Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Networks | 9 |
Human Factors Engineering | 9 |
Information Technology | 5 |
Performance Technology | 5 |
Computer System Design | 4 |
Change Strategies | 3 |
Internet | 3 |
Technology Uses in Education | 3 |
Telecommunications | 3 |
Barriers | 2 |
Computer Interfaces | 2 |
More ▼ |
Author
Cobb, Chris | 1 |
Kibirige, Harry M. | 1 |
Larusson, Johann Ari | 1 |
Ramaswami, Rama | 1 |
Riel, Margaret | 1 |
Schaffhauser, Dian | 1 |
Sundresh, Sameer | 1 |
Villano, Matt | 1 |
Xu, Yiliang | 1 |
Publication Type
Reports - Descriptive | 5 |
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Books | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 1 |
Students | 1 |
Location
Arkansas | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Cobb, Chris – Perspectives: Policy and Practice in Higher Education, 2012
Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…
Descriptors: Management Information Systems, Foreign Countries, Computer Interfaces, Technology Uses in Education
Larusson, Johann Ari – ProQuest LLC, 2010
Prior research has highlighted the educational benefit of enabling students to participate in collaborative learning activities. Developing technology that extends the physical boundaries of the classroom and enables students to engage in meaningful collaborative learning activities outside class time can be of significant value. For any…
Descriptors: Learning Activities, Educational Benefits, Cooperative Learning, Interaction
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Sundresh, Sameer – ProQuest LLC, 2009
How do you dynamically customize the programming language available in a context within an existing system, without changing the underlying system? This dissertation introduces a language design approach that addresses this problem. The basic idea is to structure programs as systems of multiple interacting levels of abstraction, where all of the…
Descriptors: Programming Languages, Programming, Internet, Computer System Design
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Riel, Margaret – 1995
This paper focuses on the human side of networking in education, emphasizing that people working together can create new solutions to old problems. Discussion includes increased links to information through the Internet and new resources entering the classroom; team-teaching, cooperative learning, and learner-centered instruction; and distance…
Descriptors: Computer Networks, Computer Uses in Education, Cooperative Learning, Distance Education
Kibirige, Harry M. – 1996
Information has become an increasingly valuable commodity. Access to full-text information, containing text, images, and in some cases, sound, is becoming vital to decision-making for organizations as well as individuals. The book covers the following topics: (1) the information marketplace in a cyberculture; (2) the telecommunications foundation…
Descriptors: Access to Information, Computer Interfaces, Computer Literacy, Computer Mediated Communication