employment. Questionnaire data was collected from students who had the…
Descriptors: Student Attitudes, College Students, Study Habits, Questionnaires
Huang, Yueh-Min; Huang, Tien-Chi; Hsieh, Meng-Yeh – Educational Technology & Society, 2008
This study describes the development of a ubiquitous cooperative learning environment using proposed annotation services, wireless communication devices, and the Jigsaw method of cooperative learning. The purpose of the study is to investigate the potential benefits of studying digital course materials with embedded annotations. The SQ3R study…
Descriptors: Cooperative Learning, Course Content, Telecommunications, Educational Environment

Shanafelt, Michael – T.H.E. Journal, 2004
Wireless Local Area Networks are the most widely adopted networking technology to hit the market in the last three years. They have the potential to make network applications and the Internet available anywhere on a campus so that students and faculty are no longer tethered to their offices or shared computer laboratories in order to connect to a…
Descriptors: Educational Technology, Computers, Distance Education, Computer Networks
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Previous Page | Next Page »
Pages: 1 | 2