Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Networks | 132 |
Computer Oriented Programs | 132 |
Higher Education | 45 |
Computer Uses in Education | 42 |
Information Technology | 42 |
Information Networks | 36 |
Telecommunications | 33 |
Educational Technology | 31 |
Technological Advancement | 26 |
Computer System Design | 25 |
Computer Software | 17 |
More ▼ |
Source
Author
Kuntz, Patricia S. | 2 |
Marcus, Stephen | 2 |
McCollum, Kelly | 2 |
Adams Becker, S. | 1 |
Aiken, Milam | 1 |
Allee, Nancy | 1 |
Altman, Don | 1 |
Angeles, Rebecca | 1 |
Anthony, Matthew | 1 |
Ashford, Tina | 1 |
Atkins, D. E. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 36 |
Teachers | 22 |
Administrators | 12 |
Policymakers | 4 |
Researchers | 4 |
Community | 1 |
Parents | 1 |
Students | 1 |
Location
Africa | 3 |
Australia | 2 |
Canada | 2 |
Mississippi | 2 |
Arkansas | 1 |
Brazil | 1 |
District of Columbia | 1 |
European Union | 1 |
Florida | 1 |
Indonesia | 1 |
Israel | 1 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Sangpetch, Akkarit – ProQuest LLC, 2013
Large-scale enterprise applications are deployed as distributed applications. These applications consist of many inter-connected components with heterogeneous roles and complex dependencies. Each component typically consumes 5-15% of the server capacity. Deploying each component as a separate virtual machine (VM) allows us to consolidate the…
Descriptors: Computer Networks, Computer Oriented Programs, Reaction Time, Automation
Mitra, Pramita – ProQuest LLC, 2013
Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…
Descriptors: Handheld Devices, Shared Resources and Services, Computer Oriented Programs, Protocol Materials
Hariadi, Bambang; Dewiyani Sunarto, M. J.; Sudarmaningtyas, Pantjawati – International Journal of Evaluation and Research in Education, 2016
This study aimed to develop a web-based learning application as a form of learning revolution. The form of learning revolution includes the provision of unlimited teaching materials, real time class organization, and is not limited by time or place. The implementation of this application is in the form of hybrid learning by using Google Apps for…
Descriptors: Educational Technology, Computer Oriented Programs, Web Based Instruction, Blended Learning
Kanellopoulos, Dimitris N. – Program: Electronic Library and Information Systems, 2011
Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…
Descriptors: Multimedia Materials, Computer Oriented Programs, Computer Networks, Internet
Johnson, L.; Adams Becker, S.; Cummins, M.; Estrada, V.; Meira, A. – New Media Consortium, 2012
This report reflects a collaborative research effort to help inform Brazilian educational leaders about significant developments in technologies supporting teaching, learning, and creative inquiry in primary and secondary education. In an effort that ran from August through October 2012, a carefully selected group of 30 experts considered hundreds…
Descriptors: Foreign Countries, Elementary Secondary Education, Educational Technology, Technology Uses in Education
Azeta, A. A. – Turkish Online Journal of Distance Education, 2008
This paper describes an architectural framework and a prototype implementation of a web-based multi-channel e-Learning application that allows students, lecturers and the research communities to collaborate irrespective of the communication device a user is carrying. The application was developed based on the concept of "right once run on any…
Descriptors: Electronic Learning, Handheld Devices, Telecommunications, Laptop Computers
Dumitrascu, Eugen; Popa, Marius – Journal of Applied Quantitative Methods, 2007
In this paper, we present the characteristic features of distributed applications. We also enumerate the modalities of optimizing them and the factors that influence the quality of distributed applications, as well as the way they are affected by the optimization processes. Moreover, we enumerate the quality characteristics of distributed…
Descriptors: Computer Oriented Programs, Computer Networks, Improvement, Computer Software
Dickel, C. Timothy; Young, W. Wayne – 1989
This paper shares some ideas regarding the use of computers by persons who use their gerontology training in direct service to older persons and their families. It proposes that, as professionals serving older persons and their families look toward the future, they need to conscientiously incorporate computer competence into their practice. The…
Descriptors: Competence, Computer Literacy, Computer Networks, Computer Oriented Programs
Galusha, Jill M. – 1998
The older adult (55+) population is becoming a significant presence in the personal computer market. Seniors have the discretionary income, experience, interest, and free time to make use of computers in interesting ways. A literature review found that older adults make use of computers in significant numbers: 30 percent of computer owners are…
Descriptors: Computer Attitudes, Computer Literacy, Computer Networks, Computer Oriented Programs

Nunn, Samuel – Evaluation Review, 1993
Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)
Descriptors: Computer Networks, Computer Oriented Programs, Crime, Digital Computers

Rice, Ronald; Love, Gail – Communication Research: An International Quarterly, 1987
Indicates that (1) computer-mediated communication systems, specifically public computer conferencing, can facilitate a moderate exchange of socioemotional content and (2) basic network roles do not generally differ in percentage of socioemotional content. Discusses some fundamental issues in analyzing content and networks in computer-mediated…
Descriptors: Communication Research, Computer Networks, Computer Oriented Programs, Interpersonal Communication