NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 211 to 225 of 4,561 results Save | Export
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Bandara, H. M. N. Dilum – ProQuest LLC, 2012
Resource-rich computing devices, decreasing communication costs, and Web 2.0 technologies are fundamentally changing the way distributed applications communicate and collaborate. With these changes, we envision Peer-to-Peer (P2P) systems that will allow for the integration and collaboration of peers with diverse capabilities to a virtual community…
Descriptors: Computer Networks, Cooperation, Information Technology
Dawadi, Saraswati; Giri, Ram Ashish; Simkhada, Padam – Online Submission, 2020
The pandemic spread of Novel Coronavirus, also known as COVID-19, has significantly disrupted every aspects of human life, including education. The alarming spread of the virus caused a havoc in the educational system forcing educational institutions to shut down. According to a UNESCO report, 1.6 billion children across 191 countries have been…
Descriptors: Foreign Countries, COVID-19, Coping, Distance Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frolova, Elena V.; Ryabova, Tatyana M.; Rogach, Olga V. – European Journal of Contemporary Education, 2019
The dynamic development of information and communication technologies, the strengthening of the public demand for digitalization of various spheres of life, orient the Moscow education system towards the active introduction of digital technologies and high-tech educational environment development. The purpose of this article is to analyze the…
Descriptors: Information Technology, Technology Integration, Program Implementation, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Hanrahan, Fidelma; Hughes, Ed; Banerjee, Robin; Eldridge, Alice; Kiefer, Chris – International Journal of Music Education, 2019
Little is currently known about the possible benefits of using networked technology to enhance ensemble performance. This study explored whether the introduction of specially devised technology -- networked tablets using traditional music notation -- to a primary school orchestra would enhance the experience of ensemble music. Particular emphasis…
Descriptors: Music Education, Music Activities, Elementary School Students, Music
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hodgman, Matthew R. – Contemporary Issues in Education Research, 2013
As educational technology continues to rapidly become a vital part of a school district's infrastructure, desktop virtualization promises to provide cost-effective and education-enhancing solutions to school-based computer technology problems in school systems locally and abroad. This article outlines the history of and basic concepts behind…
Descriptors: Educational Technology, Barriers, Computer Software, Computer Networks
Liu, Meredith – Clayton Christensen Institute for Disruptive Innovation, 2014
To illuminate the possibilities for next-generation assessments in K-12 schools, this case study profiles the Cisco Networking Academy, which creates comprehensive online training curriculum to teach networking skills. Since 1997, the Cisco Networking Academy has served more than five million high school and college students and now delivers…
Descriptors: Educational Assessment, Computer Networks, Information Technology, Elementary Secondary Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C. – IEEE Transactions on Education, 2016
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Descriptors: Teaching Methods, Information Security, Information Networks, Computer Networks
Kokoç, Mehmet; Altun, Arif – International Association for Development of the Information Society, 2016
It is still under debate whether learners' interaction data within e-learning and/or open learning environments could be considered as reflections of their learning experiences to be effective or not. Therefore, it is meaningful to explore the nature of these interactions and to make meaningful conclusions. This study aims to explore what the…
Descriptors: Learning Experience, Interaction, Electronic Learning, Online Courses
Nedyalkova, Anna; Bakardjieva, Teodora; Nedyalkov, Krasimir – International Association for Development of the Information Society, 2016
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better…
Descriptors: Information Security, Information Systems, Computer Networks, Guidelines
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
Galanek, Joseph D.; Gierdowski, Dana C.; Brooks, D. Christopher – EDUCAUSE, 2018
For 15 years, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology (IT) and higher education's most important end users, undergraduate students. This year's report includes inclusion of the perspectives of students with learning and physical disabilities on how their institutions respond to their…
Descriptors: Undergraduate Students, Information Technology, Computer Uses in Education, Access to Computers
Pages: 1  |  ...  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  ...  |  305