NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Study Process Questionnaire1
What Works Clearinghouse Rating
Showing 1 to 15 of 54 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muthukumar, N.; Srinivasan, Seshadhri; Subathra, B.; Ramkumar, K. – IEEE Transactions on Education, 2021
Contribution: This article explores how the Industrial Internet of Things (IIoT) could be leveraged to enhance the teaching/learning experience of advanced control techniques [e.g., model-predictive control (MPC)] for complex systems (nonlinear and multivariable) for undergraduate students. Background: The IIoTs' features, such as ubiquitous…
Descriptors: Undergraduate Students, College Science, Science Instruction, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Huvila, Isto – Information Research: An International Electronic Journal, 2019
Introduction: This study investigates the implications of the interplay of multiple information infrastructures to learning and conducting work and to its related information work practices, and how the materialities of work and its infrastructures play into their intermingling. Method: The present study is based on an ethnography of a week-long…
Descriptors: Ethnography, Archaeology, Undergraduate Students, Graduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Musa Nyathi – Asian Association of Open Universities Journal, 2024
Purpose: This paper evaluated the effectiveness of blended learning of business courses in higher learning institutions (HEIs) in developing economies. Design/methodology/approach: A survey, involving 215 learners, was used to collect data. A stratified sampling technique was used in this study. The data were analyzed using the PROCESS macro in…
Descriptors: Blended Learning, Business Administration Education, Developing Nations, Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Mehta, Vedant; Lane, Charles D. – Physics Education, 2018
SenseCube is a multisensor capable of measuring many different real-time events and changes in environment. Most conventional sensors used in introductory-physics labs use their own software and have wires that must be attached to a computer or an alternate device to analyze the data. This makes the standard sensors time consuming, tedious, and…
Descriptors: Physics, Science Instruction, Teaching Methods, Laboratory Experiments
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2018
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in…
Descriptors: Undergraduate Students, Business Schools, Information Technology, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Kokoç, Mehmet; Altun, Arif – International Association for Development of the Information Society, 2016
It is still under debate whether learners' interaction data within e-learning and/or open learning environments could be considered as reflections of their learning experiences to be effective or not. Therefore, it is meaningful to explore the nature of these interactions and to make meaningful conclusions. This study aims to explore what the…
Descriptors: Learning Experience, Interaction, Electronic Learning, Online Courses
Galanek, Joseph D.; Gierdowski, Dana C.; Brooks, D. Christopher – EDUCAUSE, 2018
For 15 years, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology (IT) and higher education's most important end users, undergraduate students. This year's report includes inclusion of the perspectives of students with learning and physical disabilities on how their institutions respond to their…
Descriptors: Undergraduate Students, Information Technology, Computer Uses in Education, Access to Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4