NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 22 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Meng Qu – Education and Information Technologies, 2024
This paper introduces a Patron Counting and Analysis (PCA) system that leverages Wi-Fi-connection data to monitor space utilization and analyze visitor patterns in academic libraries. The PCA system offers real-time crowding information to the public and a comprehensive visitor analysis dashboard for library administrators. The system's…
Descriptors: Academic Libraries, Users (Information), Use Studies, Space Utilization
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Agee, Anne; Rowe, Theresa; Woo, Melissa; Woods, David – EDUCAUSE Quarterly, 2010
A 2006 ECAR study defined cyberinfrastructure as the coordinated aggregate of "hardware, software, communications, services, facilities, and personnel that enable researchers to conduct advanced computational, collaborative, and data-intensive research." While cyberinfrastructure was initially seen as support for scientific and…
Descriptors: Research Needs, Research and Development, Research Universities, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Butler, LeRoy – EDUCAUSE Quarterly, 2009
Lourdes College is a small, private, coeducational commuter college located in northwest Ohio. In early 2009, the Lourdes College Board of Trustees ratified a new strategic plan promoting institutional strength and sustainability over the next six years. The desired outcome was to make Lourdes College a stronger, more vibrant, even more socially…
Descriptors: Strategic Planning, Commuter Colleges, Sustainable Development, Feasibility Studies
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Sander, Libby – Chronicle of Higher Education, 2008
After nearly three years of planning, Ohio's higher-education officials are finalizing an ambitious program to grant college credit for some technical courses offered at the state's adult-education centers. The program, called the Career-Technical Credit Transfer, is the latest in a string of state efforts to more closely link work-force training…
Descriptors: Community Colleges, Engineering, Computer Networks, Faculty
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Illinois Libraries, 1994
Describes plans by the Council of Great Lakes Governors, which includes the states of Illinois, Indiana, Minnesota, Pennsylvania, New York, Michigan, Wisconsin, and Ohio, to develop an information highway linking state governments, computer and research networks, telecommunications providers, and universities. Highlights include the Internet,…
Descriptors: Access to Information, Computer Networks, Cooperation, Electronic Mail
Olson, Renee – School Library Journal, 2000
Describes the development of INFOhio, a state-wide effort that is tying together Ohio's public and private school libraries in an online network. Highlights include electronic resources; training for librarians and teachers; a union catalog; choice of vendors; and the need for further funding. (LRW)
Descriptors: Computer Networks, Elementary Secondary Education, Financial Support, Online Systems
Ohio State Dept. of Education, Columbus. – 1995
SchoolNet is a state-funded partnership that will facilitate the installation of computer and communications networking technology in public schools and classrooms across Ohio and coordinate its use. SchoolNet seeks to provide Ohio students with expanded course offerings; more individualized educational opportunities; interactive learning…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Networks, Demonstration Programs
Ohio State Legislative Office of Education Oversight, Columbus. – 1996
This report is the second in a series of Legislative Office of Education Oversight (LOEO) reports focusing on the SchoolNet initiatives. It examines the readiness of Ohio's schools to use the computers and network wiring provided by SchoolNet and SchoolNet Plus. The document is divided into five sections: (1) Introduction; (2) School Readiness for…
Descriptors: Computer Networks, Computer Uses in Education, Educational Development, Educational Technology
Mansfield, Meribah – Library Journal, 1997
Examines the Ohio Public Library Information Network (OPLIN) which provides access to the state's public library resources; federal, state, and regional information resources; and other electronic information resources. Describes OPLIN's role in Ohio, hardware and services provided, mission, origin, funding, staff training, databases, future plans…
Descriptors: Access to Information, Computer Networks, Databases, Electronic Libraries
Previous Page | Next Page ยป
Pages: 1  |  2