NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 376 to 390 of 4,569 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Casquero, Oskar; Portillo, Javier; Ovelar, Ramon; Benito, Manuel; Romo, Jesus – Interactive Learning Environments, 2010
Universities can offer eLearning 2.0 tools and services to learners while obtaining clear benefits from releasing the control over some learning content. This means a shift from the institution centred and monolithic model of traditional virtual learning environments (VLEs) to a more heterogeneous and open model. This article tries to plot an…
Descriptors: Web Sites, Learning Processes, Internet, Client Server Architecture
Peer reviewed Peer reviewed
Direct linkDirect link
Sarkar, Nurul I. – International Journal of Web-Based Learning and Teaching Technologies, 2013
Motivating students to learn Wi-Fi (wireless fidelity) wireless networking to undergraduate students is often difficult because many students find the subject rather technical and abstract when presented in traditional lecture format. This paper focuses on the teaching and learning aspects of Wi-Fi networking using limited hardware resources. It…
Descriptors: Telecommunications, Computer Networks, Undergraduate Students, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Rabkin, Ariel; Reiss, Charles; Katz, Randy; Patterson, David – ACM Transactions on Computing Education, 2013
We describe our experiences teaching MapReduce in a large undergraduate lecture course using public cloud services and the standard Hadoop API. Using the standard API, students directly experienced the quality of industrial big-data tools. Using the cloud, every student could carry out scalability benchmarking assignments on realistic hardware,…
Descriptors: Assignments, Undergraduate Study, Computer Networks, Educational Technology
Islam, Khondkar R. – ProQuest LLC, 2013
Opportunities in education are lacking in many parts of the developed nations and are missing in most parts of the developing nations. This is, in significant part, due to shortages of classroom instructional resources such as quality teaching staff, hardware and software. Distance education (DE) has proved to be a successful teaching approach and…
Descriptors: Distance Education, Electronic Learning, Computer Software, Computer Networks
Giordano, Eugenio – ProQuest LLC, 2011
Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…
Descriptors: Telecommunications, Computer Networks, Motor Vehicles, Mobility
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Wang, Wei – ProQuest LLC, 2010
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Descriptors: Computer Networks, Computer Security, Graphs, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Pazdrowski, Tomasz – ProQuest LLC, 2013
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Descriptors: Innovation, Resistance to Change, Internet, Adoption (Ideas)
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Schaffhauser, Dian – Campus Technology, 2012
Putting a CIO and a lawyer together in the same room may give one the start of a pretty decent joke, but it could also save an institution millions of dollars in legal fees. While the IT chief understands the systems that fall under the purview of compliance, the attorney is the go-to pessimist for identifying the "gotcha" elements when it comes…
Descriptors: Legal Problems, Compliance (Legal), Legal Responsibility, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Burnett, Cathy – E-Learning and Digital Media, 2011
In contributing to understanding about the barriers and opportunities associated with new technologies in educational settings, this article explores dimensions of the educational spaces associated with using networked technologies in contemporary classrooms. After considering how educational spaces may be "produced" (to use Lefebvre's…
Descriptors: Educational Technology, Space Utilization, Educational Environment, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Kanellopoulos, Dimitris N. – Program: Electronic Library and Information Systems, 2011
Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…
Descriptors: Multimedia Materials, Computer Oriented Programs, Computer Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Lin, C.-P.; Chen, W.; Yang, S.-J.; Xie, W.; Lin, C.-C. – Journal of Computer Assisted Learning, 2014
Improving students' reading comprehension is of significance. In this study, collaborative learning supported by Group Scribbles (GS), a networked technology, was integrated into a primary reading class. Forty-seven 10-year-old students from two 4th grade classes participated in the study. Experimental and control groups were established to…
Descriptors: Elementary School Students, Experimental Groups, Control Groups, Comparative Analysis
Pages: 1  |  ...  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  ...  |  305