Publication Date
In 2025 | 3 |
Since 2024 | 34 |
Since 2021 (last 5 years) | 62 |
Since 2016 (last 10 years) | 123 |
Since 2006 (last 20 years) | 228 |
Descriptor
Source
Author
Behrens, John T. | 7 |
Mislevy, Robert J. | 6 |
Delialioglu, Omer | 5 |
McClure, Charles R. | 5 |
Detlor, Brian | 4 |
Levy, Roy | 4 |
Lin, Sunny S. J. | 4 |
Miller, Greg | 4 |
Bertot, John Carlo | 3 |
Cakir, Hasan | 3 |
Eastman, Skip | 3 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 22 |
Researchers | 14 |
Policymakers | 13 |
Teachers | 11 |
Administrators | 5 |
Media Staff | 5 |
Location
Canada | 24 |
United Kingdom | 15 |
China | 12 |
Australia | 11 |
Finland | 9 |
Taiwan | 9 |
United States | 9 |
California | 8 |
India | 7 |
Texas | 7 |
South Africa | 6 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 2 |
Goals 2000 | 2 |
Americans with Disabilities… | 1 |
Education Consolidation… | 1 |
Library Services and… | 1 |
Assessments and Surveys
Learning Style Inventory | 2 |
Group Embedded Figures Test | 1 |
Hidden Figures Test | 1 |
Myers Briggs Type Indicator | 1 |
Program for International… | 1 |
Study Process Questionnaire | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Shahla Asadi; Jordan Allison; Madhu Khurana; Mehrbakhsh Nilashi – Education and Information Technologies, 2024
Simulation-based learning (SBL) offers an extensive variety of chances to practice complex computer and networking skills in higher education and to implement diverse kinds of platforms to facilitate effective learning. Utilizing visualization and computer network simulation tools in teaching computer networking courses has been found to be useful…
Descriptors: Computer Simulation, Student Attitudes, Teaching Methods, Skill Development
Paolo Casari; Sabrina Maniero; Andrea Rosani; Federica Picasso; Anna Serbati – IEEE Transactions on Education, 2025
Contribution: An innovative teaching experience carried out at the University of Trento using team-based learning (TBL) in a large computer networks class. The impact of TBL on the students' learning and satisfaction was investigated. Background: Active learning pedagogies, including TBL, play an important role in enhancing higher-order cognitive…
Descriptors: Cooperative Learning, Teamwork, Computer Networks, Student Attitudes
Ramos, Júlio Cesar; L'Erario, Alexandre; Mendonça, Marcio; Fabri, José Augusto; Palácios, Rodrigo Henrique Cunha – Education and Information Technologies, 2023
The freshman student's perspective on the activities performed in a data center by the network analyst is complex and intricate. These activities include the configuration of equipment and the connection between network devices. There are several issues with these activities that demand technical knowledge. Questions such as: "what does this…
Descriptors: Game Based Learning, College Freshmen, Computer Science Education, Computer Networks
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Rina Dhopeshwarkar; Frances Jiménez; Sofia Ryan; Emma Plourde; Madjid Karimi – American Journal on Intellectual and Developmental Disabilities, 2024
Individuals with intellectual and developmental disabilities (IDD) continue to experience disparities in health and well-being despite improved provisions of person-centered care. Patient-centered outcomes research (PCOR) translates evidence into practice for meaningful outcomes. This piece describes findings from an environmental scan and…
Descriptors: Intellectual Disability, Developmental Disabilities, Medical Care Evaluation, Stakeholders
Khalid Mohiuddin; Huda Fatima; Mohiuddin Ali Khan; Mohammad Abdul Khaleel; Zeenat Begum; Sajid Ali Khan; Omer Bin Hussain – SAGE Open, 2023
This article aims to design a novel edge-centric hierarchical cloud architecture to optimize mobile learning (m-learning) performance during learners executing computation-intensive learning applications. This research adopts the potential of distributed computing paradigms, that is, mobile edge, for improving the effectiveness of m-learning…
Descriptors: Computer Networks, Electronic Learning, College Students, Handheld Devices
Xu Yaqian; Zheng Qinhua – Interactive Learning Environments, 2024
The interactive mechanism between social and concept networks is a key question in connectivist learning, which explains the impact of interaction on cognitive development and knowledge generation. The successful practice of "Internet Change Education: Dialogue between Theory and Practice", the first cMOOC in China, provides data support…
Descriptors: Correlation, Social Networks, Status, MOOCs
XiFeng Liao – International Journal of Information and Communication Technology Education, 2024
A modern technology-supported vocational educational system significantly affects the quality of vocational training and contributes to the innovation and economic development of the regional area. The visualization literature analysis was adopted with the purpose of exploring the theoretical framework for developing a 6G-assisted network to…
Descriptors: Computer Networks, Information Networks, Technology Integration, Regional Cooperation
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks