Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 38 |
Descriptor
Computer Networks | 44 |
Web Sites | 44 |
Internet | 23 |
Information Technology | 15 |
Computer Mediated… | 12 |
Computer Security | 12 |
Foreign Countries | 12 |
Social Networks | 12 |
Computer Software | 11 |
Educational Technology | 11 |
Electronic Publishing | 11 |
More ▼ |
Source
Author
Dixit, R. K. | 2 |
Abbott-Chapman, Joan | 1 |
Aber, Susan Ward | 1 |
Alexander, Julie S. | 1 |
Alexander, Melody W. | 1 |
Alghamdi, Naif | 1 |
Allaire, Stéphane | 1 |
Anderson, Travis | 1 |
Ashford, Tina | 1 |
Azeta, A. A. | 1 |
Bedi, Param | 1 |
More ▼ |
Publication Type
Education Level
Audience
Media Staff | 1 |
Location
Canada | 3 |
Australia | 2 |
Brazil | 2 |
Florida | 2 |
Pennsylvania | 2 |
Spain | 2 |
Turkey | 2 |
Arkansas | 1 |
Asia | 1 |
California | 1 |
Connecticut | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2018
One definition of a network administrator describes a person who works with computer infrastructures with an emphasis on networking. To determine the specific skills required of a network administrator by employers, data was collected from 698 nationwide job advertisements on Dice.com. The data collection focused on technical skills rather than…
Descriptors: Skill Analysis, Job Skills, Database Management Systems, Information Networks
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Zancanaro, Airton; Nunes, Carolina Schmitt; Domingues, Maria Jose Carvalho de Souza – Turkish Online Journal of Distance Education, 2017
For the hosting, management and delivery of Massive Open Online Courses (MOOC) it is necessary a technological infrastructure that supports it. Various educational institutions do not have or do not wish to invest in such a structure, possibly because MOOCs are not yet part of official programs of universities, but initiatives by a particular…
Descriptors: Online Courses, Large Group Instruction, Delivery Systems, Technology Integration
Vigil-Hayes, Morgan Ashlee – ProQuest LLC, 2017
The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…
Descriptors: Internet, Computer Networks, Social Networks, Access to Information
Alghamdi, Naif; den Heijer, Alexandra; de Jonge, Hans – International Journal of Sustainability in Higher Education, 2017
Purpose: The purpose of this paper is to analyse 12 assessment tools of sustainability in universities and develop the structure and the contents of these tools to be more intelligible. The configuration of the tools reviewed highlight indicators that clearly communicate only the essential information. This paper explores how the theoretical…
Descriptors: Universities, Sustainability, Institutional Evaluation, Evaluation Methods
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Ozan, Ozlem – Turkish Online Journal of Distance Education, 2013
Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…
Descriptors: Foreign Countries, Social Networks, Distance Education, Educational Environment
Larusson, Johann Ari – ProQuest LLC, 2010
Prior research has highlighted the educational benefit of enabling students to participate in collaborative learning activities. Developing technology that extends the physical boundaries of the classroom and enables students to engage in meaningful collaborative learning activities outside class time can be of significant value. For any…
Descriptors: Learning Activities, Educational Benefits, Cooperative Learning, Interaction
Casquero, Oskar; Portillo, Javier; Ovelar, Ramon; Benito, Manuel; Romo, Jesus – Interactive Learning Environments, 2010
Universities can offer eLearning 2.0 tools and services to learners while obtaining clear benefits from releasing the control over some learning content. This means a shift from the institution centred and monolithic model of traditional virtual learning environments (VLEs) to a more heterogeneous and open model. This article tries to plot an…
Descriptors: Web Sites, Learning Processes, Internet, Client Server Architecture
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Huang, Wen-Chen; Chen, Ching-Wen; Weng, Richard – International Journal of Distance Education Technologies, 2015
In the conventional classroom, many obstacles hinder interaction between an instructor and students, such as limited class hours, fixed seating, and inadequate time for meetings after class. This work develops a novel multimedia mobile classroom feedback system (MMCFS) that instantly displays students' responses, such as class-related questions or…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Interaction
Stack, Sue; Watson, Jane; Abbott-Chapman, Joan – Australasian Journal of Educational Technology, 2013
Tasmania, one of the first locations to have communities connected to the national broadband network (NBN), provided the context within which to ask significant questions about the implications of the NBN for all levels and sectors of education. This paper reports findings from a research project that developed innovative methodology to explore…
Descriptors: Foreign Countries, Telecommunications, Computer Networks, Internet
Walling, Donovan R. – TechTrends: Linking Research and Practice to Improve Learning, 2009
When students engage with technology to produce media, impetus and inspiration often come from the work of others. In today's new media environment in which students blur the line between school-based technologies and personal devices and engagement, educators find themselves standing on a railroad track facing a speeding high-tech train. If…
Descriptors: Production Techniques, Computer Networks, Social Networks, Films
Henninger, Jessamyn; Aber, Susan Ward – Issues in Science and Technology Librarianship, 2010
Systems Architects and Information Technology administrators working in higher education help faculty, staff, and student computer users. Yet, who helps them? What resources do these professionals value? A case study was conducted using purposeful sampling and data collection through electronic interview to gather the preferred information-seeking…
Descriptors: Information Technology, Administrators, Higher Education, Resources
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries