Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 18 |
Descriptor
Computer Networks | 100 |
Evaluation Methods | 100 |
Higher Education | 33 |
Computer Assisted Instruction | 23 |
Information Networks | 20 |
Foreign Countries | 19 |
Information Technology | 17 |
Elementary Secondary Education | 15 |
Models | 15 |
Distance Education | 14 |
Educational Technology | 14 |
More ▼ |
Source
Author
McClure, Charles R. | 9 |
Behrens, John T. | 3 |
Bertot, John Carlo | 3 |
Mislevy, Robert J. | 3 |
Bishop, Ann P. | 2 |
Frezzo, Dennis C. | 2 |
Levy, Roy | 2 |
Lin, Sunny S. J. | 2 |
Lopata, Cynthia L. | 2 |
Rutkowski, Kathleen M. | 2 |
Alghamdi, Naif | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Location
United Kingdom | 4 |
Pennsylvania | 3 |
United States | 3 |
Australia | 2 |
Canada | 2 |
Florida | 2 |
Taiwan | 2 |
United Kingdom (England) | 2 |
Arizona | 1 |
Asia | 1 |
Austria (Vienna) | 1 |
More ▼ |
Laws, Policies, & Programs
Education Consolidation… | 1 |
Assessments and Surveys
Learning Style Inventory | 1 |
What Works Clearinghouse Rating
Xu Yaqian; Zheng Qinhua – Interactive Learning Environments, 2024
The interactive mechanism between social and concept networks is a key question in connectivist learning, which explains the impact of interaction on cognitive development and knowledge generation. The successful practice of "Internet Change Education: Dialogue between Theory and Practice", the first cMOOC in China, provides data support…
Descriptors: Correlation, Social Networks, Status, MOOCs
Zancanaro, Airton; Nunes, Carolina Schmitt; Domingues, Maria Jose Carvalho de Souza – Turkish Online Journal of Distance Education, 2017
For the hosting, management and delivery of Massive Open Online Courses (MOOC) it is necessary a technological infrastructure that supports it. Various educational institutions do not have or do not wish to invest in such a structure, possibly because MOOCs are not yet part of official programs of universities, but initiatives by a particular…
Descriptors: Online Courses, Large Group Instruction, Delivery Systems, Technology Integration
Alghamdi, Naif; den Heijer, Alexandra; de Jonge, Hans – International Journal of Sustainability in Higher Education, 2017
Purpose: The purpose of this paper is to analyse 12 assessment tools of sustainability in universities and develop the structure and the contents of these tools to be more intelligible. The configuration of the tools reviewed highlight indicators that clearly communicate only the essential information. This paper explores how the theoretical…
Descriptors: Universities, Sustainability, Institutional Evaluation, Evaluation Methods
Dawadi, Saraswati; Giri, Ram Ashish; Simkhada, Padam – Online Submission, 2020
The pandemic spread of Novel Coronavirus, also known as COVID-19, has significantly disrupted every aspects of human life, including education. The alarming spread of the virus caused a havoc in the educational system forcing educational institutions to shut down. According to a UNESCO report, 1.6 billion children across 191 countries have been…
Descriptors: Foreign Countries, COVID-19, Coping, Distance Education
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C. – IEEE Transactions on Education, 2016
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Descriptors: Teaching Methods, Information Security, Information Networks, Computer Networks
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Roble, Amanda Jean – ProQuest LLC, 2015
The use of formative assessment can increase student achievement (Black & Wiliam, 1998a). However, some of the challenges of incorporating formative assessment into instruction include the length of time needed to collect, assess and provide feedback to all students and dealing with students misunderstandings and incorrect answers that are…
Descriptors: Formative Evaluation, Evaluation Methods, Secondary School Teachers, Mathematics Teachers
Eriksson, Miikka J.; Vuojärvi, Hanna – Higher Education Research and Development, 2014
A multitude of studies has assessed the success of different technology initiatives but rarely has the focus been on special groups. This paper examines whether university students with children and those without have different perceptions of a technology initiative where students were able to acquire university sponsored laptops and were provided…
Descriptors: Foreign Countries, College Students, Parents, Student Attitudes
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Takashi Nagai; Mizue Kayama; Kazunori Itoh – Interactive Technology and Smart Education, 2014
Purpose: The purpose of this study is to explore a support system for beginners in drawing in a networked environment. Learners can receive advice and assessments from art experts without time and/or place constraints by using the proposed system. The authors investigate the possibilities of online supporting drawing learning. Two key factors are…
Descriptors: Art Education, Freehand Drawing, Computer Graphics, Computer Assisted Instruction
Frezzo, Dennis C.; Behrens, John T.; Mislevy, Robert J. – Journal of Science Education and Technology, 2010
Simulation environments make it possible for science and engineering students to learn to interact with complex systems. Putting these capabilities to effective use for learning, and assessing learning, requires more than a simulation environment alone. It requires a conceptual framework for the knowledge, skills, and ways of thinking that are…
Descriptors: Computer Simulation, Computer Networks, Educational Environment, Models
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Mislevy, Robert J.; Behrens, John T.; Bennett, Randy E.; Demark, Sarah F.; Frezzo, Dennis C.; Levy, Roy; Robinson, Daniel H.; Rutstein, Daisy Wise; Shute, Valerie J.; Stanley, Ken; Winters, Fielding I. – Journal of Technology, Learning, and Assessment, 2010
People use external knowledge representations (KRs) to identify, depict, transform, store, share, and archive information. Learning how to work with KRs is central to be-coming proficient in virtually every discipline. As such, KRs play central roles in curriculum, instruction, and assessment. We describe five key roles of KRs in assessment: (1)…
Descriptors: Student Evaluation, Educational Technology, Computer Networks, Knowledge Representation
O'Reilly, Meg; Lefoe, Gerry; Philip, Robyn; Parrish, Dominique – International Journal on E-Learning, 2010
The Australasian Society for Computers in Learning in Tertiary Education ("ascilite") has recently completed research to inform development of the ALTC Exchange, a new online service for learning and teaching in Australia. The research investigated resource identification and contribution, engagement with the repository and user…
Descriptors: User Needs (Information), Higher Education, Foreign Countries, Shared Resources and Services