NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 361 to 375 of 4,562 results Save | Export
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Lin, C.-P.; Chen, W.; Yang, S.-J.; Xie, W.; Lin, C.-C. – Journal of Computer Assisted Learning, 2014
Improving students' reading comprehension is of significance. In this study, collaborative learning supported by Group Scribbles (GS), a networked technology, was integrated into a primary reading class. Forty-seven 10-year-old students from two 4th grade classes participated in the study. Experimental and control groups were established to…
Descriptors: Elementary School Students, Experimental Groups, Control Groups, Comparative Analysis
Bashar, Muhammad Shafi Al – ProQuest LLC, 2011
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Descriptors: Feedback (Response), Alphabets, Telecommunications, Probability
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Johnson, R. LeWayne – ProQuest LLC, 2012
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…
Descriptors: Information Technology, Governance, Federal Government, Information Security
Schaffhauser, Dian – Campus Technology, 2012
Colleges and universities have got a big problem: how to bake a wireless network as good as Mom's. The problem is that enterprise wireless networks "tend to be a little more finicky" than the home ones. While the home devices are plug-and-play, enterprise networks force IT departments to manage client issues such as drivers and settings. It's a…
Descriptors: Computer Networks, Educational Technology, Telecommunications, Technology Planning
Shambare, Narcissus – ProQuest LLC, 2013
The problem examined in the proposed study was the underutilization of the intranet portals (IP) by faculty in institutions of higher education (IHE). Despite the time and investment allocated to the IP, the technology remains underutilized to improve productivity, efficiency, and justify its investment yet there is lack of understanding of why…
Descriptors: Computer Networks, Computer Uses in Education, College Faculty, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asiyai, Romina Ifeoma – International Education Studies, 2014
Employing survey research design of the ex-post facto type, this study examined information and community technologies integration in teaching and learning in institutions of higher learning in Delta State, Nigeria. Four research questions and four hypotheses guided the investigation. Descriptive statistical tools such as mean and standard…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Higher Education
Paul, Utpal Kumar – ProQuest LLC, 2012
Since the days Internet traffic proliferated, measurement, monitoring and analysis of network traffic have been critical to not only the basic understanding of large networks, but also to seek improvements in resource management, traffic engineering and security. At the current times traffic in wireless local and wide area networks are facing…
Descriptors: Computer Networks, Telecommunications, Information Networks, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Berry, Barnett; Byrd, Ann – Yearbook of the National Society for the Study of Education, 2012
In this chapter, the authors draw on their experiences with working in building virtual communities of teachers and a pilot program to examine the prospects for increasing consistency in the effectiveness of new teacher support through online networks. Although not intended as a substitute for high-quality face-to-face mentoring experiences,…
Descriptors: Pilot Projects, Mentors, Beginning Teachers, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Salamanca, Juan – ProQuest LLC, 2012
With the advent of ubiquitous computing, interaction design has broadened its object of inquiry into how smart computational artifacts inconspicuously act in people's everyday lives. Although user-centered design approaches remains useful for exploring how people cope with interactive systems, they cannot explain how this new breed of…
Descriptors: Social Theories, Social Networks, Computer Networks, Man Machine Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2012
This article features a major statewide initiative in North Carolina that is showing how a consortium model can minimize risks for districts and help them exploit the advantages of cloud computing. Edgecombe County Public Schools in Tarboro, North Carolina, intends to exploit a major cloud initiative being refined in the state and involving every…
Descriptors: Consortia, Elementary Secondary Education, Needs Assessment, Online Vendors
Pages: 1  |  ...  |  21  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  ...  |  305