NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Students1
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2012
A network engineer is an Information Technology (IT) professional who designs, implements, maintains, and troubleshoots computer networks. While the United States is still experiencing relatively high unemployment, demand for network engineers remains strong. To determine what skills employers are looking for, data was collected and analyzed from…
Descriptors: Computer Networks, Engineering Education, Information Technology, Career Development
Peer reviewed Peer reviewed
Direct linkDirect link
Delialioglu, Omer; Oncu, Semiral; Cakir, Hasan – Hacettepe University Journal of Education, 2008
There has been a rapid increase in the number of technology certificate programs offered around the world in the last decade. While designing, developing, and implementing these programs little or no consideration is given to geographical, cultural and developmental differences between different regions of the world. This study investigates the…
Descriptors: Educational Technology, Academic Achievement, Educational Environment, Surveys
Alberta Advanced Education and Technology, 2009
The graduate of the Communication Technician apprenticeship program is a certified journeyperson who will be able to: (1) supervise, train and coach apprentices; (2) use a thorough knowledge of electrical and electronic theory and its application to communication and associated equipment used in the telecommunication industry; (3) understand…
Descriptors: Foreign Countries, Paraprofessional Personnel, Apprenticeships, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Lichtenberg, James – Educom Review, 1995
Discusses the issues involved in reforming the copyright law and redefining fair use as it applies to electronic documents. Highlights include access to and privileges of the Internet, technological development, the evolution of copyright, licenses and fees, the position of publishers and academics, costs, and conditions for creating a stable…
Descriptors: Access to Information, Certification, Computer Networks, Copyrights
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Information Technology, Educational Technology, Teaching Methods, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Armstrong, Helen L. – Journal of Information Technology Education, 2009
Lack of accessibility in the design of e-learning courses continues to hinder students with vision impairment. E-learning materials are predominantly vision-centric, incorporating images, animation, and interactive media, and as a result students with acute vision impairment do not have equal opportunity to gain tertiary qualifications or skills…
Descriptors: Industry, Distance Education, Pilot Projects, Educational Environment
Ekhaml, Leticia; Ekhaml, Paul A. – School Library Media Activities Monthly, 1995
Presents issues about school networking: how network administrators differ from technology directors; what administrators, technology directors, teachers, and students need to know; whether school library media specialists should serve as network administrators; why basic networking knowledge is advantageous; causes of problems affecting networks;…
Descriptors: Administrator Role, Administrators, Certification, Computer Networks
Fox, Carol – Illinois Libraries, 1990
Description of library services in Illinois focuses on school libraries and youth services. Topics discussed include multitype library systems; automation; youth services consultants; data collection for youth services; resource sharing for schools; promotion of reading and library programs; communications networks; and standards and certification…
Descriptors: Adolescents, Certification, Computer Networks, Consultants
Minor, Barbara B. – School Library Media Annual (SLMA), 1992
Describes research from the ERIC database on school library media programs. Topics discussed include library and information skills instruction; information seeking; educational equity; use of technology; censorship; school library media collections; use studies; role of the library media specialist; collective bargaining and job/certification…
Descriptors: Censorship, Certification, Computer Networks, Educational Technology
Goins, Shannon – 2001
A new program to train blind and visually impaired individuals to design and run a computer network has been developed. The program offers the Microsoft Certified Systems Engineer (MCSE) training. The program, which began in February 2001, recently graduated its first class of students, who are currently completing 1-month internships to complete…
Descriptors: Assistive Devices (for Disabled), Certification, Communication Aids (for Disabled), Computer Networks