Publication Date
In 2025 | 7 |
Since 2024 | 60 |
Since 2021 (last 5 years) | 108 |
Since 2016 (last 10 years) | 231 |
Since 2006 (last 20 years) | 806 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 400 |
Teachers | 174 |
Administrators | 148 |
Policymakers | 90 |
Media Staff | 56 |
Researchers | 54 |
Students | 24 |
Parents | 12 |
Community | 5 |
Counselors | 2 |
Location
Canada | 95 |
United States | 80 |
United Kingdom | 59 |
Australia | 47 |
California | 38 |
Texas | 33 |
Japan | 30 |
New York | 30 |
Florida | 25 |
Pennsylvania | 25 |
Finland | 22 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Dikaliotis, Theodoros K. – ProQuest LLC, 2013
In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…
Descriptors: Computer Networks, Information Security, Information Systems, Coding
Zhou, Shan – ProQuest LLC, 2013
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
Descriptors: Computer Networks, Telecommunications, Information Technology, Mathematics
Czerkawski, Betul C. – Interactive Learning Environments, 2016
The considerable increase in web-based knowledge networks in the past two decades is strongly influencing learning environments. Learning entails information retrieval, use, communication, and production, and is strongly enriched by socially mediated discussions, debates, and collaborative activities. It is becoming critical for educators to…
Descriptors: Computer Networks, Instructional Design, Educational Needs, Information Retrieval
Willis, Jason; Krausen, Kelsey; McClellan, Patrick – WestEd, 2021
The COVID-19 pandemic offers an opportunity to reconsider the approach and delivery of public education. With a large infusion of one-time federal relief aid and a depth of need among students most impacted by the COVID-19 pandemic that the system is still trying to understand, state and local education leaders will need to plan for both (1)…
Descriptors: Educational Finance, Federal Aid, Federal Legislation, COVID-19
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Blom, Helen; Segers, Eliane; Knoors, Harry; Hermans, Daan; Verhoeven, Ludo – Journal of Computer Assisted Learning, 2018
This study aims to investigate secondary school students' reading comprehension and navigation of networked hypertexts with and without a graphic overview compared to linear digital texts. Additionally, it was studied whether prior knowledge, vocabulary, verbal, and visual working memory moderated the relation between text design and…
Descriptors: Reading Comprehension, Navigation (Information Systems), Computer Networks, Hypermedia
Nychis, George P. – ProQuest LLC, 2013
In the past two decades, we have seen an unprecedented rise in unlicensed wireless devices and applications of wireless technology. To meet various application constraints, we continually customize the radios and their protocols to the application domain which has led to significant diversity in spectrum use. Unfortunately, this diversity (coupled…
Descriptors: Computer Networks, Telecommunications, Radio, Information Technology
Crane, Earl Newell – ProQuest LLC, 2013
The research problem that inspired this effort is the challenge of managing the security of systems in large-scale heterogeneous networked environments. Human intervention is slow and limited: humans operate at much slower speeds than networked computer communications and there are few humans associated with each network. Enabling each node in the…
Descriptors: Computer Security, Computer Networks, Artificial Intelligence, Decision Making
Ogawa, Nobuyuki; Shimizu, Akira – International Association for Development of the Information Society, 2017
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented…
Descriptors: Educational Technology, Technology Uses in Education, Information Processing, Equipment
Barre-Parrales, Pamela; Villafuerte-Holguín, Jhonny – English Language Teaching Educational Journal, 2021
Ecuadorian educational policy for English as Foreign Language instruction in Ecuador mandated in 2016 to introduce Content and Language Integrated-Learning (CLIL) methodology to improve the teaching and learning process. This research aims to analyze the implementation of CLIL methodology in zone 4 of Ecuador during 2019-2021. This work subscribed…
Descriptors: Foreign Countries, Second Language Learning, Second Language Instruction, English (Second Language)
Halatchliyski, Iassen; Moskaliuk, Johannes; Kimmerle, Joachim; Cress, Ulrike – International Journal of Computer-Supported Collaborative Learning, 2014
This article discusses the relevance of large-scale mass collaboration for computer-supported collaborative learning (CSCL) research, adhering to a theoretical perspective that views collective knowledge both as substance and as participatory activity. In an empirical study using the German Wikipedia as a data source, we explored collective…
Descriptors: Computer Assisted Instruction, Cooperation, Cooperative Learning, Collaborative Writing
Terasawa, Ikuo – Higher Education Studies, 2016
The challenge study is a project based learning curriculum at Technical High School aimed at the construction of a wireless communication system. The first period was engineering issues in the construction of an artificial satellite and the second period was a positional locating system based on the general purpose wire-less device--ZigBee device.…
Descriptors: Vocational High Schools, Technical Education, Telecommunications, Program Effectiveness
Kok, Illasha; Beter, Petra; Esterhuizen, Hennie – International Journal of Distance Education Technologies, 2018
Fragmented connectivity in South Africa is the dominant barrier for digitising initiatives. New insights surfaced when a university-based nursing programme introduced tablets within a supportive network learning environment. A qualitative, explorative design investigated adult nurses' experiences of the realities when moving from paper-based…
Descriptors: Nurses, Handheld Devices, Information Technology, Blended Learning
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students